Wealthari
Friday, Mar 6, 2026
  • Legal & Support :
  • About Us
  • Privacy Policy
  • Terms of Service
  • Contact Us
  • Home
  • Business
  • Technology
  • Leadership
  • Reviews
    • Business Services
      • LLC Comparisons
      • Accounting Software
      • Hosting Services
      • Insurance Solutions
    • Productivity Software
      • Asana vs Trello
      • Cloud Storage Apps
      • Time Tracking Tools
    • Learning Platforms
      • Online Certifications
      • Skillshare vs Udemy
    • Marketing ToolsNew
Reading: CISA Adds Microsoft Configuration Manager Flaw to Exploited Vulnerabilities List
Newsletter
Wealthari
  • Home
  • Business
  • Technology
  • Leadership
  • Reviews
    • Business Services
      • LLC Comparisons
      • Accounting Software
      • Hosting Services
      • Insurance Solutions
    • Productivity Software
      • Asana vs Trello
      • Cloud Storage Apps
      • Time Tracking Tools
    • Learning Platforms
      • Online Certifications
      • Skillshare vs Udemy
    • Marketing ToolsNew
Reading: CISA Adds Microsoft Configuration Manager Flaw to Exploited Vulnerabilities List
Font ResizerAa
WealthariWealthari
  • Home
  • Business
  • Technology
  • Leadership
Search
  • Navigation
    • Home
    • Business
    • Technology
    • Leadership
  • Legal & Info
    • Privacy Policy
    • Terms of Service
    • About Us
    • Contact
© 2024 Wealthari. All Rights Reserved.
Technology

CISA Adds Microsoft Configuration Manager Flaw to Exploited Vulnerabilities List

By Michael Scott
Published: February 13, 2026
Share
SHARE

Critical SQL Injection Bug Now Actively Targeted

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a severe Microsoft Configuration Manager vulnerability—tracked as CVE-2024-43468—to its Known Exploited Vulnerabilities (KEV) catalog. The move confirms that attackers are now actively exploiting the flaw, nearly four months after Microsoft issued a patch in October 2024.

Contents
  • Critical SQL Injection Bug Now Actively Targeted
  • Four-Month Gap Between Patch and Exploitation
  • Part of a Broader KEV Update
  • Immediate Action Recommended

The vulnerability carries a CVSS score of 9.8 and allows unauthenticated remote attackers to execute arbitrary commands on affected servers and databases. Under Binding Operational Directive 22-01, U.S. federal agencies have until March 5, 2026, to apply the required mitigations.

Four-Month Gap Between Patch and Exploitation

Microsoft initially addressed the issue during its October 2024 Patch Tuesday release. The flaw was discovered by French security firm Synacktiv, which later published a detailed technical analysis and proof-of-concept exploit in January 2025.

The SQL injection vulnerability resides in the MP_Location service, which processes client messages without adequate sanitization. Attackers can exploit this weakness through unauthenticated requests, enabling them to run arbitrary SQL commands with sysadmin-level privileges and potentially activate the xp_cmdshell feature for remote code execution.

Microsoft Configuration Manager—formerly known as System Center Configuration Manager (SCCM)—is widely deployed across enterprise environments to manage Windows devices, push updates, deploy applications, and handle system imaging across large networks.

Part of a Broader KEV Update

CISA included the Microsoft flaw as part of a broader KEV update on February 12, which added three other actively exploited vulnerabilities:

  • CVE-2025-15556 – Notepad++ integrity check bypass
  • CVE-2025-40536 – SolarWinds Web Help Desk security control bypass
  • CVE-2026-20700 – Apple buffer overflow impacting iOS, iPadOS, macOS and related platforms

The Apple flaw, reported by Google’s Threat Analysis Group, is believed to be exploited by nation-state or commercial spyware actors.

Immediate Action Recommended

Although Microsoft has not updated its advisory with new exploitation details, CISA’s inclusion signals that the vulnerability poses a confirmed active threat. Both federal and private organizations are urged to review the KEV catalog and ensure all listed issues are promptly patched.

Organizations running Configuration Manager versions 2303, 2309, or 2403 should verify that Microsoft’s security update has been fully applied to avoid potential compromise.

Disclosure: Wealthari works with brand partners and receives compensation for some recommendations. Our content remains independent and reflects our honest evaluations.
Share This Article
Facebook LinkedIn Email Copy Link

Related

Can a Consultant Benefit Your Business?
What to Know Before Engaging a Business Consultant
June 6, 2025
Why Cybersecurity is Important for Your Wallet
Why Cybersecurity is Important for Your Wallet
June 1, 2025
Why Delegation Matters for Getting the Best Out of Your Team
Why Delegation Matters for Getting the Best Out of Your Team
May 17, 2025

In Business

Nvidia-Led Tech Selloff Drags Wall Street Lower as Block Slashes Half Its Workforce

Shell and METLEN Sign LNG Deal to Bolster Southeast Europe’s Energy Security

Microsoft Unveils Glass Data Storage System That Could Preserve Information for 10,000 Years

  • Privacy Policy
  • Terms of Service
  • Contact Us

Stay updated with insightful content designed to inform and inspire you through the dynamic world of finance, business strategies, and changing market trends.
Hosted by Cloudwork

Wealthari
  • Home
  • Business
  • Technology
  • Leadership
  • Reviews
393.9kFollowersLike
34.3kFollowersFollow
4.42MSubscribersSubscribe
30.4kFollowersFollow

Made by ThemeRuby using the Foxiz theme.