NY23:00
    LDN04:00
    HKG11:00
    TYO12:00
    Gold4,499-0.29%
    Bitcoin75,483-2.70%
    Gold4,499-0.3%
    Bitcoin75,483-2.7%
    LATEST NEWS
    Minnesota Feeding Our Future leader gets 41 years for $250 million fraud34 minutesDevon buys 16,300 Delaware Basin acres for about $2.6 billion35 minutesBurnham launches Makerfield by-election bid as Greens reopen selectionabout 2 hoursDHS updates public events feed, spotlighting activities tied to its Washington headquartersabout 2 hoursDC parks agency centralizes neighborhood programming on official events pageabout 2 hoursDC Public Library Launches Dig DC: The People's Archive Digital Repositoryabout 2 hoursDC.gov's official events calendar lists public programs across the Districtabout 2 hoursDistrict posts DPR-1 Articles of Incorporation for domestic professional corporationsabout 2 hoursDC posts central hub for unemployment insurance tax forms and guidanceabout 2 hoursOpen Data DC centralizes the city’s public datasets for residents and researchersabout 2 hoursDC Department of Health publishes official Marriage and Family Therapy licensing pageabout 2 hoursDistrict posts draft ANC support letter for Reservoir Road traffic calmingabout 2 hoursDC’s licensing hub: Department of Licensing and Consumer Protection’s occupational and professional portalabout 2 hoursDC Public Library says catalog isn't sending digital hold alerts; manage holds via Libbyabout 2 hoursDC.gov Hosts District’s Official Events Calendar for Public Programs and Meetingsabout 2 hoursMinnesota Feeding Our Future leader gets 41 years for $250 million fraud34 minutesDevon buys 16,300 Delaware Basin acres for about $2.6 billion35 minutesBurnham launches Makerfield by-election bid as Greens reopen selectionabout 2 hoursDHS updates public events feed, spotlighting activities tied to its Washington headquartersabout 2 hoursDC parks agency centralizes neighborhood programming on official events pageabout 2 hoursDC Public Library Launches Dig DC: The People's Archive Digital Repositoryabout 2 hoursDC.gov's official events calendar lists public programs across the Districtabout 2 hoursDistrict posts DPR-1 Articles of Incorporation for domestic professional corporationsabout 2 hoursDC posts central hub for unemployment insurance tax forms and guidanceabout 2 hoursOpen Data DC centralizes the city’s public datasets for residents and researchersabout 2 hoursDC Department of Health publishes official Marriage and Family Therapy licensing pageabout 2 hoursDistrict posts draft ANC support letter for Reservoir Road traffic calmingabout 2 hoursDC’s licensing hub: Department of Licensing and Consumer Protection’s occupational and professional portalabout 2 hoursDC Public Library says catalog isn't sending digital hold alerts; manage holds via Libbyabout 2 hoursDC.gov Hosts District’s Official Events Calendar for Public Programs and Meetingsabout 2 hours
    Politics

    CISA Mandates Patch for Critical Excel Flaw

    CISA added exploited Excel CVE-2009-0238 and SharePoint CVE-2026-32201 to KEV, ordering FCEB agencies to patch in two weeks.

    Published16 Apr 2026, 04:00:52
    CISA Mandates Patch for Critical Excel Flaw
    A360
    Key Takeaways✦ Atlas AI
    01

    CISA has mandated federal agencies patch a 17-year-old Excel vulnerability (CVE-2009-0238) due to active exploitation, highlighting the persistent threat of legacy software flaws.

    02

    The Excel vulnerability allows remote code execution, enabling attackers to gain full system control and manipulate data, underscoring the critical need for immediate patching to prevent severe breaches.

    03

    CISA also added a recent SharePoint vulnerability to its KEV catalog, emphasizing the continuous need for vigilance against both old and new threats that can lead to data spoofing and phishing.

    Atlas AI

    Atlas AI

    U.S. cybersecurity officials have ordered federal agencies to fix two newly listed software flaws after confirming active exploitation. The Cybersecurity and Infrastructure Security Agency (CISA) added a long-standing Microsoft Excel remote code execution vulnerability, tracked as CVE-2009-0238, to its Known Exploited Vulnerabilities (KEV) catalog. CISA said the issue is under active exploitation and directed Federal civilian executive branch (FCEB) agencies to apply patches within two weeks.

     

    The Excel flaw dates back to 2009 and can be triggered when a user opens a specially crafted Excel document. CISA described the impact as remote code execution that can result in full control of an affected system. In the scenario outlined, successful exploitation could allow an attacker to install programs, view or change data, and create new user accounts with full rights.

     

    CISA said the affected products span multiple Microsoft offerings, including various versions of Microsoft Office Excel, Excel Viewer, and Excel in Microsoft Office for Mac. By placing CVE-2009-0238 in the KEV catalog, CISA is signaling that the vulnerability is not only known but is being used in real-world attacks, elevating the urgency for remediation across government environments that fall under the directive.

     

    Alongside the Excel entry, CISA also added a newer SharePoint Server vulnerability, CVE-2026-32201, to the KEV catalog. Officials described this SharePoint issue as a zero-day that has been addressed in recent updates. The flaw is characterized as a spoofing vulnerability caused by improper input validation, enabling attackers to spoof data.

     

    CISA said exploitation of CVE-2026-32201 could lead to access to sensitive information and the alteration of disclosed data. Officials also warned that the ability to present falsified information inside trusted SharePoint environments could support phishing campaigns or other social engineering activity, by making manipulated content appear legitimate to users who rely on SharePoint for internal collaboration and document sharing.

     

    The KEV catalog is used to prioritize remediation based on observed exploitation, and the two-week deadline for FCEB agencies sets a clear compliance window for the Excel vulnerability. For organizations beyond the federal scope, the listings highlight risks tied to user-driven document opening in Excel and trust-based workflows in SharePoint, where spoofed data can influence decisions and user behavior.

     

    Risks and unknowns: CISA did not provide details in the announcement about the specific threat actors, the scale of exploitation, or which environments have been targeted. The agency’s directive focuses on patching timelines and the security impact described for each vulnerability, leaving the broader operational footprint of the campaigns unspecified.

     

    Share

    Related Articles

    Atlas360

    Sign up for Atlas Daily

    The daily global news briefing you can trust.

    every weekday·Read it now

    or
    Sign in

    Already subscribed? Sign in and we won't show you this message again.