March 15, 2026 3m read

Cato CTRL™ Threat Brief: Middle East Escalation and Summary of Notable Iranian-Linked CVEs

Dr. Guy Waizel
Dr. Guy Waizel

Table of Contents

Wondering where to begin your SASE journey?

We've got you covered!
Listen to post:
Getting your Trinity Audio player ready...

Executive Summary

On February 28, 2026, Israel and the United States launched a joint attack against Iran. In retaliation, Iran launched its own attacks against Israel and US-allied countries and bases in the region. The escalation in the Middle East is ongoing.

Cato CTRL is currently monitoring the threat landscape in the region. It is characterized by elevated risk from nation-state actors, affiliated groups, and hacktivists, with likely activity spanning espionage, opportunistic intrusion, destructive operations, and exploitation of exposed internet-facing systems.

As part of that monitoring, Cato CTRL continues to assess relevant threat intelligence, track changes in threat actor tradecraft, and review exposure patterns that may become more relevant during periods of regional instability.

2026 Cato CTRL™ Threat Report | Download the report

Technical Overview

CISA has previously documented Iranian-linked campaigns targeting internet-facing infrastructure, particularly technologies used for remote access, VPN, and perimeter defense.

Observed exploitation has included the following vulnerabilities:

CISA has also linked Iranian government-sponsored activity to the exploitation of other perimeter and access infrastructure vulnerabilities, including:

  • Fortinet FortiOS: CVE-2018-13379, CVE-2020-12812, CVE-2019-5591 (AA21-321A)
  • Microsoft Netlogon and Microsoft Exchange associated with MuddyWater-linked activity: CVE-2020-0688, CVE-2020-1472 (AA22-055A)
  • Pulse Secure and F5 BIG-IP: CVE-2019-11510, CVE-2019-11539, CVE-2020-5902 (AA20-259A)
  • VMware Horizon: CVE-2021-44228 exploitation (AA22-320A)

Beyond the vulnerabilities highlighted in CISA advisories, additional public reporting from threat intelligence teams has associated Iranian threat actors with a broader set of vulnerabilities across enterprise applications, email infrastructure, identity systems, and user-facing intrusion paths.

The examples below are representative of publicly reported activity and are not intended to be a complete inventory of all related CVEs.

Examples include:

  • Microsoft linked Peach Sandstorm to CVE-2022-26134 (Atlassian Confluence) and CVE-2022-47966 (Zoho ManageEngine ServiceDesk Plus)
  • Mandiant documented APT34 exploitation of CVE-2017-11882 (Microsoft Office’s Equation Editor)
  • Palo Alto Networks Unit 42 associated OilRig activity with CVE-2017-0199 (Microsoft Office and WordPad)

Conclusion

From a defensive perspective, the common pattern across these CISA advisories and broader public reporting is the repeated targeting of exposed internet-facing systems, especially perimeter infrastructure, remote access technologies, and other externally reachable enterprise services. That pattern reinforces an architectural lesson: when access, inspection, and policy enforcement are distributed across multiple separate appliances and applications, organizations often inherit more exposure points and more operational overhead to manage them consistently. A SASE platform can help reduce that complexity by centralizing policy enforcement and security inspection across users, sites, and applications.

Threat modeling, breach simulations, and assessing threat actor tactics, techniques, and procedures (TTPs) from MITRE is also highly recommended.

Protections

Cato Networks addresses this threat pattern through Cato IPS and through regularly published Rapid CVE Mitigation updates for critical vulnerabilities, including virtual patching where applicable. These protections are designed to help reduce exposure to exploitation attempts targeting internet-facing infrastructure. Where relevant traffic is inspected by the platform, these controls can help detect and block exploitation activity associated with critical threats.

Related Topics

Wondering where to begin your SASE journey?

We've got you covered!
Dr. Guy Waizel

Dr. Guy Waizel

Tech Evangelist

Dr. Guy Waizel is a Tech Evangelist at Cato Networks and a member of Cato CTRL. As part of his role, Guy collaborates closely with Cato's researchers, developers, and tech teams to bridge and evangelize tech by researching, writing, presenting, and sharing key insights, innovations, and solutions with the broader tech and cybersecurity community. Prior to joining Cato in 2025, Guy led and evangelized security efforts at Commvault, advising CISOs and CIOs on the company’s entire security portfolio. Guy also worked at TrapX Security (acquired by Commvault) in various hands-on and leadership roles, including support, incident response, forensic investigations, and product development. Guy has more than 25 years of experience spanning across cybersecurity, IT, and AI, and has held key roles at tech startups acquired by Philips, Stanley Healthcare, and Verint. Guy holds a PhD with magna cum laude honors from Alexandru Ioan Cuza University, his research thesis focused on the intersection of marketing strategies, cloud adoption, cybersecurity, and AI; an MBA from Netanya Academic College; a B.Sc. in technology management from Holon Institute of Technology; and multiple cybersecurity certifications.

Read More