(TLP CLEAR) Weekly Vulnerabilities to Prioritize – January 22, 2026
Created: Wednesday, January 21, 2026 - 12:17
Categories: Cybersecurity, Security Preparedness
The below vulnerabilities have been identified by WaterISAC analysts as important for water and wastewater utilities to prioritize in their vulnerability management efforts. WaterISAC shares critical vulnerabilities that affect widely used products and may be under active exploitation. WaterISAC draws additional awareness in alerts and advisories when vulnerabilities are confirmed to be impacting, or have a high likelihood of impacting, water and wastewater utilities. Members are encouraged to regularly review these vulnerabilities, many of which are often included in CISA’s Known Exploited Vulnerabilities (KEV) Catalog.
Fortinet FortiSIEM OS Command Injection Vulnerability
CVSS v3.1: 9.4
CVE: CVE-2025-64155
Description: An improper neutralization of special elements used in an os command (‘os command injection’) vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.
Source: https://fortiguard.fortinet.com/psirt/FG-IR-25-772
Unauthenticated Privilege Escalation in ServiceNow AI Platform
CVSS v4.0: 9.3
CVE: CVE-2025-12420
Description: A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.
Source: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2587329
GitLab 2FA Bypass and Denial of Service Vulnerabilities
CVSS 3.1: 9.8
CVEs: CVE-2026-0723, CVE-2025-13927, CVE-2025-13928, CVE-2025-13335, CVE-2026-1102
Description: GitLab has patched a high-severity two-factor authentication bypass vulnerability, and additional vulnerabilities that could allow an unauthenticated attacker to trigger denial-of-service conditions, impacting community and enterprise editions of its software development platform.
Source: https://about.gitlab.com/releases/2026/01/21/patch-release-gitlab-18-8-2-released/
Additional Reading:
