<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Mon, 04 May 2026 08:46:25 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/rss.xml" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 05/01/2026]]></title>
      <description><![CDATA[<h2>MCP server</h2><p>This release our very own <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> finished implementing the Metasploit MCP Server (msfmcpd), bringing Model Context Protocol support to Metasploit Framework. MCP lets AI applications like Claude, Cursor, or your own custom agents query Metasploit data. Think of it as a middleware layer that exposes 8 standardized tools for searching modules and pulling reconnaissance data, all built on the official <a href="https://github.com/modelcontextprotocol/ruby-sdk/">Ruby MCP SDK</a>.</p><p>This first iteration is read-only, covering modules, hosts, services, vulnerabilities, and more. Tools for module execution, session interaction, and database modifications are on the roadmap for a future release. Full details are available in the <a href="https://cdelafuente-r7.github.io/metasploit-framework/docs/using-metasploit/other/how-to-use-metasploit-mcp-server.html">documentation</a>.</p><h2>Copy Fail</h2><p>Earlier this week, details of a new and high profile Linux LPE were released alongside a public PoC. The bug, nicknamed <a href="https://copy.fail/">Copy Fail</a> and identified by <a href="https://attackerkb.com/search?q=CVE-2026-31431&amp;referrer=blog">CVE-2026-31431</a>, is a logic flaw in the cryptographic APIs exposed by the Linux Kernel. Metasploit has shipped a local exploit this week to leverage the flaw on AMD64 and AARCH64 targets with additional architectures planned for future releases. The exploit, which replaces the ‘su’ binary in the page cache with a small ELF file, allows users to specify command payloads for execution and will automatically determine the appropriate target architecture.</p><h2>New module content (3)</h2><h3>Microsoft Windows HTTP to LDAP Relay</h3><p>Author: jheysel-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21323">#21323</a> contributed by <a href="https://github.com/jheysel-r7">jheysel-r7</a></p><p>Path: server/relay/http_to_ldap</p><p>Description: This adds a new NTLM relay module that relays from HTTP to LDAP. On success, an authenticated LDAP session is opened which allows the operator to interact with the LDAP service in the context of the relayed identity.</p><h3>Copy Fail AF_ALG + authencesn Page-Cache Write</h3><p>Authors: Diego Ledda, Spencer McIntyre, Xint Code, and rootsecdev</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21395">#21395</a> contributed by <a href="https://github.com/zeroSteiner">zeroSteiner</a></p><p>Path: linux/local/cve_2026_31431_copy_fail</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-31431&amp;referrer=blog">CVE-2026-31431</a></p><p>Description: Adds a module for CVE-2026-31431 (The Copy Fail LPE for Linux), a local privilege escalation affecting almost every Linux Kernel since 2017.</p><h3>Linux Execute Command</h3><p>Author: Spencer McIntyre</p><p>Type: Payload (Single)</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21395">#21395</a> contributed by <a href="https://github.com/zeroSteiner">zeroSteiner</a></p><p>Path: linux/aarch64/exec</p><p>Description: Adds a module for CVE-2026-31431 (The Copy Fail LPE for Linux), a local privilege escalation affecting almost every Linux Kernel since 2017.</p><p></p><h2>Enhancements and features (5)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21315">#21315</a> from <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> - This adds a read-only MCP server for Metasploit capable of retrieving information from the loaded modules and database.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21352">#21352</a>, <a href="https://github.com/rapid7/metasploit-framework/pull/21353">#21353</a>, <a href="https://github.com/rapid7/metasploit-framework/pull/21355">#21355</a>, <a href="https://github.com/rapid7/metasploit-framework/pull/21359">#21359</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Improves multiple module check code messages and statuses.</li></ul><h2>Bugs fixed (0)</h2><p>None</p><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-24T18%3A36%3A28%2B01%3A00..2026-04-30T22%3A30%3A05Z%22">Pull Requests 6.4.130...6.4.131</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.130...6.4.131">Full diff 6.4.130...6.4.131</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-01-2026</link>
      <guid isPermaLink="false">bltcf289d0bd2b6705a</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Christopher Granleese]]></dc:creator>
      <pubDate>Fri, 01 May 2026 20:22:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Five Things we Took Away from Gartner SRM Sydney 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>At this year's Gartner Security and Risk Management Summit in Sydney, Rapid7 CISO Brian Castagna joined industry CISO Nigel Hedges for a fireside chat on the decisions security leaders are actually making right now. They discussed the real decisions being made right now about budgets, burnout, AI, and perspective on consolidation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The conversation reinforced what we see across many organizations: SecOps is very much focused on protecting business resilience, enabling confident decisions by senior security leaders, and building programs that scale across people, platforms, and emerging technology. </span><span style='color:rgb(68, 71, 70);font-size: undefined;'>Let's now take a look at some of the main highlights from this year's Summit.</span></p><h2><span style='font-size: undefined;'>The business case for SecOps has shifted and boards are listening</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The ‘</span><span style='font-size: undefined;'><em>invest in security or get breached’</em></span><span style='font-size: undefined;'> pitch has run its course. Boards have heard it too many times; plus, it frames security as a cost center that only proves its value when something goes wrong.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We’re seeing it being replaced by a resilience narrative. In most incidents, the biggest business impact is operational disruption. Hours or days of downtime create immediate revenue loss, reputational damage, and perhaps worse still for some, regulatory exposure. CISOs who can connect their programs to that reality – translating incident data into business availability and financial risk – find it significantly easier to justify spend and shape investment decisions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That shift in dynamic changes what gets measured and prioritized as well as how security leaders communicate upward to the board. Threat intelligence and kill chains still matter inside the SOC, but the ability to translate that to a clear risk narrative is fast becoming a leadership requirement in its own right.</span></p><h2><span style='font-size: undefined;'>Platform consolidation is growing, but it's not binary</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The platform-vs-best-of-breed debate was notably pragmatic. The real question is how to strike the right balance: Consolidate where it improves efficiency and visibility, retain point solutions where they materially reduce a specific risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>On the ground, budget pressure has accelerated this. Fewer vendors, more integrated telemetry, and clearer operational ownership help make spend more defensible. The discussion framed consolidation through the lens of ‘</span><span style='font-size: undefined;'><em>control planes’</em></span><span style='font-size: undefined;'> (endpoint, gateway, network), with shared telemetry as the connective layer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A real-world example grounded the conversation: Build a global security program for a 5,000-person organization across 40 countries on a $3 million budget, using a selective mix of MDR, PAM, EPM, and targeted point solutions only where necessary. Throughout, the operating principle was simple in that every security investment needs to answer one question: What risk does this reduce, and importantly, what business outcome does it protect?</span></p><h2><span style='font-size: undefined;'>People remain the most difficult element of SecOps</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Technology and process can be engineered, but people? They’re much harder. That was one of the most practical observations from the session, and it resonated with every security leader in the room.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The challenge goes beyond hiring technical talent to ensure organizations are building teams with the right mix of communication skills, cognitive diversity, motivation, and endurance. A common gap seen in the SOC is that many teams are strong technically but few can articulate risk effectively to executives. That matters because the value of SecOps increasingly depends on how well teams connect activity to impact.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, burnout remains a structural issue. When experienced analysts leave, institutional knowledge leaves with them. And no tool can replace that. For leaders, this reinforces the point that people strategy is core to the overall security strategy.</span></p><h2><span style='font-size: undefined;'>AI in SecOps is getting very real, and very practical</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>After a long hype cycle, the AI conversation is now far more grounded. The most credible use cases in SecOps are about helping teams manage volume, reduce noise, and move faster with better context.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The examples discussed in the session were telling: alert-assisted triage, natural-language log querying, incident summarisation, first-draft executive communications, and eventually more automated investigation workflows. The framing that landed best was AI as a ‘</span><span style='font-size: undefined;'><em>sidearm partner’</em></span><span style='font-size: undefined;'>; a force multiplier for experienced practitioners, rather than a substitute for judgment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That distinction matters as human judgment is essential. But AI is becoming increasingly valuable for understaffed teams trying to scale operations and preserve the institutional knowledge that walks out the door when analysts move on.</span></p><h2><span style='font-size: undefined;'>Governing agentic AI begins with foundations you should already have</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>As the discussion turned to agentic AI, the focus centred on how more autonomous AI systems do introduce new governance questions, but many of the relevant controls already exist within mature security programs. Segmentation, least privilege, access management, and strong architectural boundaries remain the core defenses.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>One analogy stuck: Just as graphite rods slow a nuclear chain reaction, controls like network segmentation and access boundaries can contain and constrain agentic behavior. The organizations best positioned for AI governance are often the ones that have already invested in zero trust principles and sound identity controls.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That reframes the conversation. AI governance isn’t a separate discipline,  it’s the extension of existing security foundations into how AI systems behave, access data, and operate within defined boundaries.</span></p><h2><span style='font-size: undefined;'>What this means for the road ahead</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>If there was a unifying message, it was that the modern SecOps mandate is bigger than prevention. The industry has, to some extent, over-rotated on stopping threats and under-invested in resilience. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Security leaders require programs that communicate risk in business terms, make smart technology trade-offs, support their people, and adopt AI in ways that are practical and governable. The organizations that get this right will be the ones building strong foundations and using the right mix of platform, process, and intelligence to move faster and more confidently. </span><br/><span style='font-size: undefined;'>Rapid7 is committed to being a partner to organizations looking to gain that confidence. Our </span><a href="/services/managed-detection-and-response-mdr" target="_self"><span style='font-size: undefined;'>exposure-informed MDR service</span></a><span style='font-size: undefined;'> empowers teams to adopt a more preemptive security posture by rapidly identifying high-impact exposures that could be imminent breach targets. Teams can also leverage expanded capabilities in data security posture management (DSPM) and compliance to help fortify assessment, prioritization, and response capabilities so they can further preempt attacks across the modern attack surface.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-5-things-gartner-srm-sydney-2026</link>
      <guid isPermaLink="false">blt71ca5e4ec0fd2ade</guid>
      <category><![CDATA[Events]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 29 Apr 2026 23:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2026-41940: cPanel & WHM Authentication Bypass]]></title>
      <description><![CDATA[<h2><span style='color:rgb(67, 67, 67);'>Overview</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>On April 28, 2026, cPanel issued a security update to fix a critical vulnerability affecting the </span><a href="https://www.cpanel.net/products/cpanel-whm-features/" target="_blank"><span style='font-size: undefined;'>cPanel & WHM</span></a><span style='font-size: undefined;'> and </span><a href="https://wpsquared.com/" target="_blank"><span style='font-size: undefined;'>WP Squared</span></a><span style='font-size: undefined;'> products. In the cPanel release notes, the bug was </span><a href="https://docs.cpanel.net/changelogs/136-change-log/#13605" target="_blank"><span style='font-size: undefined;'>described</span></a><span style='font-size: undefined;'> as "an issue with session loading and saving." </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-41940" target="_blank"><span style='font-size: undefined;'>CVE-2026-41940</span></a><span style='font-size: undefined;'>, the identifier subsequently </span><a href="https://www.vulncheck.com/advisories/cpanel-and-whm-authentication-bypass-via-login-flow" target="_blank"><span style='font-size: undefined;'>assigned</span></a><span style='font-size: undefined;'> on April 29, 2026, has a CVSS score of </span><a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" target="_blank"><span style='font-size: undefined;'>9.8</span></a><span style='font-size: undefined;'> and allows unauthenticated remote attackers to bypass authentication and gain unauthorized administrative access to the affected systems. First-party </span><a href="https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026" target="_blank"><span style='font-size: undefined;'>cPanel & WHM</span></a><span style='font-size: undefined;'> and </span><a href="https://docs.wpsquared.com/changelogs/versions/changelog/#13617" target="_blank"><span style='font-size: undefined;'>WP Squared</span></a><span style='font-size: undefined;'> vendor advisories are available.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM is web hosting control panel software used to manage websites and servers. WHM provides root-level administration, while cPanel acts as the user-facing interface. Successful exploitation of CVE-2026-41940 grants an attacker control over the cPanel host system, its configurations and databases, and websites it manages. A naive Shodan query for potential targets </span><a href="https://www.shodan.io/search?query=http.favicon.hash%3A-696182543"><span style='font-size: undefined;'>returns</span></a><span style='font-size: undefined;'> approximately 1.5 million cPanel instances exposed to the internet that may be vulnerable.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A managed cPanel host, KnownHost, stated that CVE-2026-41940 is actively being </span><a href="https://www.knownhost.com/forums/threads/cpanel-zero-day-exploit-network-wide-protections-in-place-for-cpanel-and-whm-logins-ports.6599/" target="_blank"><span style='font-size: undefined;'>exploited in the wild</span></a><span style='font-size: undefined;'>, with speculation of targeted zero-day </span><a href="https://www.reddit.com/r/cpanel/comments/1syyajp/comment/oiz12pp/?utm_source=share&amp;utm_medium=web3x&amp;utm_name=web3xcss&amp;utm_term=1&amp;utm_content=share_button" target="_blank"><span style='font-size: undefined;'>exploitation happening</span></a><span style='font-size: undefined;'> as early as February 23, 2026, prior to the vulnerability’s public disclosure. Security firm watchTowr has published a</span><a href="https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/" target="_blank"><span style='font-size: undefined;'> technical analysis</span></a><span style='font-size: undefined;'> and proof-of-concept exploit for CVE-2026-41940. As such, widespread exploitation in the wild is expected to be imminent.</span></p><h2><span style='color:rgb(67, 67, 67);'>Technical overview</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Systems exposing the affected web service software are vulnerable by default.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As of April 29, 2026, a technical analysis and proof-of-concept exploit have been </span><a href="https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/" target="_blank"><span style='font-size: undefined;'>published</span></a><span style='font-size: undefined;'> by security firm watchTowr. CVE-2026-41940 is an authentication bypass caused by a Carriage Return Line Feed </span><a href="https://cwe.mitre.org/data/definitions/93.html" target="_blank"><span style='font-size: undefined;'>(CRLF) injection</span></a><span style='font-size: undefined;'> in the login and session loading processes of cPanel & WHM.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Before authentication occurs, `cpsrvd` (the cPanel service daemon) writes a new session file to the disk. The vulnerability allows an attacker to manipulate the `whostmgrsession` cookie by omitting an expected segment of the cookie value, avoiding the encryption process typically applied to an attacker-provided value. Attackers can inject raw `\r\n` characters via a malicious basic authorization header, and the system subsequently writes the session file without sanitizing the data. As a result, the attacker can insert arbitrary properties, such as `user=root`, into their session file. After triggering a reload of the session from the file, the attacker establishes administrator-level access for their token.</span></p><h2><span style='color:rgb(67, 67, 67);'>Mitigation guidance</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations running on-premise instances of cPanel & WHM or WP Squared should prioritize upgrading to a fixed version on an emergency basis. Some hosting providers </span><a href="https://www.namecheap.com/status-updates/ongoing-critical-security-vulnerability-in-cpanel-april-28-2026/" target="_blank"><span style='font-size: undefined;'>have opted</span></a><span style='font-size: undefined;'> to temporarily institute workaround TCP port blocks for cPanel & WHM web services on ports 2083 and 2087. However, defenders are strongly advised to patch, rather than implement workarounds.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Affected Software:</strong></span></p><p><span style='font-size: undefined;'>The vendor states that all versions after </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.40</span></span><span style='font-size: undefined;'> are affected, prior to the following available fixed versions.</span></p><ul><li><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.86.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.86.0.41</strong></span></span></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.110.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.110.0.97</strong></span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.118.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.118.0.63</strong></span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.126.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.126.0.54</strong></span></span></p></li><li><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.130.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.130.0.19</strong></span></span></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.132.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.132.0.29</strong></span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.134.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.134.0.20</strong></span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>cPanel & WHM </span><span style='font-size: undefined;'><span data-type='inlineCode'>11.136.0</span></span><span style='font-size: undefined;'> versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>11.136.0.5</strong></span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>WP Squared versions prior to </span><span style='font-size: undefined;'><strong>fixed version </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>136.1.7</strong></span></span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Please read the </span><a href="https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026" target="_blank"><span style='font-size: undefined;'>vendor advisory</span></a><span style='font-size: undefined;'> for the latest guidance.</span></p><h2><span style='color:rgb(67, 67, 67);'>Exposure Command, InsightVM, and Nexpose</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Exposure Command, InsightVM, and Nexpose customers can assess exposure to CVE-2026-41940 with authenticated vulnerability checks available in the April 30, 2026 content release.</span></p><h2><span style='color:rgb(67, 67, 67);'>Updates</span></h2><ul><li><span style='font-size: undefined;'><strong>April 29, 2026:</strong></span><span style='font-size: undefined;'> Initial publication.</span></li><li><span style='font-size: undefined;'><strong>April 30, 2026:</strong></span><span style='font-size: undefined;'> Update mitigation guidance with additional fixed version numbers and change wording to reflect availability of vulnerability checks.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass</link>
