The Cybersecurity and Infrastructure Security Agency (CISA) has made a noteworthy addition to its Known Exploited Vulnerabilities (KEV) Catalog, which now includes two vulnerabilities that have been confirmed as actively exploited. These vulnerabilities, identified as CVE-2025-8876 and CVE-2025-8875, are associated with N-able N-central software and represent critical security risks.
CVE-2025-8876 is a command injection vulnerability, while CVE-2025-8875 relates to insecure deserialization. "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," said a representative from CISA. This statement underlines the agency's concern about ongoing exploitation efforts that target vulnerabilities within government systems.
"These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,"

CISA's additions stem from Binding Operational Directive (BOD) 22-01, which aims to reduce the risks tied to known exploited vulnerabilities in federal systems. According to the directive, which establishes a 'living list' of high-risk Common Vulnerabilities and Exposures (CVEs), Federal Civilian Executive Branch (FCEB) agencies are required to act promptly to remediate these identified threats. "BOD 22-01 requires Federal Civilian Executive Branch agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats," the spokesperson added.
"BOD 22-01 requires Federal Civilian Executive Branch agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats,"
Although BOD 22-01 is mandated for FCEB agencies, CISA also emphasizes the importance of remediation for all organizations. "CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice," the representative said. This call to action highlights the broader implications of the vulnerabilities beyond just federal systems, indicating that private sectors should also take immediate steps to safeguard their infrastructure.
"CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice,"

CISA has made it clear that it will continue to update the KEV Catalog, ensuring that new vulnerabilities are added as they are identified, which further underscores the fluid nature of cyber threats. The agency’s efforts reflect a proactive approach to cybersecurity, aiming to foster a safer environment across various sectors by encouraging readiness and responsiveness to security threats.
As the landscape of cybersecurity continues to evolve, organizations across the board must stay vigilant and adaptable in their defense strategies. CISA's ongoing commitment to sharing information about emerging threats and vulnerabilities is crucial in this evolving battle against cybercriminals. With active threats showcasing the potential for significant damage, the imperative for timely action grows stronger.
Looking Ahead
Looking Ahead
Looking Ahead
In light of these developments, organizations are encouraged to review their security protocols, ensuring that they align with CISA's recommendations and prioritize the remediation of vulnerabilities listed in the KEV Catalog. Continuous monitoring, staff training, and investing in robust cybersecurity infrastructure will be vital in mitigating potential risks posed by such vulnerabilities in the future.


