INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 1h Global supply_chain Software Development and DevOps CRITICAL 2h Global supply_chain Software Development and Technology CRITICAL 2h Global apt Multiple sectors HIGH 4h Global general Digital Content & Intellectual Property MEDIUM 4h Global malware Technology and Software Development CRITICAL 5h Global ddos Technology and Social Media HIGH 5h Global phishing Financial Services, Telecommunications, General Public HIGH 5h Global supply_chain Software Development and Technology CRITICAL 7h Global apt Multiple sectors / Critical Infrastructure CRITICAL 7h
Vulnerabilities

CVE-2026-23514

High
Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kitew
CWE-282 — Weakness Type
Published: Mar 25, 2026  ·  Modified: Mar 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive a patch.

🤖 AI Executive Summary

Kiteworks Core versions 9.2.0 and 9.2.1 contain an access control vulnerability (CWE-282) allowing authenticated users to access unauthorized content, with a CVSS score of 8.8. This vulnerability poses significant risk to organizations using affected versions for secure data exchange and collaboration. While no public exploit is currently available, the high severity rating and access control nature of the flaw warrant immediate attention. Organizations must upgrade to version 9.2.2 or later to remediate this vulnerability.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 16:39
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations in financial services (banking sector under SAMA oversight), government agencies (NCA, GOSI, MOH), and critical infrastructure operators (ARAMCO, SEC) that utilize Kiteworks for secure document exchange and collaboration are at significant risk. The vulnerability allows authenticated insiders or compromised accounts to access sensitive financial records, government communications, and proprietary energy sector data. Healthcare organizations using Kiteworks for patient data exchange face HIPAA-equivalent compliance violations. Telecom operators (STC, Mobily) managing customer data through Kiteworks could experience data breaches affecting millions of subscribers.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare and Medical Services Energy and Utilities Telecommunications Insurance Legal Services Manufacturing
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Kiteworks Core deployments in your environment and document which versions are running (9.2.0 or 9.2.1 are vulnerable)
2. Restrict access to Kiteworks to essential personnel only until patching is complete
3. Review and audit recent access logs for unauthorized content access patterns
4. Implement enhanced monitoring on Kiteworks user activities

PATCHING GUIDANCE:
1. Upgrade Kiteworks Core to version 9.2.2 or later immediately
2. Test the upgrade in a non-production environment first
3. Schedule maintenance window with minimal business impact
4. Verify patch application and test access control functionality post-upgrade

COMPENSATING CONTROLS (if immediate patching is not possible):
1. Implement network segmentation to limit Kiteworks access to trusted networks only
2. Enable multi-factor authentication (MFA) for all Kiteworks users
3. Implement role-based access control (RBAC) with principle of least privilege
4. Deploy data loss prevention (DLP) tools to monitor Kiteworks data flows
5. Increase audit logging verbosity for all Kiteworks access events

DETECTION RULES:
1. Monitor for users accessing content outside their assigned folders/projects
2. Alert on bulk downloads or unusual data export patterns
3. Track failed access attempts followed by successful access to different content
4. Monitor for privilege escalation attempts within Kiteworks
5. Log all administrative actions and configuration changes
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. حدد جميع نشرات Kiteworks Core في بيئتك وتوثيق الإصدارات التي تعمل (9.2.0 و 9.2.1 معرضة للخطر)
2. قيد الوصول إلى Kiteworks للموظفين الأساسيين فقط حتى اكتمال التصحيح
3. راجع وتدقيق سجلات الوصول الأخيرة للكشف عن أنماط الوصول غير المصرح به للمحتوى
4. تنفيذ مراقبة محسنة لأنشطة مستخدمي Kiteworks

إرشادات التصحيح:
1. ترقية Kiteworks Core إلى الإصدار 9.2.2 أو أحدث فوراً
2. اختبر الترقية في بيئة غير إنتاجية أولاً
3. جدول نافذة الصيانة بأقل تأثير على الأعمال
4. تحقق من تطبيق التصحيح واختبر وظائف التحكم بالوصول بعد الترقية

الضوابط البديلة (إذا لم يكن التصحيح الفوري ممكناً):
1. تنفيذ تقسيم الشبكة لتقييد وصول Kiteworks إلى الشبكات الموثوقة فقط
2. تفعيل المصادقة متعددة العوامل (MFA) لجميع مستخدمي Kiteworks
3. تنفيذ التحكم بالوصول القائم على الأدوار (RBAC) مع مبدأ أقل امتياز
4. نشر أدوات منع فقدان البيانات (DLP) لمراقبة تدفقات بيانات Kiteworks
5. زيادة تفاصيل تسجيل التدقيق لجميع أحداث وصول Kiteworks

قواعد الكشف:
1. مراقبة المستخدمين الذين يصلون إلى محتوى خارج مجلداتهم/مشاريعهم المعينة
2. تنبيهات التنزيلات الضخمة أو أنماط تصدير البيانات غير المعتادة
3. تتبع محاولات الوصول الفاشلة متبوعة بالوصول الناجح إلى محتوى مختلف
4. مراقبة محاولات تصعيد الامتيازات داخل Kiteworks
5. تسجيل جميع الإجراءات الإدارية والتغييرات في الإعدادات
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.9.1.1 - Access control policy and procedures ECC 2024 A.9.2.1 - User registration and access rights management ECC 2024 A.9.2.5 - Access rights review ECC 2024 A.9.4.3 - Password management ECC 2024 A.12.4.1 - Event logging
🔵 SAMA CSF
SAMA CSF ID.AC-1 - Access Control Policy SAMA CSF ID.AC-2 - Physical and Logical Access Controls SAMA CSF PR.AC-1 - Identities and Credentials SAMA CSF PR.AC-3 - Access Enforcement SAMA CSF DE.AE-1 - Audit and Accountability
🟡 ISO 27001:2022
ISO 27001:2022 A.5.3 - Segregation of duties ISO 27001:2022 A.8.2 - User access management ISO 27001:2022 A.8.3 - User responsibilities ISO 27001:2022 A.9.2 - User access provisioning ISO 27001:2022 A.9.4 - Access rights review
🟣 PCI DSS v4.0
PCI DSS 7.1 - Limit access to system components by business need to know PCI DSS 7.2 - Establish an access control system PCI DSS 8.1 - Assign unique ID to each person with computer access PCI DSS 10.2 - Implement automated audit trails
📦 Affected Products / CPE 2 entries
accellion:kiteworks:9.2.0
accellion:kiteworks:9.2.1
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-282
Exploit No
Patch ✗ No
Published 2026-03-25
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-282
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.