      <guid isPermaLink="false">bltc7a4566b880fefdd</guid>
      <category><![CDATA[Emerging Threats]]></category>
      <category><![CDATA[Emergent Threat Response]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 29 Apr 2026 20:00:20 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Experts on Experts: The 2026 Threat Landscape is Moving Faster than Defenders Expect]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>This week on Experts on Experts, I’m joined by Christiaan Beek, Rapid7’s VP of Threat Analytics, to talk through what we’re seeing in the 2026 threat landscape and how it connects to recent research coming out of Rapid7 Labs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We start with the report, but quickly move into what’s already playing out in active campaigns. What stands out is not a change in attacker technique, but the pace. Weak credentials, missing MFA, exposed services, and unpatched systems still drive most intrusions. What has changed is how quickly those conditions are identified and exploited, and that shift is forcing security teams to rethink how they prioritize and respond.</span></p><h2>The window to act is disappearing</h2><p style="direction: ltr;"><span style='font-size: undefined;'>One of the clearest themes in the conversation is timing. The issue is no longer how many vulnerabilities exist, but how quickly they are being used. The gap between disclosure and exploitation has narrowed to a matter of days in many cases, which removes the buffer teams used to rely on.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, most intrusions still begin with familiar conditions. Identity and access remain consistent weaknesses, with missing MFA and exposed remote access continuing to provide reliable entry points. What has changed is how those weaknesses are used. Access is now packaged and sold through a broader ecosystem, which increases both the speed and scale of attacks.</span></p><h2 style="direction: ltr;">Access, persistence, and trusted systems</h2><p style="direction: ltr;"><span style='font-size: undefined;'>We also look at how attacker behaviour is evolving beyond initial access. In some environments, the goal is no longer immediate disruption but long-term presence. That changes how teams should think about detection, because finding activity is only the starting point. Understanding how long access has existed and what has already happened becomes just as important.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, attacks are concentrating inside systems organizations rely on every day. Identity platforms, cloud environments, and collaboration tools are all becoming key targets. The challenge is that activity in these systems often looks legitimate, which makes it harder to distinguish between normal behaviour and something that requires investigation.</span></p><h2 style="direction: ltr;">AI is accelerating what already works</h2><p style="direction: ltr;"><span style='font-size: undefined;'>AI is part of this shift, but not because it introduces entirely new attack paths. What it does is make existing techniques faster and easier to scale, particularly in areas like social engineering and reconnaissance. Attackers can generate and adapt campaigns quickly, while defenders are dealing with increasing volumes of data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That creates a simple but important shift. Security teams are not falling behind because they lack tools, but because the timing of attacks has changed and their processes have not kept up. The focus now is on understanding exposure earlier, prioritizing what matters, and preparing actions in advance.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Watch the full episode below to hear Christiaan’s perspective on how these trends are evolving and what they mean for security leaders heading into 2026.</span></p><p>⠀</p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-security-experts-2026-threat-landscape-moving-faster-than-defenders</link>
      <guid isPermaLink="false">blt835a05ec122033f0</guid>
      <category><![CDATA[Threat Intel]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Craig Adams]]></dc:creator>
      <pubDate>Wed, 29 Apr 2026 12:27:35 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf8317b2e5bfec732/68adbeaa4f9d3d04bd8228e9/experts-on-experts.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Get Motivated: What to Expect from Our Keynote at Rapid7's Global Cybersecurity Summit]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security teams prepare for incidents every day. Alerts are tuned, playbooks are built, and processes are tested. But when something actually happens, the challenge shifts. It becomes not just about making decisions under pressure, but how well that preparation has set teams up to make the right decisions when things heat up.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At this year’s </span><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-7&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Rapid7 Global Cybersecurity Summit</span></a><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><em>Persistence Under Pressure</em></span><span style='font-size: undefined;'> explores that shift directly. Former Special Forces operator Jason Fox draws on real-world experience where timing, clarity, and execution all have immediate consequences, and shows how that mindset applies to modern security operations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In our keynote talk </span><span style='font-size: undefined;'><em>Persistence Under Pressure</em></span><span style='font-size: undefined;'>, former Special Forces operator Jason Fox brings experience from environments where timing, clarity, and execution all have immediate consequences. His session looks at how that mindset translates into modern security operations, where teams are expected to act quickly, often without complete information.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The parallels are clear: Incidents do not unfold in controlled conditions. Signals compete for attention, priorities shift, and decisions need to be made in real time. What matters in those moments is not just having the right tools, but knowing how to stay focused and act with confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This session explores practical ideas that apply directly to security teams, from how preparation shapes response to how understanding the adversary influences decision-making, and why composure and clarity can make the difference when pressure builds.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It also reinforces a broader theme running throughout the summit. Preemptive security operations are not only about detecting threats earlier but about enabling better decisions across the entire lifecycle, from preparation through to response and recovery.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If you are looking to understand how security operations are evolving, this session offers a different but valuable perspective. One that connects strategy and technology back to the people responsible for making it work.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Join us May 12–13 and hear how these principles apply in practice. </span><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-7&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Register now.</span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-rapid7-global-cybersecurity-summit-keynote-rundown</link>
      <guid isPermaLink="false">blt4f488486a2f515c2</guid>
      <category><![CDATA[Events]]></category><dc:creator><![CDATA[Emma Burdett]]></dc:creator>
      <pubDate>Tue, 28 Apr 2026 13:42:21 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7652fa46396969f5/69a59e6cfbdb4d75ad7755a9/REQ-14706_-_1600x900px.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[MDR Selection is a Partnership Decision]]></title>
      <description><![CDATA[<p style="direction: ltr;"><a href=" https://www.rapid7.com/fundamentals/what-is-managed-detection-and-response-mdr/" target="_blank"><span style='font-size: undefined;'><em>Managed Detection and Response (MDR)</em></span></a><span style='font-size: undefined;'><em> is a cybersecurity service that combines human expertise and technology to detect, investigate, and respond to threats 24/7.</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>I write this as a Field CISO at Rapid7, but also as someone who has had to live with the operational reality of MDR on the customer side. I have seen what happens when a service is a black box, when technology and service drift apart, and when cost, retention, and accountability are misaligned. That experience shapes the view in this piece: MDR selection is not just about buying monitoring in isolation, but about choosing a partner that can help your team reduce risk and improve the way security operates over time.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When organisations evaluate MDR, they often start in the wrong place. The discussion begins with integration counts, dashboards, pricing tables, and increasingly bold claims about AI or dramatic reductions in alert volume. Those things all matter to a degree, but they are not the centre of the decision. The real question is whether you are choosing a provider that will work as a genuine partner, help you reduce risk over time, and strengthen the way your team operates when the environment becomes noisy, complex, or difficult to manage.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That matters because MDR is not a service that sits neatly off to one side of the security function. It becomes part of the operating model. It influences how visibility is created, how incidents are handled, how priorities are surfaced, and how much confidence a leadership team has in the people and processes around it. For that reason, I do not think MDR selection is primarily a tooling exercise. It is a partnership decision.</span></p><h2 style="direction: ltr;">What poor MDR looks like in practice</h2><p style="direction: ltr;"><span style='font-size: undefined;'>My own view on this has been shaped by more than one experience. In one case, our MSSP was part of a defence company that was later carved out into a separate business. The service was built around a legacy SIEM. They had plenty of interest elsewhere in automation and future-state capability, but the fundamentals were being missed. We could talk about what we wanted to automate, but not with enough confidence about the quality of the underlying visibility, the operational process around it, or how the service was supposed to mature over time.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In another case, the issue was an MSSP overlay wrapped around a well-known, high-cost log indexer. On paper, that should have been a strong foundation. In practice, the management layer around it was poor. There was a lack of expertise, no credible roadmap, and very little meaningful tuning. As the MSSP was also reselling the ingest, there was no obvious incentive to optimize data use in the customer’s favour. Ingest was capped because of cost, retention was limited to 90 days, and we were left with the uncomfortable combination of high spend, constrained visibility, and a service that did not appear to be improving in any meaningful way.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Those experiences shaped how I think about MDR because they exposed the same underlying problem. The technology was not absent, but the service model around it was weak. When the gap between the platform and the service becomes too wide, the customer ends up paying for capability in theory while carrying the operational risk in practice.</span></p><h2 style="direction: ltr;">Why the gap between platform and service matters</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This is where many MDR relationships start to fail. Even when the tooling is capable, the provider still has to connect platform, people, process, and commercial model into one coherent service. If that does not happen, the customer ends up living with support issues, awkward hand-offs, misaligned contracts, unclear accountability, and a constant sense that there are too many moving parts and not enough ownership.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is why I would start any MDR evaluation by looking at how the relationship is meant to work in practice. </span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Does the provider genuinely own the experience end to end, or are they effectively brokering one element through another?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Can they show how the programme will improve over the first year, not just how onboarding works in the first month?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Do they understand the rest of your security ecosystem and how to operate within it, or do they assume every answer involves expanding their footprint?</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Strong providers think holistically. They understand that the customer already has an environment to manage, existing tools to work with, and internal teams who need clarity rather than additional friction. They think in terms of operating model, monitoring, response, and continuous improvement over time, rather than treating the service as a thin wrapper around a platform. That is usually where the difference between coverage and real partnership becomes obvious.</span></p><h2 style="direction: ltr;">Proactive defense starts with the fundamentals</h2><p style="direction: ltr;"><span style='font-size: undefined;'>True partnership is defined by its ability to deliver proactive defense and continuous improvement. By this, I do not just mean threat hunting or faster triage. I mean exposure reduction in the broader sense. It is understanding attack paths, using intelligence well, tuning detections properly, improving visibility where it matters, and building a service rhythm that reduces the conditions attackers rely on.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That sounds obvious, but it is surprisingly easy for organisations to be distracted from those fundamentals. Low entry prices often mask a fundamentally constrained operating model, shifting risk and cost back to the customer. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sweeping promises about single digit alert volumes should be treated carefully, especially before a provider has properly understood the environment. The same is true of broad agentic AI claims. Automation can absolutely help, but it does not replace accountability, operational judgement, or the need for a provider to show how the service will improve over time.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For me, that last point is one of the clearest tests of whether the relationship is working. An MDR service should not be something you set and forget. A mature partnership should look better in month twelve than it did in month one. Visibility should improve. Tuning should improve. The roadmap should improve. Confidence in escalation and response should improve. If none of that is happening, it becomes very difficult to describe the relationship as a real partnership. At that point, you may simply have outsourced a queue.</span></p><h2 style="direction: ltr;">When displacement becomes the right answer</h2><p style="direction: ltr;"><span style='font-size: undefined;'>That is also how I think about displacement. An incumbent should not be displaced simply because another provider has a sharper demo or a more fashionable story. Displacement makes sense when the existing model has stopped improving, when the service feels static or opaque, when the team lacks the expertise to tune and evolve it properly, or when the commercial structure and delivery model are working against the customer rather than with them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If the relationship is held together by workarounds, if there is no meaningful roadmap, or if the customer is left carrying too much of the integration and governance burden themselves, the problem is usually structural rather than temporary. In that situation, the question is no longer whether the service can be tweaked around the edges. The question is whether the model is fit for purpose at all.</span></p><h2 style="direction: ltr;">Consolidation is only useful if it improves the model</h2><p style="direction: ltr;"><span style='font-size: undefined;'>That does not automatically mean consolidation is the answer. Consolidation can be valuable, but only when it improves the operating model rather than simply reducing the number of logos in the environment. In some cases, the right answer will be to build a broader relationship with a provider that has earned trust and shown it can deliver more. In others, the right answer will be better integration and a clearer division of responsibilities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What matters is whether the provider helps create a more coherent, scalable, and accountable way of operating. If consolidation leads to better hand-offs, stronger accountability, and a simpler way of reducing risk, it can be very valuable. If it does not, then consolidation is not the point. A better operating model is.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This broader view is also consistent with established security guidance. NIST CSF 2.0 frames cybersecurity as a risk management discipline across governance, protection, detection, response, and recovery [1]. NIST’s latest incident response guidance reinforces that response should be integrated into wider risk management and improved over time [2]. The NCSC makes a similar point in its guidance on building a SOC and on security monitoring, where tools, skills, and operating model all need to work together [3]. CISA’s exposure reduction guidance points in the same direction by focusing on reducing the conditions attackers rely on before incidents escalate [4].</span></p><h2 style="direction: ltr;">Questions worth asking any MDR provider</h2><p style="direction: ltr;"><span style='font-size: undefined;'>There are a few practical questions I would encourage any CISO, Security Director, or Security Operations Manager to ask, whether they are reviewing an incumbent or evaluating a new provider:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>How will the service improve over the first year and beyond?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Where do the hand-offs happen between your platform, your analysts, and my team?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>How do you work with the security and IT tools we already rely on?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>How predictable is the commercial model as coverage expands?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>What are you doing to reduce risk before the next incident, not just respond after it?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>If your commercial model benefits from more ingest, what incentive do you have to tune it down?</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Those questions reveal far more than a polished demo ever will.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ultimately, the organisations that get the most value from MDR tend to be the ones that treat it as part of a wider security partnership rather than a neatly outsourced function. They expect transparency, progress, and a provider that understands both the environment they have today and the operating model they are trying to build over time. That is the standard worth holding. If the provider is not improving the programme over time, you do not have a real partnership. And if consolidation does not lead to a better operating model, it is probably not worth doing in the first place.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Learn more about </span><a href="https://www.rapid7.com/services/managed-detection-and-response-mdr/"><span style='font-size: undefined;'>Rapid7's approach to preemptive MDR</span></a><span style='font-size: undefined;'>.</span></p><p>⠀</p><p style="direction: ltr;"><span style='color:rgb(33, 33, 33);font-size: undefined;'><em>Alan Simpson is Field CISO for the UK and Ireland at Rapid7, advising CISOs and senior leaders on cyber risk, resilience, and security strategy that supports business outcomes. Before joining Rapid7, he served as Global Security Operations Manager and Acting CISO at Keyloop, where he led security operations and wider information security initiatives. He has also held senior security leadership roles at Allianz and LV=, with experience across security operations, incident response, architecture, awareness, supplier assurance, and security testing.</em></span></p><p>⠀</p><p><em>[1] </em><a href="https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf" target="_blank"><span style='font-size: undefined;'><em>https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf</em></span></a><em></em></p><p><span style='font-size: undefined;'><em>[2] </em></span><a href=" https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf" target="_self"><span style='font-size: undefined;'><em>https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf</em></span></a><em></em></p><p><em>[3] </em><a href="https://www.ncsc.gov.uk/collection/building-a-security-operations-centre" target="_blank"><span style='font-size: undefined;'><em>https://www.ncsc.gov.uk/collection/building-a-security-operations-centre</em></span></a><em></em></p><p><span style='font-size: undefined;'><em>[4] </em></span><a href=" https://www.cisa.gov/resources-tools/resources/exposure-reduction" target="_blank"><span style='font-size: undefined;'><em>https://www.cisa.gov/resources-tools/resources/exposure-reduction</em></span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/dr-mdr-selection-partnership-decision</link>
      <guid isPermaLink="false">blt067c529962c6a487</guid>
      <category><![CDATA[Managed Detection and Response (MDR)]]></category>
      <category><![CDATA[MDR Must-Haves]]></category><dc:creator><![CDATA[Alan Simpson]]></dc:creator>
      <pubDate>Tue, 28 Apr 2026 08:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebc2810157aecfaf/68af2715c53b04810df94abb/blog-hero-generic-pixel.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 04/25/2026]]></title>
