VULNERABILITY ๐ด 1รKEV
Specific technical details for CVE-2026-5281, including the vulnerability class and attack vector, are not available in the provided intelligence. The vulnerability carries a CVSS base score of 7.5 (High). Its inclusion in the CISA KEV catalog is the primary indicator of risk, confirming it is being used as an ingress point by threat actors in active campaigns. The intelligence cluster also references other critical Microsoft vulnerabilities, such as CVE-2026-4370 (CVSS 10.0), but CVE-2026-5281 is the only one with confirmed evidence of exploitation. The lack of public technical details, combined with the 'ZERO-DAY RACE' designation, suggests exploitation may have occurred before a patch was available, placing defenders in a reactive posture.
CVE-2026-5281 represents a clear and present danger that requires immediate attention. The most critical data point is its status on the CISA KEV catalog, which serves as definitive evidence of active exploitation. This overrides the relatively low EPSS score (3.03%), which would otherwise predict a low likelihood of exploitation. The 'ZERO-DAY RACE' label, with KEV addition just two days prior to this report, indicates that defenders have a very short window to respond before widespread exploitation occurs. The low vendor risk score (0.23) is inconsistent with the observed threat activity and should be disregarded. Prioritization must be based on the KEV status alone.