CISA updates its KEV Listing with TP-Hyperlink Wi-Fi extender and WhatsApp spyware and adware flaws, urging customers and businesses to patch dangers earlier than exploitation spreads.
The Cybersecurity and Infrastructure Safety Company (CISA) has not too long ago added two important safety vulnerabilities to its official checklist of recognized exploited flaws. In your info, this catalogue is a listing of vulnerabilities which have been actively utilized by malicious actors.
Excessive-Severity Flaw in TP-Hyperlink Extender
First on the checklist is a high-severity flaw in a TP-Hyperlink Wi-Fi Vary Extender, the mannequin TL-WA855RE. This severe situation, tracked as CVE-2020-24363, has a rating of 8.8 out of 10. The issue is a “lacking authentication” flaw, which suggests an attacker can get high-level entry to the machine.
Cybersecurity agency MalwareForensics said {that a} repair was issued, which is out there right here, however please observe, this mannequin has reached its “end-of-life” standing. This implies the producer is now not offering updates or help, making it an ongoing safety threat. Customers of this particular vary extender are suggested to change to a more recent mannequin to make sure their community stays safe.
WhatsApp Focused by Adware
A second, much less extreme however nonetheless regarding, vulnerability has been present in WhatsApp. This flaw, assigned CVE-2025-55177 with a rating of 5.4, was reportedly utilized in a highly-targeted spyware and adware marketing campaign. The problem stems from “incomplete authorisation” for messages synced with linked units.
The attackers used this vulnerability together with a separate flaw in Apple’s iOS, iPadOS, and macOS working methods, recognized as CVE-2025-43300, as reported by Hackread.com on August 31, 2025.
The vulnerability affected a number of variations of the appliance, together with WhatsApp for iOS earlier than model 2.25.21.73, WhatsApp Enterprise for iOS earlier than model 2.25.21.78, and WhatsApp for Mac earlier than model 2.25.21.78. WhatsApp introduced it despatched in-app warnings to beneath 200 customers who might have been particularly focused by the marketing campaign.
What To Do
These vulnerabilities are thought of a severe threat to the private and non-private sectors. Whereas the CISA’s catalogue is primarily a information for US federal businesses, the company strongly urges all organisations, and even particular person customers, to take these dangers severely. The federal government’s Binding Operational Directive (BOD) 22-01 mandates that federal businesses repair these points promptly. This consists of prioritising and fixing these vulnerabilities to guard towards potential cyberattacks.
The inclusion of those flaws within the CISA catalogue prompted reactions from cybersecurity specialists, highlighting the broader implications for each companies and people.
Randolph Barr, Chief Data Safety Officer at Cequence Safety, factors out that the TP-Hyperlink situation is usually tied to dwelling employees. He states that workers “flip to client extenders as an affordable and straightforward approach to repair Wi-Fi lifeless zones,” however these units usually have weak safety and are hardly ever up to date. For him, the vulnerability on the KEV checklist is a reminder that “unmanaged client gear can quietly lengthen your assault floor if not addressed.”