      <description><![CDATA[<h2>Check Method Visibility</h2><p>Metasploit has supported check methods for many years now. It’s not always desirable to jump straight into exploiting a vulnerability but instead to determine if the target is vulnerable. Metasploit tries to be very conservative with classifying a target as “vulnerable” unless the vulnerability is leveraged as part of the check method, reserving the “appears” status for version checks. The different check codes a module is capable of returning and the logic to select among them varies from exploit to exploit and is not always the easiest to understand. Aligning with the consistent feedback that Metasploit has received that module actions should be more transparent, <a href="https://github.com/adfoster-r7">adfoster-r7</a> has been adding reasoning information en masse to the check codes returned by a variety of exploits. This information will help users understand why a particular vulnerability status was determined, making troubleshooting efforts easier and increasing confidence in the results.</p><h2>Legacy SMB Improvements</h2><p>This week, community member <a href="https://github.com/g0tm1lk">g0tm1lk</a> made multiple improvements for legacy and non-Windows SMB targets. Version information is now more reliably extracted from targets running SMB 1, and a variety of minor bugs were fixed across multiple modules that would have affected users targeting systems the module was not intended to target as is often the case when the module is used to scan an entire network.</p><h2>New module content (4)</h2><h3>Camaleon CMS Directory Traversal CVE-2024-46987</h3><p>Authors: Goultarde, Peter Stockli, and bootstrapbool</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21122">#21122</a> contributed by <a href="https://github.com/bootstrapbool">bootstrapbool</a></p><p>Path: gather/camaleon_download_private_file</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2024-46987&amp;referrer=blog">CVE-2024-46987</a></p><p>Description: This adds an auxiliary module to exploit an arbitrary file vulnerability, CVE-2024-46987, on Camaleon CMS &gt;= 2.8.0 as well as 2.9.0.</p><h3>Langflow RCE</h3><p>Authors: Takahiro Yokoyama and weblover12</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21260">#21260</a> contributed by <a href="https://github.com/Takahiro-Yoko">Takahiro-Yoko</a></p><p>Path: multi/http/langflow_rce_cve_2026_27966</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-27966&amp;referrer=blog">CVE-2026-27966</a></p><p>Description: Adds exploit module for CVE-2026-27966, a prompt injection RCE vulnerability in Langflow &lt; 1.8.0. By creating and sending a specially-crafted flow containing python code, the LangChain will execute that code because LangChain's Read-Eval-Print Loop (REPL) is exposed by default and runs any Python code it is given.</p><h3>WebDAV PHP Upload</h3><p>Authors: g0tmi1k and theLightCosine <a href="mailto:theLightCosine@metasploit.com">theLightCosine@metasploit.com</a></p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21256">#21256</a> contributed by <a href="https://github.com/g0tmi1k">g0tmi1k</a></p><p>Path: multi/http/webdav_upload_php</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2012-10062&amp;referrer=blog">CVE-2012-10062</a></p><p>Description: Updates code and adds features: Linux support, check() method, and cleanup after exploit.</p><h3>Linux Chmod</h3><p>Author: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a></p><p>Type: Payload (Single)</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21238">#21238</a> contributed by <a href="https://github.com/bcoles">bcoles</a></p><p>Path: linux/loongarch64/chmod</p><p>Description: Adds a new linux/loongarch64/chmod payload to change the permissions of a specified file.</p><h2>Enhancements and features (11)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21019">#21019</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This adds support for phpMyAdmin v3.1.x to the phpMyAdmin Config File Code Injection module (CVE-2009-1285). This also adds a check method.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21230">#21230</a> from <a href="https://github.com/bcoles">bcoles</a> - Reduces the memory footprint of the module metadata cache in Metasploit.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21231">#21231</a> from <a href="https://github.com/bcoles">bcoles</a> - Improves the performance of the module metadata cache as well as bug fixes.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21232">#21232</a> from <a href="https://github.com/bcoles">bcoles</a> - Add a method to discover writable directories on Unix targets using the find command.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21256">#21256</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Updates code and adds features: Linux support, check() method, and cleanup after exploit.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21347">#21347</a></li></ul><h2>Bugs fixed (4)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21327">#21327</a> from <a href="https://github.com/tair-m">tair-m</a> - Fixes a crash when loading HTTP modules.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21341">#21341</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This fixes multiple issues related to various SMB modules when targeting Samba.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21344">#21344</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a bug when running the check method for scanner/http/elasticsearch_traversal against non-vulnerable targets.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21346">#21346</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a false positive that was present in auxiliary/scanner/couchdb/couchdb_enum.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-16T14%3A22%3A51%2B01%3A00..2026-04-23T14%3A54%3A17Z%22">Pull Requests 6.4.128...6.4.129</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.128...6.4.129">Full diff 6.4.128...6.4.129</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-25-2026</link>
      <guid isPermaLink="false">blt12964a24f30af456</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Fri, 24 Apr 2026 20:17:56 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[3 Reasons to Attend our Global Cybersecurity Summit if you’re Focused on AI, Threats, and CTEM]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security teams are dealing with a different kind of pressure now. It is not just the volume of alerts or the pace of attacks, but also the gap between what teams can see and what they can act on with confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That gap shows up in different ways. Threats move across identity and cloud in ways that are difficult to track, exposure data exists but often sits disconnected from response, and AI is being introduced into workflows without a clear role in decision-making.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This year’s </span><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-6&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Rapid7 Global Cybersecurity Summit</span></a><span style='font-size: undefined;'> brings those threads together as part of the same operational solution.</span></p><h2 style="direction: ltr;">1. You need a clearer view of how attacks actually unfold</h2><p style="direction: ltr;"><span style='font-size: undefined;'>A lot of detection strategies still assume attacks follow a clean path. In practice, they do not. They start in one place, move quickly, and often rely on small gaps rather than obvious failures.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sessions like </span><span style='font-size: undefined;'><em>The Reality of Running a SOC in 2026</em></span><span style='font-size: undefined;'> break this down in detail, looking at how attacks begin with things like identity misuse or cloud misconfiguration, then evolve as defenders try to keep up. That matters because it changes how detection should be designed. Coverage alone is not enough if teams do not have the context created by strong exposure management to interpret what they are seeing.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That same idea carries into </span><span style='font-size: undefined;'><em>Inside the Modern SOC</em></span><span style='font-size: undefined;'>, where a real investigation is followed from first alert to outcome. It is a useful reminder that detection is only part of the problem.Deciding how to respond, and doing it quickly, is the critical next step.</span></p><h2 style="direction: ltr;">2. Exposure only matters if it connects to action</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Most teams already have some form of exposure management in place. The challenge is making it useful. A long list of vulnerabilities does not help much if it is not tied to how risk actually shows up in the environment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sessions like </span><span style='font-size: undefined;'><em>Beyond the Vulnerability List</em></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><em>From Cloud Exposure to Runtime Attack</em></span><span style='font-size: undefined;'> focus on that connection. They look at how exposures turn into active threats, often before any alert is triggered, and how teams can use that information to prioritize earlier.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Here’s the part people miss. Exposure is not just about knowing what is wrong. It is about understanding what matters now, based on how the environment is being used and how attackers are likely to move through it.</span></p><h2 style="direction: ltr;">3. AI is only useful if it improves decisions</h2><p style="direction: ltr;"><span style='font-size: undefined;'>AI is already part of most security conversations, but the reality is nuanced. In some cases it helps reduce noise and speed up investigations. In others, it creates new questions around trust and transparency.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em>The AI Dilemma: Automating Defense Without Surrendering Judgment</em></span><span style='font-size: undefined;'> tackles this directly. It looks at where AI is helping in real SOC workflows, where it can get in the way, and why explainability matters if teams are going to rely on it. The discussion is grounded in how analysts actually work, not just what the technology promises.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>There is also a broader point here. Attackers are using AI as well, which means the balance between speed and accuracy is becoming more important on both sides.</span></p><h2 style="direction: ltr;">Join the conversation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Across these sessions, the common doesn’t stem from any single technology. It is how teams connect signals, context, and decisions in a way that holds up under pressure, which shows up in how threats are understood, how exposure is prioritized, and how AI is applied. It is also why the summit is structured the way it is, moving from shared context on day one into more focused, role-based sessions on day two.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>More sessions and speakers will be added in the coming weeks, but the direction is already clear. Security operations are shifting toward earlier decisions, better prioritization, and fewer assumptions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If your work touches AI, threat detection, or exposure management, this is where those conversations start to come together.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Join us May 12–13 and see how teams are approaching it in practice.</span></p><p style="direction: ltr;"><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-6&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Register now</span></a><span style='font-size: undefined;'>.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-why-attend-global-cybersecurity-summit-ai-exposure-management-ctem</link>
      <guid isPermaLink="false">blt1348e853d15485c1</guid>
      <category><![CDATA[Events]]></category>
      <category><![CDATA[Artificial Intelligence]]></category><dc:creator><![CDATA[Emma Burdett]]></dc:creator>
      <pubDate>Fri, 24 Apr 2026 13:07:47 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7652fa46396969f5/69a59e6cfbdb4d75ad7755a9/REQ-14706_-_1600x900px.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[AI is Changing Vulnerability Discovery and your Software Supply Chain Strategy has to Change with it]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'><em>Wade Woolwine is Senior Director, Product Security at Rapid7.</em></span></p><p><span style='font-size: undefined;'>The headlines around </span><a href="https://www.anthropic.com/glasswing" target="_blank"><span style='font-size: undefined;'>Glasswing</span></a><span style='font-size: undefined;'> have focused on how quickly AI can surface vulnerabilities, which has naturally caught the attention of security leaders. In my conversations with teams and customers, the more useful discussion has been about what that speed means in practice for business protection, especially across open source risk, dependency choices, and software supply chain resilience. The deeper issue for security leaders sits elsewhere. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Software risk is becoming harder to manage across the full lifecycle, especially in open source dependencies, build pipelines, developer environments, and the operational processes that sit between disclosure and remediation. When vulnerabilities can be found faster and at greater depth, security teams need more than another source of findings. They need a stronger way to understand what they run, what they trust, what they can patch quickly, and where a single weak dependency can create disproportionate risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Faster discovery makes software supply chain resilience a more immediate leadership issue. CISOs need a clearer view of how dependencies are chosen, monitored, validated, and governed across production, build, and developer environments, especially as open source remains essential to modern software development.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations already struggle to absorb vulnerability disclosures at the pace they are coming in, because when discovery gets faster, the operational gap widens between knowing there is a problem and being able to do something useful about it. That gap is especially serious in the software supply chain, where a single dependency can introduce risk into build systems, production workloads, developer endpoints, and the tools used to secure them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is why I would frame AI-driven vulnerability discovery risk as a lifecycle challenge. The pressure does not sit in one place, but across inventory, dependency decisions, threat intelligence, patching discipline, and validation – with people, process, and visibility shaping how well an organization can respond. Technology matters, but it cannot compensate for a weak operating model underneath it.</span></p><h2 style="direction: ltr;">Open source still matters. Dependency choices matter more.</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Open source remains essential to modern software development because it helps teams move faster and get products to market without rebuilding common functionality from scratch. The better response is to be more deliberate about where and how third-party code enters the environment. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Open source has always involved a trade-off between speed, efficiency, flexibility, and inherited risk, and that trade-off becomes harder to manage as AI makes code review deeper and faster. More flaws and supply chain compromises will likely be found in packages that teams have trusted for years, including transitive dependencies most developers did not knowingly choose. One only needs to look back a few weeks to find that the widely used Axios package suffered a </span><a href="https://www.microsoft.com/en-us/security/blog/2026/04/01/mitigating-the-axios-npm-supply-chain-compromise/" target="_blank"><span style='font-size: undefined;'>supply chain compromise</span></a><span style='font-size: undefined;'> that bundled a Remote Access Trojan (RAT) charged with stealing secrets. That raises the value of understanding which dependencies are essential, which ones can be removed, which ones pull in large chains of transitives, and which ones are maintained by too few people to inspire confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That work starts with a more disciplined question than “Is there a package that does this?” It starts with “Do we need this dependency, and do we understand the risk that comes with it?” The safest dependency is often the one that never enters the environment in the first place.</span></p><h2 style="direction: ltr;">Why inventory has to go deeper than package lists</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Supply chain resilience begins with knowing what you are actually running, which sounds straightforward until a critical disclosure lands in a package no one realized was in the environment three layers deep. Dependency graphs are deeper than most teams think, and transitive risk is where a lot of operational pain begins. A package chosen directly by a developer may bring in dozens of additional packages, each with its own maintainers, release cadence, security posture, and potential failure points.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A mature approach to inventory needs to move beyond a static package list, because CISOs need confidence in three views at once: What is declared in source, what is resolved and built, and what is actually running in production? Those views often drift apart over time, which means a package can be patched in source and still remain unpatched in a deployed container or runtime environment. An SBOM on its own will not close that gap; continuous, usable inventory will.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That inventory also needs clear ownership attached to it, because the moment a critical dependency is identified, someone has to decide what happens next, coordinate the change, and absorb the operational consequences. Security teams cannot do that well if responsibility is unclear, which is why ownership needs to be treated as part of resilience rather than an administrative detail.</span></p><h2 style="direction: ltr;">Build pipelines and developer environments deserve the same scrutiny as production</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Supply chain conversations still tend to start with production systems, even though recent incidents have shown how quickly compromise can move through the build layer, developer tooling, or the security tooling inside the pipeline itself. Those environments hold code, secrets, and trust relationships that attackers know how to exploit, while developer workstations often carry a rich mix of credentials and elevated privileges because speed matters to the business. Build systems are predictable and privileged, which makes them both valuable and vulnerable, but also easier to monitor.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Seeing those layers as part of the same attack surface means asking harder questions about how code enters the build, how package updates are governed, how actions and dependencies are pinned, what secrets exist in CI/CD, and what controls are in place on developer endpoints to detect anomalous behavior or stop high-risk package activity before it goes unnoticed.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>You can gauge the maturity of the operating model with the answers to a few basic questions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>How tightly are dependencies controlled in CI?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>How are package lifecycle scripts governed?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>What secrets exist in CI/CD, and what protections surround them?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>What visibility exists into anomalous behavior on developer endpoints?</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>How would the team detect or prevent high-risk package activity before it spreads?</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>If those answers are unclear, important parts of the model are still missing.</span></p><h2 style="direction: ltr;">Why prioritization matters more as scanning accelerates</h2><p style="direction: ltr;"><span style='font-size: undefined;'>When software risk rises, the instinct is often to add another scanner because more visibility feels like progress. What matters more over time, though, is how well teams can prioritize the findings that follow, assign them to the right owner, choose the right mitigation, and prove that exposure actually went down. Broader scanning and faster discovery mostly add to the pile unless the operating model behind them is strong enough to turn findings into action. Feed more issues into a process that is already stretched and the backlog grows, priorities become harder to sort, and remediation slows in the places where speed matters most. The organizations that come through this period well will be the ones that treat supply chain resilience as a systems problem, with stronger intake, clearer governance, better intelligence, and faster paths from alert to action.</span></p><h2 style="direction: ltr;">What stronger software supply chain resilience looks like in practice</h2><p style="direction: ltr;"><span style='font-size: undefined;'>A stronger response starts with a deeper inventory of dependencies across source, build, and runtime, so teams can see both direct and transitive packages and connect them back to real environments and real owners. Once that picture is in place, intelligence monitoring becomes far more useful when it runs continuously against credible signals on vulnerabilities, package risk, maintainer health, end-of-life software, and unusual changes in dependency behavior.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The same level of care needs to carry through into dependency governance, where better decisions depend on asking whether a new package is necessary, how much transitive risk it introduces, whether its maintenance model is healthy, and what policy governs its path into production. Build and developer controls belong in that same conversation, because version pinning, private registries, secret handling, script restrictions, immutable builds, ephemeral runners, and stronger endpoint monitoring all reduce the attack surface around the software supply chain.