The Cybersecurity and Infrastructure Security Agency said exploitations could let hackers gain persistent system access and control of an enterprise network.