Fail-Safe Friday - Executive Action Brief

January 22, 2026

In partnership with

In the last 72 hours, three developments should set your weekend posture: Cisco’s Unified Communications zero-day (CVE-2026-20045) moved from mitigations to patches with active exploitation confirmed; CISA added multiple items to the KEV catalog across January 21–22, tightening remediation deadlines; and HPE OneView exploitation attempts surged as reports linked botnet activity to recent fixes.

Priorities: close Cisco UC exposure now with version-specific patches, treat all new KEV entries as operationally exploited, and lock down infrastructure managers (OneView) with RBAC, network isolation, and log forwarding.

Introducing the first AI-native CRM

Connect your email, and you’ll instantly get a CRM with enriched customer insights and a platform that grows with your business.

With AI at the core, Attio lets you:

  • Prospect and route leads with research agents

  • Get real-time insights during customer calls

  • Build powerful automations for your complex workflows

Join industry leaders like Granola, Taskrabbit, Flatfile and more.

πŸ“Š Executive Threat Heatmap πŸ“Š

Top-level takeaways this week:

  • Exploit & Zero-Day Velocity ↑ β€” Cisco UC zero-day confirmed exploited; CISA adds fresh KEV entries within 24 hours.

  • Infrastructure & Tooling Risk ↑ β€” Botnet activity observed against HPE OneView management planes.

  • Compliance Clock Pressure ↑ β€” New KEV listings compress timelines and raise audit exposure.

🚨 Late-Breaking Threats (last 7-10 days) 🚨

1) Cisco UC zero-day (CVE-2026-20045) – High

What changed: Cisco released patches and confirmed in-the-wild attacks against Unified CM and Webex Calling Dedicated Instance; see Cisco advisory and independent coverage here and here.

Why this matters: UC platforms sit next to identity, voice, and call-routingβ€”RCE/policy tamper here yields credential exposure, lateral movement, and outage risk.

2) CISA KEV cadence (Jan 21–22 updates) – High

What changed: CISA added one KEV item on Jan 21 and four more on Jan 22 based on active exploitation.

Why this matters: KEV = operationalized. Unpatched assets now carry technical risk + compliance deadlines (federal and private-sector audits follow KEV clocks).

3) HPE OneView RCE targeting & botnet surge – Medium-High

What changed: Researchers observed large-scale exploitation attempts against HPE OneView CVE-2025-37164, including rapid botnet recruitment post-patch.

Why this matters: Infra managers are blast-radius multipliersβ€”compromise can reconfigure racks, harvest secrets, and implant firmware-level persistence.

4) GitLab security updates (2FA bypass & DoS) – Medium-High

What changed: GitLab shipped fixes for 2FA bypass and DoS issues in CE/EE; admins should align to the latest 18.8.x patch train and review self-managed exposure.

Why this matters: Source-control and DevOps platforms hold tokens, runners, and release pipelines. Auth gaps translate to supply-chain risk.

πŸ› οΈ Pattern & TTP Summary πŸ› οΈ
(SharePoint/edge β†’ extortion)

Stage

Vector / System

What we’re seeing

Initial access

UC/web management planes & outdated KEV assets

Cisco UC zero-day and KEV-listed flaws enable fast footholds on externally reachable services.

Privilege & persistence

Infra managers & CI/CD

OneView and GitLab admin planes provide high-impact lateral options and durable creds/tokens.

Impact

Service disruption & data exfil

Voice/call outages, policy tamper, and token theft are driving spread into SaaS and core app

Quick question about newsletter ads

We’re running a super short survey to see if our newsletter ads are being noticed. It takes about 20 seconds and there's just a few easy questions.

Your feedback helps us make smarter, better ads.

βœ… Fail-Safe Checklist (before COB) βœ…

πŸ”„ Patch & Hardening

  • Cisco UC (CVE-2026-20045): Apply the version-specific fixed trains from the Cisco advisory, remove public admin exposure, enforce MFA/RBAC, and forward admin logs to SIEM.

  • KEV items (Jan 21–22): Map affected assets and set time-boxed remediation with evidence (versions/hashes/screenshots). Track exceptions with interim compensating controls.

  • HPE OneView: Patch to latest hotfix, isolate management networks, restrict API, rotate stored creds/certs, and review enclosure profile diffs.

  • GitLab: Upgrade to the latest CE/EE patch; gate admin/API to VPN/JIT lists; rotate runner tokens and personal access tokens.

πŸ§‘β€πŸ’» People & Monitoring

  • UC/Voice: Alert on new admin users, config exports, or service restarts outside change windows; watch for odd TFTP/HTTP pulls from UC nodes.

  • KEV coverage: Continuous checks that assets matching new KEV entries are patched or isolated; flag variances daily.

  • Infra managers: Detect mass profile changes, firmware pushes, or credential vault access from rare ASNs.

  • GitLab: Watch for unusual PAT creation, runner registrations, and SSO anomalies; review webhook explosions post-upgrade.

πŸ“‹ Process & Validation

  • Change freeze on UC and infra-manager control planes unless CISO-approved.

  • Tabletop (30 min): β€œUC zero-day β†’ token theft β†’ OneView pivot β†’ policy tamper.”

🀝 Partners & Assurance

  • Network/voice MSPs: attest to Cisco UC patch levels and confirm centralized logging.

  • Platform teams: provide KEV remediation evidence for Jan 21–22 adds; report any exceptions.

  • Infra/DevOps: deliver OneView and GitLab version attestations and RBAC reviews.

πŸ•΅οΈ Detection Opportunities πŸ•΅οΈ
  1. UC exploit trail: Web-UI file writes, unexpected service restarts, or config exports followed by new admin sessions; correlate with rare ASN logins.

  2. KEV drift: Assets with KEV-listed versions seen on the network after policy deadlines; page owners automatically.

  3. OneView takeover: API calls for enclosure profile edits/firmware outside CAB windows; sudden east-west from management VLANs.

  4. GitLab abuse: Spikes in PAT creation, runner tokens, or protected branch rule changes; anomalous SSO/OAuth grants.

πŸ“ˆ Risk Outlook πŸ“ˆ

Overall: High for Cisco UC exploitation and KEV-listed asset targeting; Medium-High for infrastructure manager compromise (OneView) and CI/CD abuse where exposure or legacy tokens persist.

πŸ“Œ Key Leadership Takeaways πŸ“Œ

KEV means β€œalready weaponized.” Close with proof, not intent.

Voice/UC is an identity-adjacent crown jewel. Patch Cisco UC now and remove public paths.

Infra managers multiply blast radius. Isolate, patch, and attest OneView and DevOps planes.

πŸ“‹ Immediate Leadership Checklist πŸ“‹

πŸ”„ Verify: Cisco UC versions patched to the fixed trains; admin exposure gated; logs centralized.

πŸ“Š Validate: Jan 21–22 KEV items mapped and remediated or isolated with documented compensations.

πŸ’Ό Confirm: OneView and GitLab patch status, RBAC reviews, and credential/token rotations complete.

πŸ”Ή Double-check: Monday tabletop β€” β€œUC zero-day β†’ infra pivot β†’ exfil.”

Final Insight: A quiet weekend hinges on three receipts: Cisco UC patched, KEV entries closed, and infra managers fenced off.

Everything else can wait; attackers won’t.

Auto file tags and variable recognition

Voice-first code workflows with auto file tagging and variable recognition. Dictate reproductions and prompts and paste clean, code-friendly text into GitHub, Jira, or your editor. Try Wispr Flow for engineers.