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Monitoring threat intelligence for notifications about new vulnerabilities and compromised packages and having a well defined and practiced process for scoping and remediating emerging threats becomes critical. Your supply chain vulnerability and compromise response should be practiced – just like your incident response plan – through table top exercises and simulated threat events. You don’t want to wait until the house is on fire to know how to execute an effective response.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Similarly, Engineering, DevOps, and Security teams should collaborate on establishing a trust and reputation scoring mechanism for supply chain dependencies. Being able to evaluate the speed of response, transparency of communication and updates, and ultimate resolution of the vulnerability or compromise speak volumes for how much you can trust the maintainers of the software you depend on. The </span><a href="https://scorecard.dev/" target="_blank"><span style='font-size: undefined;'>OpenSSF Scorecard</span></a><span style='font-size: undefined;'> project offers a great place to start evaluating the open source packages you’re already using.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations should also have a fallback plan for when obtaining a security patch is not available. Some options to consider include exploring other open source packages that perform similar functions, exploring other mitigations such as application firewalling, or even forking and contributing a security patch back to the community.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Validation closes the loop by showing whether the artifact came from where it was supposed to, whether the package has drifted in unexpected ways, and whether the mitigations applied are reducing live risk rather than simply documenting the process.</span></p><h2 style="direction: ltr;">How CISOs should think about the next 12 months</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The strain on security teams is only growing, and the potential for AI to relieve some of that pressure is understandably compelling, especially when boards, CEOs, and CFOs are asking how the organization plans to adopt it. That makes this a leadership question as much as a technology one. CISOs need a clear point of view on where AI can genuinely improve resilience, where it still introduces too much uncertainty, and how to explain those choices in business terms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If software engineering teams are already adopting AI-assisted development, security teams should be part of that conversation early, especially around dependency management. I have seen teams begin connecting AI coding agents to vulnerability management workflows so those agents can interpret vulnerabilities found in the code base, assess reachability with more context, help plan remediation, and validate updates much faster than traditional handoffs usually allow. Used well, that can reduce drag across the workflow and help teams move faster on classes of issues that are currently slowing them down.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Getting there safely still depends on the foundation underneath it. A more resilient path starts with a clearer picture of the environment and a more complete inventory of dependencies across source, build, and runtime. From there, ownership needs to be explicit, threat and vulnerability intelligence needs to be embedded into how the organization prioritizes, and dependency sprawl needs to be reduced with more discipline around what actually enters production. The same mindset should carry through to the build layer and developer endpoints, where tighter controls and better visibility help reduce unnecessary exposure, while faster and more repeatable paths from disclosure to action make it easier for teams to respond before risk compounds.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That foundation will matter regardless of which AI model or platform becomes dominant six or twelve months from now. It will also matter if the next wave of AI makes backlog reduction, lower-tier remediation, or patch validation more practical. Organizations that know what they run and how they operate will be in a much better position to adopt those capabilities with intent.</span></p><h2 style="direction: ltr;">The shift security leaders should make now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security in an AI-accelerated world needs to be managed as a systems challenge, with supply chain resilience shaped by how well organizations connect software composition, exposure visibility, dependency governance, threat intelligence, build integrity, endpoint controls, remediation workflows, and validation. When those layers are treated separately, gaps open quickly; when they are tied together through a stronger operating model, teams are in a much better position to absorb faster discovery without losing control of the response.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For CISOs, that means continuing to use open source with a more deliberate view of dependency risk, reducing unnecessary packages where possible, knowing what is running and who owns it, and monitoring threat and vulnerability intelligence with enough discipline to act before the queue overwhelms the team. It also means paying closer attention to the attack surface across production, build, and developer environments, while treating AI as something that will amplify both the strengths and the weaknesses already present in the program. Faster discovery is here, and the organizations that handle it best will be the ones that can respond with the same level of discipline.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/ai-changing-vulnerability-discovery-software-supply-chain-strategy</link>
      <guid isPermaLink="false">bltf188bfe7ed9149dc</guid>
      <category><![CDATA[Supply Chain Security]]></category>
      <category><![CDATA[Open Source]]></category><dc:creator><![CDATA[Wade Woolwine]]></dc:creator>
      <pubDate>Thu, 23 Apr 2026 13:25:47 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt30cad4cead79d2d3/6846a7113860835cfa35e65d/surface-command.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Kyber Ransomware Double Trouble: Windows and ESXi Attacks Explained]]></title>
      <description><![CDATA[<h2>Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For executive leadership, the emergence of </span><a href="https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/kyber" target="_blank"><span style='font-size: undefined;'>Kyber</span></a><span style='font-size: undefined;'> ransomware represents a significant and immediate threat due to its specialized, dual-platform deployment capability targeting mission-critical virtualization infrastructure (VMware ESXi) and core Windows file systems. This cross-platform approach, coupled with effective anti-recovery measures, drastically elevates the risk of a total operational disruption. Organizations should treat Kyber not merely as another ransomware strain, but as a specialized tool capable of causing a complete operational blackout. Recent real-world incidents have demonstrated that this approach can result in large-scale operational impact across enterprise environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>During a March 2026 incident response engagement, Rapid7 recovered two Kyber ransomware payloads deployed in the same environment, one targeting VMware ESXi infrastructure and the other Windows file servers. This provided a rare opportunity to analyze both variants side by side. In March 2026, Rapid7 recorded over 900 ransomware incidents being publicly reported.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The ESXi variant is specifically built for VMware environments, with capabilities for datastore encryption, optional virtual machine termination, and defacement of management interfaces. The Windows variant, written in Rust, includes a self-described “experimental” feature for targeting Hyper-V.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Despite these differences, both samples share a campaign identifier and Tor-based ransom infrastructure, confirming coordinated cross-platform deployment. Notably, the ransomware’s cryptographic claims are not consistent across variants. The ESXi sample advertises “post-quantum” encryption using Kyber1024, but in practice relies on ChaCha8 with RSA-4096 key wrapping, while the Windows variant does implement the advertised hybrid scheme. As usual, ransom notes prove to be more aspirational than accurate.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Kyber is a relatively new ransomware group that has recently gained visibility. Despite this, public technical analysis of the malware remains limited. The lack of spotlight on the group presented an opportunity to share our findings with the community.</span></p><h2>Technical analysis</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Kyber is a cross-platform ransomware family targeting Linux/ESXi and Windows environments. Both variants share Tor infrastructure and a campaign ID, but differ in programming language they are written, crypto, and features. While both reference the same encryption scheme in their ransom notes, only the Windows variant appears to implement it as described.</span></p><p><span style='font-size: undefined;'></span></p><table><colgroup data-width='811'><col style="width:21.454993834771887%"/><col style="width:33.04562268803946%"/><col style="width:45.49938347718865%"/></colgroup><tbody><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Property</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ELF (Linux/ESXi)</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>PE (Windows)</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Language</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>C++, GCC 4.4.7 (2012)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rust, MSVC 19.36 / VS2022</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Actual crypto</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ChaCha + RSA-4096</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>AES-256-CTR + Kyber1024 + X25519</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Note claims</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>AES + X25519 + Kyber</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>AES + X25519 + Kyber</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Extension</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>.xhsyw</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>.#~~~</span></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Ransom note</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>readme.txt</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>READ_ME_NOW.txt</span></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>VM targeting</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Native esxcli</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PowerShell Get-VM (experimental)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Anti-recovery</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>None</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>11 commands (elevation required)</span></p></td></tr></tbody></table><p>⠀</p><p><span style='font-size: undefined;'>In addition, both variants share a common campaign ID and Tor-based infrastructure, including a negotiation portal and leak site, indicating coordinated operations across platforms.</span></p><p><span style='font-size: undefined;'><strong>Campaign ID:</strong></span><span style='font-size: undefined;'> 5176[REDACTED]</span></p><p><span style='font-size: undefined;'><strong>Tor chat: </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'>Mlnmlnnrdhcaddwll4zqvfd2vyqsgtgj473gjoehwna2v4sizdukheyd[.]onion</span></span></p><p><span style='font-size: undefined;'><strong>Tor blog: </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'>Kyblogtz6k3jtxnjjvluee5ec4g3zcnvyvbgsnq5thumphmqidkt7xid[.]onion</span></span></p><p><span style='font-size: undefined;'><strong>Chat path: </strong></span><span style='font-size: undefined;'>/chat/5176[REDACTED]</span></p><h3>Linux/ESXi variant</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Linux/ESXi variant SHA-256: </span><span style='font-size: undefined;'><span data-type='inlineCode'>6ccacb7567b6c0bd2ca8e68ff59d5ef21e8f47fc1af70d4d88a421f1fc5280fc</span></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>is a 64-bit ELF executable, not stripped, written in C++ and statically linked against OpenSSL </span><span style='font-size: undefined;'><span data-type='inlineCode'>1.0.1e-fips</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The sample was developed to target ESXi environments. As shown in Figure 2, the help text for the required path argument explicitly references the datastore path /vmfs/volumes, the root directory in VMware ESXi hosts where VMFS (Virtual Machine File System</span>) datastores are mounted. <span style='font-size: undefined;'>The malware also relies on ESXi-native tooling esxcli and targets VMware-specific paths and artifacts.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt09c67429ba58d282/69e776211ca65b2f43d37c63/target-path-binary-help-text-names-vmfs-volumes.png" alt="target-path-binary-help-text-names-vmfs-volumes.png" caption="Figure 1: The binary's help text names /vmfs/volumes as the intended target path." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="target-path-binary-help-text-names-vmfs-volumes.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt09c67429ba58d282/69e776211ca65b2f43d37c63/target-path-binary-help-text-names-vmfs-volumes.png" data-sys-asset-uid="blt09c67429ba58d282" data-sys-asset-filename="target-path-binary-help-text-names-vmfs-volumes.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: The binary's help text names /vmfs/volumes as the intended target path." data-sys-asset-alt="target-path-binary-help-text-names-vmfs-volumes.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: The binary's help text names /vmfs/volumes as the intended target path.</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The execution flow is straightforward:</span></p><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Parse CLI arguments (</span><span style='font-size: undefined;'><span data-type='inlineCode'>path</span></span><span style='font-size: undefined;'> required, </span><span style='font-size: undefined;'><span data-type='inlineCode'>size</span></span><span style='font-size: undefined;'> validated 0–100)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Initialize logging (optional)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Optionally enumerate and terminate VMs (</span><span style='font-size: undefined;'><span data-type='inlineCode'>vmkill</span></span><span style='font-size: undefined;'>)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Load embedded RSA-4096 public key</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Initialize thread pool (capped at 12 threads)</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Traverse directories and submit encryption jobs</span></p></li></ol><h4>Background execution</h4><p style="direction: ltr;"><span style='font-size: undefined;'>To ensure encryption continues after an SSH session ends, the malware implements a </span><span style='font-size: undefined;'><span data-type='inlineCode'>detach</span></span><span style='font-size: undefined;'> flag. When enabled, it forks and exits the parent process, allowing the child to run in the background. The child then calls </span><span style='font-size: undefined;'><span data-type='inlineCode'>setsid()</span></span><span style='font-size: undefined;'> to detach from the controlling terminal, avoiding the SIGHUP signal typically sent when a session closes.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This allows the attacker to disconnect safely while encryption of </span><span style='font-size: undefined;'><span data-type='inlineCode'>/vmfs/volumes</span></span><span style='font-size: undefined;'> datastores continues uninterrupted in the background.</span></p><h4>Targeting VMware</h4><p style="direction: ltr;"><span style='font-size: undefined;'>If the </span><span style='font-size: undefined;'><span data-type='inlineCode'>vmkill</span></span><span style='font-size: undefined;'> flag is set, the binary enumerates all running VMs before starting encryption. It forks a child process that executes the ESXi-native management command esxcli vm process list, redirecting its output to a temporary file via dup2(). The output is then parsed line by line to extract Display Name and World ID pairs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If a whitelist is provided via the </span><span style='font-size: undefined;'><span data-type='inlineCode'>whitelist</span></span><span style='font-size: undefined;'> argument, matching VMs are skipped. All other VMs are terminated sequentially using esxcli vm process kill </span><span style='font-size: undefined;'><span data-type='inlineCode'>type=soft</span></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><span data-type='inlineCode'>world-id &lt;id&gt;</span></span><span style='font-size: undefined;'>, with the parent process waiting for each shutdown to complete before proceeding.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Two implementation choices stand out here. First, the ransomware uses </span><span style='font-size: undefined;'><span data-type='inlineCode'>fork/execlp</span></span><span style='font-size: undefined;'> rather than </span><span style='font-size: undefined;'><span data-type='inlineCode'>system()</span></span><span style='font-size: undefined;'>. By calling </span><span style='font-size: undefined;'><span data-type='inlineCode'>fork()</span></span><span style='font-size: undefined;'> and then </span><span style='font-size: undefined;'><span data-type='inlineCode'>execlp()</span></span><span style='font-size: undefined;'> directly, ransomware developers bypass the shell entirely. This means the arguments are passed as a </span><span style='font-size: undefined;'><strong>null-terminated array of strings</strong></span><span style='font-size: undefined;'> (argv) directly to the execve system call. If a VM name contained a space or a special character, a </span><span style='font-size: undefined;'><span data-type='inlineCode'>system()</span></span><span style='font-size: undefined;'> call might crash or behave unexpectedly, but execlp ensures the command is executed exactly as intended. This suggests the developer is familiar with low-level system programming.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Second, the use of </span><span style='font-size: undefined;'><span data-type='inlineCode'>type=soft</span></span><span style='font-size: undefined;'> requests a graceful shutdown rather than a forced termination. This likely reduces the risk of corrupting VM disk state prior to encryption. After issuing shutdown commands, the binary sleeps briefly for about ~2 seconds before continuing, allowing ESXi to complete the operation. </span></p><h4><span style='font-size: undefined;'>Directory traversal</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The malware performs a recursive directory walk to identify targets. Interestingly enough, it drops a </span><span style='font-size: undefined;'><span data-type='inlineCode'>readme.txt</span></span><span style='font-size: undefined;'> ransom note into every folder </span><span style='font-size: undefined;'><strong>before</strong></span><span style='font-size: undefined;'> the encryption routine begins. The traversal logic does not follow symbolic links, </span>as traversing them can lead to unexpected areas of the filesystem<span style='font-size: undefined;'>. The sample does not implement an extension allowlist. Files are encrypted unless explicitly excluded.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The binary explicitly ignores files with the following extensions or names:</span></p><p><span style='font-size: undefined;'></span></p><pre language="c"><strong>.</strong>xhsyw (already encrypted)
.locksignal, .processing, .cryptdata_backup
.tmp, readme.txt
.sf (VMware System Files)</pre><p style="direction: ltr;"><span style='font-size: undefined;'><em>Figure 2: Confirmed exclusion list from protecting in-progress files, already-encrypted files, and VMware system files from double-processing.</em></span></p><p>⠀</p><h4>Encryption: marketing vs reality</h4><p style="direction: ltr;"><span style='font-size: undefined;'>The ransom note claims that for encryption it uses AES-256-CTR, X25519 and Kyber1024 algorithms. </span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt896e57b475ab0f92/69e778bb59611c247de532a5/Ransom-note-embedded-ELF.png" alt="Ransom-note-embedded-ELF.png" caption="Figure 3: Ransom note embedded in the ELF binaries claims AES-256-CTR and X25519/Kyber1024 algorithms." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Ransom-note-embedded-ELF.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt896e57b475ab0f92/69e778bb59611c247de532a5/Ransom-note-embedded-ELF.png" data-sys-asset-uid="blt896e57b475ab0f92" data-sys-asset-filename="Ransom-note-embedded-ELF.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Ransom note embedded in the ELF binaries claims AES-256-CTR and X25519/Kyber1024 algorithms." data-sys-asset-alt="Ransom-note-embedded-ELF.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Ransom note embedded in the ELF binaries claims AES-256-CTR and X25519/Kyber1024 algorithms.</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Our technical analysis, however, says otherwise. Decompilation of the core encryption logic shows the cipher is actually </span><span style='font-size: undefined;'><strong>ChaCha8</strong></span><span style='font-size: undefined;'>. Two indicators support this conclusion. First, in the </span><span style='font-size: undefined;'><span data-type='inlineCode'>ECRYPT_encrypt_bytes</span></span><span style='font-size: undefined;'> subroutine (Figure 5) the loop executes 8 rounds (i = 8; i &gt; 0; i -= 2), and the code applies </span><span style='font-size: undefined;'><strong>32-bit right rotations</strong></span><span style='font-size: undefined;'> with constants </span><span style='font-size: undefined;'><strong>16, 20, 24, and 25</strong></span><span style='font-size: undefined;'>. These correspond to the standard ChaCha left-rotation constants (16, 12, 8, and 7) defined in RFC 8439.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt74db60d882be6661/69e77909323e41b52efa5409/IDA-decompilation-ECRYPT-encrypt-bytes-function.png" alt="IDA-decompilation-ECRYPT-encrypt-bytes-function.png" caption="Figure 4: IDA decompilation of ECRYPT_encrypt_bytes function" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="IDA-decompilation-ECRYPT-encrypt-bytes-function.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt74db60d882be6661/69e77909323e41b52efa5409/IDA-decompilation-ECRYPT-encrypt-bytes-function.png" data-sys-asset-uid="blt74db60d882be6661" data-sys-asset-filename="IDA-decompilation-ECRYPT-encrypt-bytes-function.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4: IDA decompilation of ECRYPT_encrypt_bytes function" data-sys-asset-alt="IDA-decompilation-ECRYPT-encrypt-bytes-function.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: IDA decompilation of ECRYPT_encrypt_bytes function</figcaption></div></figure><p style="direction: ltr;">⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Second, the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>ECRYPT_keysetup</span></span><span style='font-size: undefined;'> function (Figure 6) uses the "expand 32-byte k" sigma constant. For 256-bit keys, the malware initializes its state by placing this constant in words 0–3 and the key in words 4–11 — mirroring the standard ChaCha layout.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt827e67ee846b590c/69e77952cea0661bdbbb494e/IDA-decompilation-ECRYPT-keysetup-function.png" alt="IDA-decompilation-ECRYPT-keysetup-function.png" caption="Figure 5: IDA decompilation of ECRYPT_keysetup function" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="IDA-decompilation-ECRYPT-keysetup-function.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt827e67ee846b590c/69e77952cea0661bdbbb494e/IDA-decompilation-ECRYPT-keysetup-function.png" data-sys-asset-uid="blt827e67ee846b590c" data-sys-asset-filename="IDA-decompilation-ECRYPT-keysetup-function.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5: IDA decompilation of ECRYPT_keysetup function" data-sys-asset-alt="IDA-decompilation-ECRYPT-keysetup-function.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5: IDA decompilation of ECRYPT_keysetup function</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>OpenSSL is statically linked but only handles </span><span style='font-size: undefined;'><strong>RSA-4096</strong></span><span style='font-size: undefined;'> key wrapping. We did not find any “post-quantum”. The operator likely just copy-pasted the ransom note from a Windows variant that actually supports Kyber1024.</span></p><h4>Partial encryption strategy</h4><p style="direction: ltr;"><span style='font-size: undefined;'>Partial encryption logic is size-based </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>encryptFilePartly()</span></span><span style='font-size: undefined;'> function.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Files under 1MB: entire file encrypted</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Files between 1MB and 4MB: first 1MB encrypted</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Files above 4 MB: only a calculated portion of each file is encrypted, with the proportion controlled by </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>size</span></span><span style='font-size: undefined;'>; the program validates this value as 0–100 in </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>main()</span></span><span style='font-size: undefined;'>, and the default observed setting is 10.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>This approach significantly reduces encryption time while still rendering large files (e.g., VMDKs) unusable.</span></p></li></ul><h4>Encryption workflow</h4><p style="direction: ltr;"><span style='font-size: undefined;'>Each file is encrypted with a unique ChaCha8 key. Before encrypting the file, the binary creates a </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.locksignal</span></span><span style='font-size: undefined;'> file and renames the original to </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.processing</span></span><span style='font-size: undefined;'> to prevent concurrency. It then checks the last 535 bytes for a metadata trailer containing the markers </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>KYBER</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>CDTA</span></span><span style='font-size: undefined;'>, and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>ATDC</span></span><span style='color:rgb(24, 128, 56);font-size: undefined;'>.</span><span style='font-size: undefined;'> If these are present, the file is skipped as already encrypted.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For new targets, the malware generates a 40-byte key/IV set and wraps it using an embedded </span><span style='font-size: undefined;'><strong>RSA-4096</strong></span><span style='font-size: undefined;'> public key. This metadata is appended to the file and verified </span><span style='font-size: undefined;'><strong>before</strong></span><span style='font-size: undefined;'> encryption begins. A redundant copy is also saved as </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>&lt;file&gt;.cryptdata_backup</span></span><span style='font-size: undefined;'>. Encryption is performed in-place in 1 MB chunks. On success, the file is renamed from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>.processing</span><span style='font-size: undefined;'> to </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.xhsyw</span></span><span style='font-size: undefined;'>. Any files left with the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.processing</span></span><span style='font-size: undefined;'> suffix indicate an interrupted or failed encryption attempt.</span></p><h4>Defacing every entry point</h4><p style="direction: ltr;"><span style='font-size: undefined;'>Even before encryption, ransomware binary replaces three specific files:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>SSH Access</strong></span><span style='font-size: undefined;'> replaces </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>/etc/motd</span></span><span style='font-size: undefined;'> (Message of the Day), displaying the ransom note immediately to anyone logging in via SSH.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Web Management </strong></span><span style='font-size: undefined;'>replaces the VMware web UI index pages at both </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>/usr/lib/vmware/hostd/docroot/index.html</span></span><span style='font-size: undefined;'> and the Host Client interface at </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>/usr/lib/vmware/hostd/docroot/ui/index.html</span></span><span style='font-size: undefined;'>.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Whether an administrator logs in via SSH or hits the web management portal, they are immediately met with the ransom note. On non-ESXi systems where these paths don't exist, the rename fails gracefully and execution continues.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte3258a258cb29b39/69e77a3740d2b81b7e1a7c49/Execution-log-from-REMnux-test.png" height="195" alt="Execution-log-from-REMnux-test.png" caption="Figure 6: Execution log from REMnux test: defacement fails gracefully on non-ESXi, encryption proceeds." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Execution-log-from-REMnux-test.png" width="1553" style="width: 1553px; height: 195px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte3258a258cb29b39/69e77a3740d2b81b7e1a7c49/Execution-log-from-REMnux-test.png" data-sys-asset-uid="blte3258a258cb29b39" data-sys-asset-filename="Execution-log-from-REMnux-test.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6: Execution log from REMnux test: defacement fails gracefully on non-ESXi, encryption proceeds." data-sys-asset-alt="Execution-log-from-REMnux-test.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6: Execution log from REMnux test: defacement fails gracefully on non-ESXi, encryption proceeds.</figcaption></div></figure><p>⠀</p><h3>Windows variant</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows sample SHA-256: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>45bff0df2c408b3f589aed984cc331b617021ecbea57171dac719b5f545f5e8d</span></span><span style='font-size: undefined;'> is a 64-bit PE executable written in Rust and compiled with MSVC (VS2022). Much like the ESXi variant, the Windows binary as well is not packed, obfuscated, or even stripped. It retains full Rust panic strings and cargo dependency paths, including the build path </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>C:\Users\user\.cargo\registry\src\index.crates.io-6f17d22bba15001f</em></span></span><span style='font-size: undefined;'><em>.</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, the binary’s </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>version</span></span><span style='font-size: undefined;'> flag reveals the project name as </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>win_encryptor 1.0</span></span><span style='font-size: undefined;'>.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt90626fcc09f9bf01/69e77addfd28245a93205462/Ransomwares-CLI-interface.png" alt="Ransomwares-CLI-interface.png" caption="Figure 7: Ransomware's CLI interface" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Ransomwares-CLI-interface.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt90626fcc09f9bf01/69e77addfd28245a93205462/Ransomwares-CLI-interface.png" data-sys-asset-uid="blt90626fcc09f9bf01" data-sys-asset-filename="Ransomwares-CLI-interface.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7: Ransomware's CLI interface" data-sys-asset-alt="Ransomwares-CLI-interface.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7: Ransomware's CLI interface</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows binary exposes a minimal CLI (Figure 8), requiring the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>path</span></span><span style='font-size: undefined;'> argument to specify the target directory. It also includes </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>system</span></span><span style='font-size: undefined;'> flag which is self-described as "experimental" and intended to enforce a hard-stop on Hyper-V virtual machines.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ransomware initializes full runtime initialization, even if invoked with just </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>help</span></span><span style='font-size: undefined;'> flag. It aggregates entropy from four sources: system time, Windows CSPRNG, processor-based entropy via </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>RDRAND</span></span><span style='font-size: undefined;'>, and running process data and producing ~30 KB of randomness to seed an internal AES-CTR DRBG. Unlike typical ransomware, which often relies only on </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>BCryptGenRandom</span></span><span style='font-size: undefined;'>, this strain implements a custom entropy pipeline which suggests the developer cared about key material quality.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>After initialization, the binary checks whether it is running with elevated privileges by attempting to acquire </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>SeDebugPrivilege</span></span><span style='font-size: undefined;'> and logs are printed to the console (see Figure 8).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This privilege check determines if the destructive commands will be executed. Without elevation, the binary only does file encryption. With elevation, it unlocks its full toolkit: killing services, modifying the registry, and wiping shadow copies to prevent recovery.</span></p><h4>Service termination and anti-recovery</h4><p style="direction: ltr;"><span style='font-size: undefined;'>When running with elevated privileges the binary first terminates services matching five patterns: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'><strong>msexchange</strong></span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'><strong>vss</strong></span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'><strong>backup</strong></span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'><strong>veeam</strong></span></span><span style='color:rgb(24, 128, 56);font-size: undefined;'>,</span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'><strong>sql</strong></span></span><span style='color:rgb(24, 128, 56);font-size: undefined;'> </span><span style='font-size: undefined;'>using </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>OpenSCManagerA</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>EnumServicesStatusA</span></span><span style='font-size: undefined;'>, and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>ControlService</span></span><span style='color:rgb(24, 128, 56);font-size: undefined;'> </span><span style='font-size: undefined;'>API calls. The malware forces the system locale to </span><span style='font-size: undefined;'><strong>en-US</strong></span><span style='font-size: undefined;'> before service enumeration. This normalization makes certain that pattern matching for service names remains reliable regardless of the victim's native system language.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It then executes 11 commands via </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>CreateProcessW</span></span><span style='font-size: undefined;'> that you can see in the table below</span></p><table><colgroup data-width='1221.2'><col style="width:3.0461840812315755%"/><col style="width:72.14215525712414%"/><col style="width:24.811660661644282%"/></colgroup><tbody><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>#</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Command</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Purpose</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>powershell -ep bypass -nop -c "Get-WmiObject -Class Win32_ShadowCopy \| ForEach-Object { $_.Delete() }"</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Delete VSS shadow copies via WMI</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>wmic.exe SHADOWCOPY DELETE /nointeractive</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Delete shadow copies via WMIC</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>3</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vssadmin.exe Delete Shadows /all /quiet</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Delete shadow copies via vssadmin</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>bcdedit.exe /set {default} recoveryenabled No</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Disable Windows Recovery Environment</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>5</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Suppress boot failure prompts</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>6</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>wbadmin DELETE SYSTEMSTATEBACKUP</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Delete system state backups</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>7</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Delete oldest system state backup</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>8</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>iisreset.exe /stop</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Stop IIS to release locked web files</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>9</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>reg add HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Increase SMB concurrent connections</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>10</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>for /F "tokens=*" %i in ('wevtutil el') do wevtutil cl "%i"</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Clear all Windows event logs</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>11</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>rd /s /q C:\$Recycle.Bin</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Empty the Recycle Bin</span></p></td></tr></tbody></table><p style="direction: ltr;"><span style='font-size: undefined;'><em>Table 2: 11 commands executed by ransomware if it ran with elevated privilege</em></span></p><h4>Hyper-V shutdown</h4><p style="direction: ltr;"><span style='font-size: undefined;'>If </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>system</span></span><span style='color:rgb(24, 128, 56);font-size: undefined;'> </span><span style='font-size: undefined;'>flag is set, the binary enumerates Hyper-V virtual machines via PowerShell before encryption:</span></p><p><span style='font-size: undefined;'></span></p><pre language="c">Get-VM | select VMId, Name | ConvertTo-Json
Stop-VM -Force -TurnOff</pre><p style="direction: ltr;"><span style='font-size: undefined;'><em>Figure 8: PowerShell commands used for Hyper-V termination.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Each VM is terminated with a "hard stop" (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>-TurnOff</span></span><span style='font-size: undefined;'>) which forces an abrupt shutdown, releasing file locks so the malware can encrypt. As noted in the CLI help text, the developer currently considers this Hyper-V functionality "experimental."</span></p><h4>File encryption workflow</h4><p style="direction: ltr;"><span style='font-size: undefined;'>For each file, the binary checks for a prior encryption marker to avoid redundant processing. If the file is locked, the malware uses the Windows Restart Manager to identify and terminate the responsible process. If access is still denied, it modifies the file’s permissions (ACL) to </span><span style='font-size: undefined;'><strong>Everyone:FullControl</strong></span><span style='font-size: undefined;'> and clears the </span><span style='font-size: undefined;'><strong>read-only</strong></span><span style='font-size: undefined;'> attribute. It retries this entire sequence up to three times per file to ensure it can successfully open and encrypt the data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once encryption succeeds, the file is renamed with the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.#~~~</span></span><span style='font-size: undefined;'> extension, and a </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>READ_ME_NOW.txt</span></span><span style='font-size: undefined;'> ransom note is dropped in the directory. Each successful operation is logged to the console as </span><span style='font-size: undefined;'><em>Successfully encrypted &lt;file&gt;. File size: &lt;size&gt;</em></span><span style='font-size: undefined;'>. To maintain system stability and to keep the OS bootable, the malware excludes critical system directories and files from encryption listed below:</span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="c">$recycle.bin,perflog,system volume information,thumb,programdata,appdata,microsoft,netframework,c$, all users</pre><p style="direction: ltr;"><span style='font-size: undefined;'><em>Figure 9: Skipped directories</em></span></p><p style="direction: ltr;"><span style='color:rgb(55, 71, 79);font-size: undefined;'></span></p><pre language="c">READ_ME_NOW.txt,lockerlog_*,processed_file.icon,ntuser.dat,ntuser.dat.log,ntuser.ini,desktop.ini,autorun.inf,ntldr,bootsect.bak,thumbs.db,boot.ini,iconcache.db,bootfont.bin</pre><p style="direction: ltr;"><span style='font-size: undefined;'><em>Figure 10: Skipped files</em></span></p><h4>Cryptography</h4><p style="direction: ltr;"><span style='font-size: undefined;'>Unlike the Linux variant, this sample actually uses what it claims: Kyber1024 and AES-256-CTR.</span></p><p>The sample uses a hybrid encryption design. The embedded public key is validated against the expected Kyber1024 public key size of 1568 (<span data-type='inlineCode'>0x620</span>) bytes.</p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt03cfa8f2624e98f1/69e77d9442cbdc12b9f26edc/Public-key-size-check-with-branch-to-error-on-mismatch.png" alt="Public-key-size-check-with-branch-to-error-on-mismatch.png" caption="Figure 11: Public key size check (1,568 bytes / 0x620) with branch to error on mismatch" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Public-key-size-check-with-branch-to-error-on-mismatch.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt03cfa8f2624e98f1/69e77d9442cbdc12b9f26edc/Public-key-size-check-with-branch-to-error-on-mismatch.png" data-sys-asset-uid="blt03cfa8f2624e98f1" data-sys-asset-filename="Public-key-size-check-with-branch-to-error-on-mismatch.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 11: Public key size check (1,568 bytes / 0x620) with branch to error on mismatch" data-sys-asset-alt="Public-key-size-check-with-branch-to-error-on-mismatch.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 11: Public key size check (1,568 bytes / 0x620) with branch to error on mismatch</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Following validation, the sample initializes an AES-256 CTR context using a 32-byte key, which it expands into a 60-word key schedule.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This confirms that Kyber is not used for direct file encryption. Instead, Kyber1024 protects the symmetric key material, while AES-CTR handles bulk data encryption. </span></p><h4>Registry artifacts and icon registration</h4><p style="direction: ltr;"><span style='font-size: undefined;'>When executed with elevated privileges, the malware assigns a custom icon to encrypted files by registering the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.#~~~</span></span><span style='font-size: undefined;'> extension. It creates </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>C:\fucked_icon\</span></span><span style='color:rgb(24, 128, 56);font-size: undefined;'> </span><span style='font-size: undefined;'>directory, writes </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>processed_file.icon</span></span><span style='font-size: undefined;'> to that location, and configures it in the registry as the default icon.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd9d0bb447a86209c/69e77e1fa3f4f91d034a7c72/Regedit-output-kyber.png" alt="Regedit-output-kyber.png" caption="Figure 12: Regedit output after execution of Kyber with elevated privileges" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Regedit-output-kyber.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd9d0bb447a86209c/69e77e1fa3f4f91d034a7c72/Regedit-output-kyber.png" data-sys-asset-uid="bltd9d0bb447a86209c" data-sys-asset-filename="Regedit-output-kyber.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 12: Regedit output after execution of Kyber with elevated privileges" data-sys-asset-alt="Regedit-output-kyber.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 12: Regedit output after execution of Kyber with elevated privileges</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>The malware executes </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>ie4uinit.exe</span></span><span style='font-size: undefined;'> to refresh the shell icon cache. This forces Windows to display the new icons immediately across the filesystem without a system restart.</span></p><h4>Mutex</h4><p style="direction: ltr;"><span style='font-size: undefined;'>The choice of the mutex is interesting. The mutex name </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>boomplay[.]com/songs/182988982</span></span><span style='font-size: undefined;'> is stored as a wide string in </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.rdata</span></span><span style='font-size: undefined;'> and appears to be a link to a song on Boomplay, which is a legitimate African music streaming platform. We were unable to identify the specific track due to geo-restrictions we could not bypass.</span></p><h2>Mitigation guidance</h2><p>Based on the observed Tactics, Techniques, and Procedures (TTPs), organizations should focus on the following defensive actions:</p><h3><span style='color:rgb(31, 31, 31);font-size: undefined;'>Harden virtualization infrastructure (T1021.004)</span></h3><p><span style='color:rgb(31, 31, 31);font-size: undefined;'>Kyber’s reliance on SSH for ESXi host access and native tooling like </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>esxcli</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> highlights critical control points.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Implement </span><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>least-privilege access</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> for ESXi shell and SSH, ideally disabling them entirely unless required for maintenance.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Enforce </span><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>multi-factor authentication (MFA)</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> on all management interfaces and accounts.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Monitor </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>esxcli</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> execution for VM termination (</span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>vm process kill</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>) or configuration changes, which are late-stage indicators of compromise.</span></p></li></ul><h3>Prevent anti-recovery (T1485, T1070.001, T1562.001)</h3><p><span style='color:rgb(31, 31, 31);font-size: undefined;'>Kyber uses 11 distinct commands to impair defenses, including VSS deletion and log clearing.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Restrict execution:</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> Prevent unprivileged users from executing command-line utilities like </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>vssadmin.exe</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>, </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>wmic.exe</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>, and </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>wevtutil.exe</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Protect backups:</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> Ensure backups (especially Veeam/SQL targets) are immutable and stored off-host or in segregated network segments that the Windows variant cannot reach, even with elevated privileges. The ransomware explicitly targets these services and file systems.</span></p></li></ul><h3><span style='color:rgb(31, 31, 31);font-size: undefined;'>Detection focus (lateral movement & defacement):</span></h3><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Monitor for defacement artifacts:</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> Actively monitor for changes to VMware's management files (</span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>/etc/motd</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>, </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>/usr/lib/vmware/hostd/docroot/index.html</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>, etc.) in ESXi environments.</span></p></li><li><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Custom entropy check:</strong></span><span style='color:rgb(31, 31, 31);font-size: undefined;'> The Windows variant’s custom entropy pipeline suggests an effort to ensure key quality. Analysts should incorporate the provided IOCs (mutex: </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>boomplay[.]com/songs/182988982</span></span><span style='color:rgb(31, 31, 31);font-size: undefined;'>) and file extensions into their detection rules.</span></p></li></ul><h2>MITRE ATT&CK techniques</h2><table><colgroup data-width='1096'><col style="width:13.047445255474452%"/><col style="width:34.94525547445255%"/><col style="width:52.00729927007299%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>ID</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Technique</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Use </strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>T1486</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Data Encrypted for Impact</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Primary objective for both variants.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>T1485</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Data Destruction</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Deletion of shadow copies and backups via </span><span data-type='inlineCode'>vssadmin</span><span style='color:rgb(31, 31, 31);font-size: undefined;'> and </span><span data-type='inlineCode'>wmic</span><span style='color:rgb(31, 31, 31);font-size: undefined;'>.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>T1489</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Service Stop</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Terminating ESXi processes and Windows database services.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>T1070.001</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Indicator Removal: Clear Windows Event Logs</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Using </span><span data-type='inlineCode'>wevtutil</span><span style='color:rgb(31, 31, 31);font-size: undefined;'> to clear logs after infection.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>T1021.004</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Remote Services: SSH</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Primary vector for interacting with ESXi hosts.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>T1562.001</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Impair Defenses: Disable or Modify Tools</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Disabling Windows Recovery Environment and boot failure prompts.</span></p></td></tr></tbody></table><h2>Indicators of compromise (IOCs)</h2><table><colgroup data-width='1193'><col style="width:11.5674769488684%"/><col style="width:48.78457669740151%"/><col style="width:39.64794635373009%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Type</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Indicator</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Description</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>SHA-256</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>6ccacb7567b6c0bd2ca8e68ff59d5ef21e8f47fc1af70d4d88a421f1fc5280fc</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Linux/ESXi ELF Binary</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>SHA-256</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>45bff0df2c408b3f589aed984cc331b617021ecbea57171dac719b5f545f5e8d</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Rust Binary</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>SHA-256</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>4ed176edb75ae2114cda8cfb3f83ac2ecdc4476fa1ef30ad8c81a54c0a223a29</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Old Windows Variant</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Extension</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>.xhsyw</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted file extension (Linux)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Extension</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>.#~~~</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted file extension (Windows)</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Filename</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>readme.txt</span></span><span style='font-size: undefined;'> / </span><span style='font-size: undefined;'><span data-type='inlineCode'>READ_ME_NOW.txt</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Ransom notes</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Mutex</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>boomplay.com/songs/182988982</span></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Mutex used by the Windows variant</span></p></td></tr></tbody></table><h2>Conclusion</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Kyber ransomware isn’t a masterpiece of complex code, but it is highly effective at causing destruction. It reflects a shift toward specialization over sophistication. The operators didn’t need custom exploits or zero-days, because they didn’t have to use them. Instead, they simply used the standard ransomware playbook of abusing native tools like esxcli and vssadmin, and it was enough.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The encryption claims in the ransom note aren’t the main story. If anything, they highlight a gap between the campaign's marketing and its execution. </span>The sophistication of the defense must now be measured against the attacker's specialization, not their code complexity. Ignoring Kyber's multi-platform nature is an acceptance of a total operational blackout.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-kyber-ransomware-double-trouble-windows-esxi-attacks-explained</link>
      <guid isPermaLink="false">blt7305390f16bef76a</guid>
      <category><![CDATA[Malware]]></category>
      <category><![CDATA[Ransomware]]></category><dc:creator><![CDATA[Anna Širokova]]></dc:creator>
      <pubDate>Tue, 21 Apr 2026 14:38:05 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4180d9ccc3a54fb5/69aed6f8cb63a70008936e97/card-red-blue-purple-teaming.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[From Bulk Export to AI-ready Security Workflows: Introducing Rapid7’s Open-Source MCP Server and Agent Skill]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security teams want more from their data than APIs and one-off reports.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>They want to ask better questions, move faster, and bring security context into the workflows they are already building. That’s especially true as more organizations experiment with private AI assistants, internal copilots, and LLM-powered automation. Part of this experimentation is, of course, attempting to lower the pressure on teams that have to figure out how to prioritize the sheer number of actionable vulnerabilities efforts like </span><a href="https://www.rapid7.com/blog/post/ai-project-glasswing-challenge-faster-discovery-and-action/" target="_blank"><span style='font-size: undefined;'>Project Glasswing</span></a><span style='font-size: undefined;'> are quickly becoming hyper-skilled at spotting.     </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That’s why Rapid7 is introducing a free, open-source MCP Server and Agent Skill for Bulk Export. Bulk export is a highly efficient way to access all your Rapid7 data; no more paging APIs, no more verbose output. Bulk Export creates a local offline replica of your data the LLM can efficiently and quickly interrogate, reducing token cost and time to answer questions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This new MCP and Agent Skill gives customers a standardized way to connect Rapid7 vulnerability and exposure data to AI assistants and custom AI workflows. Built as an open-source bridge, it helps customers bring their Rapid7 data into the tools and experiences that work best for their teams.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltad3c1d6f92a4d9dc/69e76b60e08626060d013746/image3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image3.png" asset-alt="image3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltad3c1d6f92a4d9dc/69e76b60e08626060d013746/image3.png" data-sys-asset-uid="bltad3c1d6f92a4d9dc" data-sys-asset-filename="image3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image3.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><h2 style="direction: ltr;">Why this matters now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security teams are no longer just buying tools. They’re connecting systems, shaping workflows, and testing how AI can help analysts, IT teams, and leaders get to answers faster. For many teams, the path from raw security data to usable AI context is still manual. It often means exporting data, building wrappers, shaping queries, and managing custom integrations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rather than leave every team to solve that challenge from scratch, we wanted to provide a stronger foundation that is flexible, practical, and easy to extend over time. With projects like Metasploit and Velociraptor, Rapid7 is committed to Open Source, and by sharing with the broader community we hope to accelerate velocity and ensure we’re able to incorporate more use cases and fixes. These processes also give customers full visibility of the code running and tools used, ensuring data privacy and allowing the user to do with their data what they please.  </span></p><h2 style="direction: ltr;">What MCP does</h2><p style="direction: ltr;"><a href="https://www.rapid7.com/fundamentals/model-context-protocol-mcp/" target="_blank"><span style='font-size: undefined;'>Model Context Protocol</span></a><span style='font-size: undefined;'>, or MCP, is an emerging standard for helping AI systems interact with external data and tools in a structured way.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In practical terms, it gives AI assistants a cleaner way to ask questions, retrieve data, and work with systems beyond the model itself. For customers, that means less custom glue code and a more consistent way to use security telemetry in AI-driven workflows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That matters because many security reporting and analysis workflows still assume a high technical bar. Answering a simple question can require custom queries, SQL knowledge, or dashboard work. But the people who need those answers aren’t always security specialists. They may be IT partners, compliance stakeholders, or executives who want clarity but might not need to understand the underlying query logic.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The MCP server helps lower that barrier: Instead of starting with raw exports and working backward, teams can start with the question they need answered.</span></p><h2 style="direction: ltr;">The bigger picture: MCP and CTEM</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This approach also aligns with the broader shift toward </span><a href="https://www.rapid7.com/fundamentals/what-is-continuous-threat-exposure-management-ctem/" target="_blank"><span style='font-size: undefined;'>continuous threat exposure management</span></a><span style='font-size: undefined;'>, or CTEM. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>CTEM is about helping teams move beyond point-in-time findings toward a more continuous, contextual understanding of risk. That requires security data that can be accessed, connected, and used across the workflows teams rely on. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Bulk Export helps make that possible by giving customers more flexibility in how they use Rapid7 data. The open-source MCP server makes it easier to bring that data into AI-assisted and custom workflows.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted40306e513a9c96/69e76b8e735697b8afb9212b/image1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image1.png" asset-alt="image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted40306e513a9c96/69e76b8e735697b8afb9212b/image1.png" data-sys-asset-uid="blted40306e513a9c96" data-sys-asset-filename="image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image1.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>That can support more continuous exposure management workflows by making it easier for teams to triage vulnerability and exposure data. For example, an analyst facing a large queue of new vulnerabilities could use LLM assistance to quickly narrow in on the findings most likely to need attention first. Instead of manually working through exports and queries, they could ask natural-language questions to surface the exposures tied to critical assets, unresolved remediation work, or other signals available in the data.</span></p><h2 style="direction: ltr;">From data portability to AI-ready interoperability</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Bulk Export was already an important step toward giving customers more control over their data. It made it easier to extract and use security telemetry in external tools and analytics environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The open-source MCP server builds on that foundation: Instead of using exported data only for dashboards or custom reporting, customers can now use that same data in AI-native experiences. That includes internal assistants, private copilots, workflow automation, and natural-language exploration of vulnerability and exposure data. This makes existing security data easier to use in the environments customers are already investing in.</span></p><h2 style="direction: ltr;">How it works</h2><p style="direction: ltr;"><span style='font-size: undefined;'>At a high level, the architecture is straightforward. Using the Agent Skill, your LLM runs the MCP server locally and automatically prepares the environment by performing the bulk export and loading the data into a local file store. The Agent Skill provides the schemas and knowledge, with the MCP providing the tools to access this data. The LLM then will answer any question by querying, summarizing, and synthesising data locally – an extremely fast and simple process that's for the LLM. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Depending on the data a customer exports, answers can include vulnerability records, asset data, remediated vulnerabilities, and policy-related results.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The point here isn't just that a model can access the data, it’s that an open-source layer helps customers inspect, adapt, and extend over time, empowering teams to control how that connection works in their own environment. </span></p><h2 style="direction: ltr;">What customers can do with it</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This opens the door to practical use cases, including:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Using LLM assistance to triage vulnerability data faster </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Asking natural-language questions to spot exposure and remediation trends</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Investigating which assets are tied to the most urgent vulnerabilities</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Understanding what changed over time without manual analysis</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Exploring policy failures without building manual queries</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Feeding Rapid7 telemetry into private AI assistants and internal workflows</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Making reporting more accessible for non-technical stakeholders</span></p></li></ul><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt067fcac94d548c56/69e76bafebfc7b856c038ea1/image2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image2.png" asset-alt="image2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt067fcac94d548c56/69e76bafebfc7b856c038ea1/image2.png" data-sys-asset-uid="blt067fcac94d548c56" data-sys-asset-filename="image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image2.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>For teams already trying to operationalize AI, this creates a lower-friction path. Instead of building every integration from the ground up, they can start with a reusable bridge and focus on the workflows they want to enable.</span></p><h2 style="direction: ltr;">A better path from data to action</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security data only creates value when teams can use it. For many organizations, turning raw telemetry into timely answers is still harder than it should be. Analysts need speed. Leaders need clarity. Builders need flexibility. And more customers want security data that works inside the tools and workflows they already rely on.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The open-source MCP server for Bulk Export is designed to help make that possible.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Bulk Export helps customers take control of their data. This is the next step: helping them put that data to work in AI-ready security workflows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ready to explore it for yourself? Visit the </span><a href="https://github.com/rapid7/rapid7-bulk-export-mcp" target="_blank"><span style='font-size: undefined;'>Rapid7 Bulk Export MCP Server project on GitHub</span></a><span style='font-size: undefined;'> to learn more and get started.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-bulk-export-ai-ready-security-workflows-open-source-mcp-server-agent-skill</link>
      <guid isPermaLink="false">blt4666ae2fff340632</guid>
      <category><![CDATA[Artificial Intelligence]]></category>
      <category><![CDATA[Exposure Command]]></category><dc:creator><![CDATA[Michael Chroney]]></dc:creator>
      <pubDate>Tue, 21 Apr 2026 13:58:29 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt09a532eac4a02570/6852c5968e72c44b89691ca4/PSN-gov-showcase-hero-image-2.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Project Glasswing and the Next Challenge for Defenders: Turning Faster Discovery into Faster Action]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Anthropic’s </span><a href="https://www.anthropic.com/glasswing" target="_blank"><span style='font-size: undefined;'>Project Glasswing</span></a><span style='font-size: undefined;'> has sparked plenty of discussion about what AI might soon do for vulnerability discovery, but the more useful question for most security teams is how to prepare for, and more importantly seize the opportunity of, what comes next.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'> As we wrote in our earlier blog,</span><a href="https://www.rapid7.com/blog/post/ai-what-project-glasswing-means-for-security-leaders" target="_blank"><span style='font-size: undefined;'> What Project Glasswing Means for Security Leaders</span></a><span style='font-size: undefined;'>, AI is becoming more capable of finding software flaws. The pressure that follows lands on the teams responsible for deciding what matters, validating risk, assigning ownership, and getting remediation moving across environments that were already hard to manage. We believe that the organizations that will benefit most from the next wave of AI will be the ones that understand their environment well enough to use </span>these emerging AI models<span style='font-size: undefined;'> with intent, rather than layering them onto immature processes and hoping that speed alone will solve the backlog.</span></p><h2 style="direction: ltr;">What this moment means for security teams</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The number of publicly tracked software vulnerabilities has broken records almost every year over the last decade, while supply chain risk has continued to rise. Most teams were already feeling the strain of more findings than they could process cleanly. The Common Vulnerabilities and Exposures (CVE) program, the standard system for identifying and tracking known vulnerabilities, recorded 48,185 disclosures in 2025, a 20% increase over 2024, with roughly 40% of those disclosed vulnerabilities rated high or critical. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The pace in 2026 was already working out to hundreds of new CVEs per day when those figures were cited. That tells you something important about the current environment: the challenge has not necessarily been  a lack of findings, but instead converting a growing stream of findings into measurable risk reduction.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The reality is that very few organizations are going to hand a model free rein over their most sensitive environments the minute those capabilities become more widely available. Trust will be built in stages: early adoption is much more likely to focus on backlog reduction, triage support, patch testing, and repetitive lower-tier remediation work that consumes time without carrying the same level of operational risk as the most critical systems in the business. That is a more realistic starting point, and it leads to a more useful question. Before teams apply AI more broadly, they need to understand their environment well enough to use it intentionally.</span></p><h2 style="direction: ltr;">Establish the foundation before layering in AI</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The promise from Project Glasswing and almost every other AI-powered security initiative is quite similar: leverage AI to identify patterns, summarize risk, suggest fixes, and speed up repetitive work. Regardless of technology, success  still depends on how well an organization understands its environment, the context around each finding, and the process used to act on it. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A model can generate more output than a team ever could on its own, but that output becomes noise if the organization cannot answer basic questions about scope, ownership, criticality, and exposure. Teams need a clear, continuously updated picture of the environment before they can decide where AI should be applied, what should remain human-led, and which parts of the backlog are safe to push through more automated workflows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The AI landscape is already shifting fast, and it will keep shifting, which is why this moment should prompt a more preemptive and resilient strategy rather than another round of tooling hype. Chasing each new capability as it arrives will inevitably force teams to keep reorganizing around the latest announcement. A stronger path is to get the foundation right first - understand the environment, the attack paths, and the assets that matter most; but most importantly, establishing the process and the people behind making these decisions. Then use AI where it meaningfully improves speed, consistency, and focus.</span></p><h2 style="direction: ltr;">Why Attack Surface Management should be part of that foundation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>A strong foundation starts with visibility. Security teams need a live picture of what exists in the environment, what is exposed, how assets connect to one another, and which systems carry the greatest business impact if something goes wrong. That is where</span><a href="https://www.rapid7.com/products/command/attack-surface-management-asm/" target="_blank"><span style='font-size: undefined;'> Attack Surface Management</span></a><span style='font-size: undefined;'> becomes central. Rapid7’s approach through Surface Command is built around a continuous view of the attack surface across the digital estate, which helps teams understand where exposures sit and how they relate to internet-facing, business-critical, or otherwise high-impact systems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That matters for AI adoption just as much as it matters for day-to-day security operations. Teams cannot apply AI strategically if they are guessing about which parts of the environment are lower priority, which assets belong to which owners, or where a newly disclosed flaw could create real business risk. A better view of the attack surface gives organizations the context they need to segment the problem properly. That makes it far easier to start with the right use cases, whether that is backlog reduction in lower-impact systems, targeted prioritization of exposed assets, or faster triage where the risk picture is already well understood.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ownership is part of that foundation too. Remediation slows down when no one can quickly identify who owns the affected application, environment, or workflow. Security teams already lose time there today, and AI will only make that bottleneck more visible if it starts surfacing issues faster than organizations can assign them. Attack Surface Management helps turn that ambiguity into something more actionable by tying exposure to environment context and likely ownership.</span></p><h2 style="direction: ltr;">How Vulnerability and Exposure Management turns visibility into action</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Once the environment is understood, teams still need a way to move from findings to outcomes. That is where</span><a href="https://www.rapid7.com/solutions/vulnerability-management/" target="_blank"><span style='font-size: undefined;'> Vulnerability and Exposure Management</span></a><span style='font-size: undefined;'> becomes the operating layer that keeps the work grounded.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The biggest value here is not simply collecting more vulnerability data. It is targeted prioritization and validation. When a disclosure lands, teams need to know whether the issue affects an exposed asset, whether there is evidence of exploitation or attacker interest, whether the impacted system is business-critical, and whether existing controls already reduce some of the risk. That is the kind of context that helps organizations decide what deserves immediate attention and what can be handled through a normal remediation cycle.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is where artificial intelligence can help move remediation forward faster. Instead of asking teams to manually connect exploit signals, asset criticality, and vulnerability intelligence on their own,</span><a href="https://www.rapid7.com/blog/post/pt-remediate-vulnerabilities-faster-with-ai-generated-risk-intelligence/" target="_blank"><span style='font-size: undefined;'> AI can distill that context directly in the remediation workflow</span></a><span style='font-size: undefined;'>. That makes it easier to understand why an issue matters, what the likely impact is, and what to do next, which shortens the gap between discovery and a confident decision on how to respond.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We expect most organizations to use AI to assist with, or in some cases take over, lower-tier triage, backlog cleanup, summary generation, and patch support in areas where the workflow is already established and the blast radius is more manageable. Human experts still stay closest to the most critical business logic, the most sensitive environments, and the most complex remediation paths. That is a practical adoption model, and it only works when the organization already has enough structure in place to know where those boundaries are.</span></p><h2 style="direction: ltr;">Curated vulnerability intelligence changes the quality of decisions</h2><p style="direction: ltr;"><span style='font-size: undefined;'>That kind of deliberate adoption only works when teams can make better decisions, faster. Security teams need more than severity scores and a long list of CVEs. They need enough context to understand what matters, what can wait, and where action will reduce real risk fastest. As Rapid7 outlined in</span><a href="https://www.rapid7.com/blog/post/pt-the-power-of-curated-vulnerability-intelligence/" target="_blank"><span style='font-size: undefined;'> The Power of Curated Vulnerability Intelligence</span></a><span style='font-size: undefined;'>, the goal is to identify the vulnerabilities that actually matter and give teams enough context to act with confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That intelligence provides a form of validation that most teams need badly as disclosure volume rises. It helps answer whether a finding is tied to active attacker interest, whether proof-of-concept activity is public, whether the asset is exposed, and whether delaying a patch creates unacceptable risk. It also supports the decisions that happen in the gap between discovery and full remediation. When a patch is delayed because of change controls, testing constraints, or lack of a vendor fix, teams still need to reduce exposure. Curated intelligence helps them decide whether to use segmentation, access restrictions, configuration changes, added monitoring, or virtual patching while the longer-term fix is being worked through.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is one of the clearest ways Rapid7 helps customers move from data to outcomes. Intelligence is fused into the workflow so teams can prioritize with more precision and validate their actions against real threat context, not just generalized scores.</span></p><h2 style="direction: ltr;">How runtime and remediation fit into the broader AI story</h2><p style="direction: ltr;"><span style='font-size: undefined;'>There is another part of this story that matters as organizations think more seriously about AI-driven security operations. As AI shapes the way teams handle exposures earlier in the lifecycle, context of application at runtime matters more too.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To make that foundation complete, organizations need to look beyond static posture and bring runtime validation into the picture. When teams can identify which vulnerabilities and misconfigurations are actively exploitable in production, and map sensitive data and identity access to real-world attack paths, they get a much clearer view of actual risk. Security teams need to understand what is vulnerable, how systems behave when live, and where unusual activity may suggest a problem is moving toward exploitation. With that runtime context in place, teams can spend less time chasing theoretical vulnerabilities and more time focusing on the exposures that are actively creating risk in live environments. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That connection between exposure, intelligence, remediation, and runtime behavior is where AI starts to become genuinely useful rather than simply impressive. It supports a more intentional model of security decision-making, one that narrows the gap between what is found, what matters, and what happens next.</span></p><h2 style="direction: ltr;">What security leaders should do now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This is a good time for security leaders to step back and ask a more disciplined set of questions.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Do we understand our environment well enough to direct AI toward the right problems? </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Can we clearly separate higher-risk, higher-impact assets from the parts of the backlog that are mostly operational drag? </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Is threat intelligence embedded in how we interpret findings, or are we still depending too heavily on raw severity? </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Can we identify ownership fast enough for AI-assisted triage to result in meaningful action? </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Are compensating controls part of the plan when remediation cannot happen immediately?</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Those questions shape the quality of everything that follows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Glasswing creates a real opportunity for security teams that are ready to use AI with more intention. AI can move work forward faster, reduce manual drag, and absorb classes of issues that currently consume time without improving outcomes. The teams that benefit most will not be the ones that rush to apply new models everywhere. They will be the ones that understand their environment, have a clear view of their attack surface, have mature enough workflows to apply AI where it makes sense, and can measure whether the actions taken actually reduced exposure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7’s approach to building resilience is grounded in those same needs. Attack Surface Management provides the environmental foundation, Vulnerability Management drives prioritization and action, curated vulnerability intelligence strengthens validation and decision-making, AI-generated remediation insights compress the time from discovery to the next step, and runtime security adds context where live behavior matters. Together, those pieces help customers build a security program that is ready for AI rather than constantly reacting to it.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/ai-project-glasswing-challenge-faster-discovery-and-action</link>
      <guid isPermaLink="false">bltc6b62f52a9995f21</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Artificial Intelligence]]></category>
      <category><![CDATA[Project Glasswing]]></category><dc:creator><![CDATA[Craig Adams]]></dc:creator>
      <pubDate>Mon, 20 Apr 2026 16:20:32 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0b0762ca94c50b0b/6846a711eac0e395093e52e3/AI.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 04/17/2026]]></title>
      <description><![CDATA[<h2>Happy Friday - Seven New Metasploit Modules</h2><p>We’re happy to announce that Metasploit Framework had a big week, landing seven new modules alongside various bug fixes and enhancements. This week’s highlights include RCE modules targeting AVideo, openDCIM, Selenium Grid/Selenoid, and ChurchCRM. On the post-exploitation side, Windows saw three new persistence techniques added as modules, targeting Telemetry scheduled tasks, PowerShell profiles, and Microsoft BITS.</p><p>What a time to be alive as a Metasploit user! We wish you all a wonderful weekend and happy hacking.</p><h2>New module content (7)</h2><h3>AVideo Unauthenticated SQL Injection Credential Dump</h3><p>Authors: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> and arkmarta</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21075">#21075</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: gather/avideo_catname_sqli</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-28501&amp;referrer=blog">CVE-2026-28501</a></p><p>Description: Adds an auxiliary module for CVE-2026-28501, an unauthenticated SQL injection in AVideo &lt;= 22.0, along with a new BenchmarkBasedBlind SQLi mixin class and blind extraction improvements.</p><h3>openDCIM install.php SQL Injection to RCE</h3><p>Author: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a></p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21034">#21034</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: linux/http/opendcim_install_sqli_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-28517&amp;referrer=blog">CVE-2026-28517</a></p><p>Description: This PR adds a new exploit module for openDCIM that chains three vulnerabilities (<a href="https://github.com/advisories/GHSA-mg2w-x76x-59h8">https://github.com/advisories/GHSA-mg2w-x76x-59h8</a>, <a href="https://github.com/advisories/GHSA-prmh-rp39-qc4m">https://github.com/advisories/GHSA-prmh-rp39-qc4m</a>, <a href="https://github.com/advisories/GHSA-428h-8xhf-g3cw">https://github.com/advisories/GHSA-428h-8xhf-g3cw</a>) to achieve remote code execution.</p><h3>Selenium Grid/Selenoid Unauthenticated RCE</h3><p>Authors: Jon Stratton, Takahiro Yokoyama, Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a>, and Wiz Research</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21003">#21003</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: linux/http/selenium_greed_rce</p><p>Description: This replaces the two separate Selenium Grid RCE modules (Chrome and Firefox) with a single unified module that auto-detects available browsers and selects the best attack vector. The module targets unauthenticated Selenium Grid and Selenoid instances, supporting two techniques: a Firefox profile handler injection that works on all Grid versions including the latest (never patched since 2021), and a Chrome binary override for Grid versions prior to 4.11.0 and all Selenoid versions. No authentication is required.</p><h3>ChurchCRM Database Restore RCE 6.2.0</h3><p>Author: LucasCsmt</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21095">#21095</a> contributed by <a href="https://github.com/LucasCsmt">LucasCsmt</a></p><p>Path: multi/http/churchcrm_db_restore_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-68109&amp;referrer=blog">CVE-2025-68109</a></p><p>Description: Adds a new exploit module for CVE-2025-68109, targeting a file upload vulnerability inside ChurchCRM leading to an RCE. This module will work on version 6.2.0 of ChurchCRM and earlier.</p><h3>Windows Persistence Bits Job</h3><p>Author: h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20839">#20839</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: windows/persistence/bits</p><p>Description: This adds a new persistence module that uses Microsoft Bits to maintain access to the system.</p><h3>Powershell Profile Persistence</h3><p>Author: madefourit</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20933">#20933</a> contributed by <a href="https://github.com/madefourit">madefourit</a></p><p>Path: windows/persistence/powershell_profile</p><p>Description: This adds a new persistence module that uses powershell profiles to maintain access.</p><h3>Windows Telemetry Persistence</h3><p>Author: h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20843">#20843</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: windows/persistence/telemetry</p><p>Description: Adds a new persistence module, exploit/windows/persistence/telemetry, that abuses the Windows Telemetry scheduled task (Microsoft Compatibility Appraiser / CompatTelRunner) to establish persistence. The module writes a payload to disk and configures the telemetry task to execute it, resulting in a SYSTEM-level Meterpreter session either on the next scheduled run or immediately on demand. Requires an admin-level Meterpreter session on the target.</p><h2>Enhancements and features (11)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21078">#21078</a> from <a href="https://github.com/Chocapikk">Chocapikk</a> - Adds multiple improvements to the multi/http/churchcrm_install_unauth_rce module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21085">#21085</a> from <a href="https://github.com/dledda-r7">dledda-r7</a> - This refactors the Block API code used by Windows payloads to leverage a new version of the hashing algorithm. This also fixes a bug whereby the MaximumLength field was used when calculating UNICODE_STRING names when it should have been the Length field.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21236">#21236</a> from <a href="https://github.com/bcoles">bcoles</a> - Add riscv64le and riscv32le architecture support to the fileless fetch payload adapter. This enables in-memory ELF execution via memfd_create on RISC-V Linux targets without writing to disk.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21252">#21252</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Adds a new with_adcs_certificate_request method that now used by both the MsIcpr and WebEnrollment mixins that abstracts away the enrollment process and takes a block that performs the actual request. The result is consolidation of messages, post-processing of the successfully issued certificate.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21255">#21255</a> from <a href="https://github.com/mxnvel">mxnvel</a> - This updates two Python payloads (cmd/unix/reverse_python and cmd/unix/reverse_python_ssl) to make the PythonPath option optional. When omitted, it defaults to a shim that will determine the appropriate version of Python at runtime using a small bash expression.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21275">#21275</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Adds multiple improvements to the cve_2025_14847_mongobleed module, such as adding new a dedicated check method, improved compression support detection as only zlib can be exploited, and resolving other false positives.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21286">#21286</a> from <a href="https://github.com/Hemang360">Hemang360</a> - Adds a cleanup keyword argument to Msf::Post::File#mkdir so callers can skip automatic directory cleanup registration. It is very useful for when we create directories in persistence modules and want the directory to remain.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21289">#21289</a> from <a href="https://github.com/sjanusz-r7">sjanusz-r7</a> - Updates the db.hosts RPC call to now additionally include the comments associated with the host.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21291">#21291</a> from <a href="https://github.com/sjanusz-r7">sjanusz-r7</a> - Updates the module.info RPC call to now additionally include the notes associated with the module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21304">#21304</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Improves multiple auxiliary module check code messages and statuses.</li></ul><h2>Bugs fixed (4)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21027">#21027</a> from <a href="https://github.com/SilentSobs">SilentSobs</a> - Fixes ELF shared object (elf-so) payload generation failing on 32-bit ARM Linux and RISC-V 32-bit LE targets. The _start entry point in the ARM LE template was landing at a non-word-aligned offset, which violates the architecture's 4-byte alignment requirement and caused the shared object to fail to load. The templates now use proper NASM align directives to ensure correct entry point alignment, and a similar fix is applied to the RISC-V 32-bit LE template.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21268">#21268</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a crash with a small number of auxiliary modules when the check method was run and the vulnerability wasn't present.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21287">#21287</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Fixes the EXE templates that were rebuilt in <a href="https://github.com/rapid7/metasploit-framework/pull/20502">https://github.com/rapid7/metasploit-framework/pull/20502</a> to work on legacy Windows targets like Server 2000 in case you find yourself in a combination hacking and time-travelling movie.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21309">#21309</a> from <a href="https://github.com/sfewer-r7">sfewer-r7</a> - Fixes a false positive in the fortinet_fortiweb_create_admin module when detecting the presence of an authentication bypass via path traversal vulnerability in the Fortinet FortiWeb management interface.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20843">#20843</a> from <a href="https://github.com/h00die">h00die</a> - Adds a new persistence module, exploit/windows/persistence/telemetry, that abuses the Windows Telemetry scheduled task (Microsoft Compatibility Appraiser / CompatTelRunner) to establish persistence. The module writes a payload to disk and configures the telemetry task to execute it, resulting in a SYSTEM-level Meterpreter session either on the next scheduled run or immediately on demand. Requires an admin-level Meterpreter session on the target.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-08T15%3A01%3A17Z..2026-04-16T14%3A22%3A51%2B01%3A00%22">Pull Requests 6.4.126...6.4.128</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.126...6.4.128">Full diff 6.4.126...6.4.128</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-17-2026</link>
      <guid isPermaLink="false">bltfbdf377c52786428</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Jack Heysel]]></dc:creator>
      <pubDate>Fri, 17 Apr 2026 20:35:42 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2026-33032: Nginx UI Missing MCP Authentication]]></title>
      <description><![CDATA[<h2>Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>On March 30, 2026, a security advisory was </span><a href="https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf" target="_blank"><span style='font-size: undefined;'>published</span></a><span style='font-size: undefined;'> for a critical vulnerability affecting </span><a href="https://github.com/0xJacky/nginx-ui" target="_blank"><span style='font-size: undefined;'>Nginx UI</span></a><span style='font-size: undefined;'>. Nginx UI is an open-source web interface to centralize the management of Nginx configurations and SSL certificates. The critical vulnerability, </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33032" target="_blank"><span style='font-size: undefined;'>CVE-2026-33032</span></a><span style='font-size: undefined;'>, was reported in early March by Pluto Security researcher Yotam Perkal and </span><a href="https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/#Timeline" target="_blank"><span style='font-size: undefined;'>subsequently patched</span></a><span style='font-size: undefined;'> on March 15, 2026. That same day, Pluto Security </span><a href="https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/" target="_blank"><span style='font-size: undefined;'>published</span></a><span style='font-size: undefined;'> a technical blog post with some vulnerability details.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2026-33032 is a missing authentication bug with a CVSS score of </span><a href="https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" target="_blank"><span style='font-size: undefined;'>9.8</span></a><span style='font-size: undefined;'>; as a result of missing authentication controls, an unauthenticated attacker who exploits </span><a href="https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762" target="_blank"><span style='font-size: undefined;'>CVE-2026-27944</span></a><span style='font-size: undefined;'> to leak information can access a </span><a href="https://modelcontextprotocol.io/docs/getting-started/intro" target="_blank"><span style='font-size: undefined;'>Model Context Protocol (MCP)</span></a><span style='font-size: undefined;'> server that can perform privileged operations on managed Nginx web servers. Systems are vulnerable in the default IP allowlist configuration, which allows any remote IP to access MCP functionality. Exploitation results in full attacker control of the managed Nginx service. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>According to a Recorded Future </span><a href="https://www.recordedfuture.com/blog/march-2026-cve-landscape" target="_blank"><span style='font-size: undefined;'>report</span></a><span style='font-size: undefined;'> published on April 13, 2026, exploitation of CVE-2026-33032 in the wild has begun. A PurpleOps </span><a href="https://purple-ops.io/blog/nginx-server-takeover-apr-16" target="_blank"><span style='font-size: undefined;'>report</span></a><span style='font-size: undefined;'> published on April 16, 2026 associated exploitation of CVE-2026-33032 in the wild with the information leak vulnerability CVE-2026-27944, indicating that these two vulnerabilities are being exploited as a chain.</span></p><h2>Mitigation guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations running Nginx UI should prioritize updating on an urgent basis to remediate CVE-2026-33032. Additionally, to reduce exposure to future vulnerabilities affecting Nginx UI, defenders should ensure that network access to the Nginx UI management interface is strictly limited to those who must have it.</span></p><h3><span style='font-size: undefined;'>Affected versions:</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>According to the </span><a href="https://pluto.security/blog/mcp-bug-nginx-security-vulnerability-cvss-9-8/#post-item-10" target="_blank"><span style='font-size: undefined;'>finder’s blog post</span></a><span style='font-size: undefined;'>, version 2.3.3 and prior are affected, and the fix is present</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>in version 2.3.4 and later. However the official</span><a href="https://www.cve.org/CVERecord?id=CVE-2026-33032" target="_blank"><span style='font-size: undefined;'> CVE record</span></a><span style='font-size: undefined;'> states that versions 2.3.5 and below are affected. The information leak vulnerability being exploited in the wild with CVE-2026-33032, CVE-2026-27944, was patched in version 2.3.3. This discrepancy in affected version numbers introduces confusion as to the correct version required to remediate CVE-2026-33032. To avoid this version number discrepancy, </span><span style='font-size: undefined;'><strong>users are advised to update to the very</strong></span><a href="https://github.com/0xJacky/nginx-ui/releases" target="_blank"><span style='font-size: undefined;'><strong> latest</strong></span></a><span style='font-size: undefined;'><strong> version (2.3.6)</strong></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Please read the vendor </span><a href="https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-h6c2-x2m2-mwhf" target="_blank"><span style='font-size: undefined;'>advisory</span></a><span style='font-size: undefined;'> for the latest guidance.</span></p><h2>Rapid7 customers</h2><h3>Exposure Command, InsightVM, and Nexpose</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Exposure Command, InsightVM, and Nexpose customers can assess exposure to CVE-2026-33032 with unauthenticated checks available in the April 17 content release.</span></p><h2>Updates</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>April 16, 2026: Initial publication.</span></p></li><li><span style='font-size: undefined;'>April 17, 2026: Added additional details on exploitation workflow, vulnerable software versions, and product coverage.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/etr-cve-2026-33032-nginx-ui-missing-mcp-authentication</link>
      <guid isPermaLink="false">bltea60b37bc7c9d5ee</guid>
      <category><![CDATA[Emerging Threats]]></category>
      <category><![CDATA[Emergent Threat Response]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 16 Apr 2026 19:44:49 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[ClickFix Phishing Campaign Masquerading as a Claude Installer]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>It is no secret that phishing campaigns utilizing various ClickFix techniques have been a commonly used method of </span><a href="https://www.rapid7.com/blog/tag/social-engineering/" target="_blank"><span style='font-size: undefined;'>social engineering</span></a><span style='font-size: undefined;'>. One of the main reasons for this is simply because they work. You know this and Rapid7 does as well. As a company offering managed detection and response (MDR), our customers expect us to be knowledgeable about and able to detect attacks as common as ClickFix campaigns. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Recently, Rapid7 observed a small grouping of ClickFix events across customers in the EU and US. At the time of discovery, this campaign had very little traction on sites like VirusTotal or within the online security landscape. This campaign was particularly interesting as it appeared to be masquerading as an installer for Claude, an AI tool that has received a considerable amount of attention. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Using Rapid7 InsightIDR detection rules, our SOC analysts were able to detect and respond to the threat, preventing further compromise. This campaign demonstrates the strength Rapid7 customers get from our MDR service, while peeling back the curtain to provide a real-world example on how we operate behind the scenes. In this blog, we will detail a brief technical analysis of the observed threat actor activities and discuss how this serves as an example of the service we aim to provide our MDR customers. The analysis highlights both the multi-step delivery of the payload as well as the work Rapid7 performs when investigating threats.  </span></p><h2 style="direction: ltr;">Observed attacker behavior</h2><p style="direction: ltr;"><span style='font-size: undefined;'>On April 9, Rapid7 was alerted to mshta executed on a customer asset using the Windows run utility. The alert was generated by the detection rule </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Attacker Technique - Remote Payload Execution via Run Utility (shell32.dll)</strong></span></span><span style='font-size: undefined;'>. This rule will generate an alert when a suspicious process, such as mshta, is added to the RunMRU registry key. This key is important for the detection of ClickFix campaigns, as it tracks the last 26 commands executed by the Windows run utility. One thing that stuck out about this particular mshta command is that the URL, </span><span style='font-size: undefined;'><span data-type='inlineCode'><em><strong>download-version[.]1-5-8[.]com/claude.msixbundle</strong></em></span></span><span style='font-size: undefined;'>, appeared to be impersonating an MSIX bundle for the popular AI tool, Claude. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>MSIX files are Windows app packages that one would typically see from the Microsoft store, definitely not something you would see being passed as an argument to mshta. While the host was quickly taken down before Rapid7 was able to obtain the claude.msixbundle payload, a copy was obtainable on VirusTotal. Looking at the payload, it does initially appear to be an MSIX bundle. The file header signature, PK, indicates that the file is a ZIP archive and contains a string reference to the MSIX bundle, </span><span style='font-size: undefined;'><span data-type='inlineCode'><em><strong>MicrosoftBing_1.1.37.0_ARM64.msix</strong></em></span></span><span style='font-size: undefined;'>:</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcc54f606a1f7fbe9/69e0e3b7323e41097efa3efe/ClaudeFix_figure1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure1.png" asset-alt="ClaudeFix_figure1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcc54f606a1f7fbe9/69e0e3b7323e41097efa3efe/ClaudeFix_figure1.png" data-sys-asset-uid="bltcc54f606a1f7fbe9" data-sys-asset-filename="ClaudeFix_figure1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure1.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Exploring the payload deeper, however, reveals an HTML Application (HTA) embedded within the ZIP archive:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt61d2c48be86a0cdd/69e0e3cc6f753778fa879b0f/ClaudeFix_figure2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure2.png" asset-alt="ClaudeFix_figure2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt61d2c48be86a0cdd/69e0e3cc6f753778fa879b0f/ClaudeFix_figure2.png" data-sys-asset-uid="blt61d2c48be86a0cdd" data-sys-asset-filename="ClaudeFix_figure2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure2.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The Visual Basic script within the HTA file contains a series of obfuscated strings that are deobfuscated with the following VBS function:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2a8e7ae71f64d83f/69e0e4211b27ed5f95a0744d/ClaudeFix_figure3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure3.png" asset-alt="ClaudeFix_figure3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2a8e7ae71f64d83f/69e0e4211b27ed5f95a0744d/ClaudeFix_figure3.png" data-sys-asset-uid="blt2a8e7ae71f64d83f" data-sys-asset-filename="ClaudeFix_figure3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure3.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, one of the functions serves to generate an encoded PowerShell script that will serve as the next step in the chain:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6c8f543a5237d970/69e0e43e71b6299d2105a620/ClaudeFix_figure4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure4.png" asset-alt="ClaudeFix_figure4.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6c8f543a5237d970/69e0e43e71b6299d2105a620/ClaudeFix_figure4.png" data-sys-asset-uid="blt6c8f543a5237d970" data-sys-asset-filename="ClaudeFix_figure4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure4.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>After the deobfuscation routine is complete, these strings contain references to the required objects and function calls to craft and execute – via ShellExec – the following command:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html">c:\Windows\System32\cmd.exe” /v:on /c “set x=pow&&set y=ershell&&call %windir%\SysWOW64\WindowsPowershell\v1.0\!x!!y! -E [ENCODED COMMAND]</pre><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltadf9b8f4c2c821da/69e0e4c82ea600bef2edcd31/ClaudeFix_figure5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure5.png" asset-alt="ClaudeFix_figure5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltadf9b8f4c2c821da/69e0e4c82ea600bef2edcd31/ClaudeFix_figure5.png" data-sys-asset-uid="bltadf9b8f4c2c821da" data-sys-asset-filename="ClaudeFix_figure5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure5.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The encoded PowerShell acts as a staging payload. The script will first generate an MD5 hash value based on the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>COMPUTERNAME</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>USERNAME</strong></span></span><span style='font-size: undefined;'> environment variables. It will then take the first 16 characters of the hash value and use it to craft a URL to pull another, much larger, PowerShell script. The script also contains a string deobfuscation routine that is responsible for crafting the following strings to be passed to various .NET functions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Assembly</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>System.Mangement.Automation.AmsiUtils</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>amsiContext</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NonPublic,Static</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>0x41414141</span></p></li></ul><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt51644a3bfd7109a7/69e0e4e9d9c60a0260f95011/ClaudeFix_figure6.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure6.png" asset-alt="ClaudeFix_figure6.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt51644a3bfd7109a7/69e0e4e9d9c60a0260f95011/ClaudeFix_figure6.png" data-sys-asset-uid="blt51644a3bfd7109a7" data-sys-asset-filename="ClaudeFix_figure6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure6.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The script will then call the deobfuscation routine to craft a call to WriteInt32 in the .NET Marshal library to overwrite the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>amsiContext</strong></span></span><span style='font-size: undefined;'> field in </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>System.Management.Automation.AmsiUtils</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>with the value </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>0x41414141</strong></span></span><span style='font-size: undefined;'>. Once </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>amsiContext</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>is overwritten, the script will download and execute the next stage:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt368f1153eeabfd25/69e0e54e3d1e3658319cce9f/ClaudeFix_figure7.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure7.png" asset-alt="ClaudeFix_figure7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt368f1153eeabfd25/69e0e54e3d1e3658319cce9f/ClaudeFix_figure7.png" data-sys-asset-uid="blt368f1153eeabfd25" data-sys-asset-filename="ClaudeFix_figure7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure7.png" sys-style-type="display"/></figure><p style="direction: ltr;">⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The URL is hosting yet another PowerShell script containing highly obfuscated strings and a large byte array. Upon execution of the script, the strings decode to contain the necessary .NET types and method calls to create and execute a PowerShell ScriptBlock. This ScriptBlock is derived from the byte array, which is first base64 decoded and then run through a deobfuscation routine:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdb41f855f485c3f9/69e0e5875d4c667216b82dbb/ClaudeFix_figure8.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure8.png" asset-alt="ClaudeFix_figure8.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdb41f855f485c3f9/69e0e5875d4c667216b82dbb/ClaudeFix_figure8.png" data-sys-asset-uid="bltdb41f855f485c3f9" data-sys-asset-filename="ClaudeFix_figure8.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure8.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>This ScriptBlock again contains another series of obfuscated strings and a large byte array containing yet another PowerShell ScriptBlock. Following the execution of the script, the code once again creates and executes a PowerShell ScriptBlock:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6544326a9113f4f9/69e0e59913ea4b19de1ad379/ClaudeFix_figure9.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure9.png" asset-alt="ClaudeFix_figure9.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6544326a9113f4f9/69e0e59913ea4b19de1ad379/ClaudeFix_figure9.png" data-sys-asset-uid="blt6544326a9113f4f9" data-sys-asset-filename="ClaudeFix_figure9.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure9.png" sys-style-type="display"/></figure><p style="direction: ltr;">⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>This ScriptBlock culminates in a process injection routine using the .NET interoperability library. The code contains a byte array with encrypted shellcode that gets passed through a XOR routine. The script then obtains handles to the following Windows API calls:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NtAllocateVirtualMemory</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Copy</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NtProtectVirtualMemory</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NtCreateThreadEx</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NtWaitForSingleObject</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NtFreeVirtualMemory</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>NtClose</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>After obtaining the handles, the script crafts delegate functions for the Windows API calls and invokes the delegates to perform the process injection routine:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4e01d2e3db948848/69e0e5ab60d3d001c899e30b/ClaudeFix_figure10.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="ClaudeFix_figure10.png" asset-alt="ClaudeFix_figure10.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4e01d2e3db948848/69e0e5ab60d3d001c899e30b/ClaudeFix_figure10.png" data-sys-asset-uid="blt4e01d2e3db948848" data-sys-asset-filename="ClaudeFix_figure10.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="ClaudeFix_figure10.png" sys-style-type="display"/></figure><h2 style="direction: ltr;">Importance to Rapid7’s MDR customers</h2><p style="direction: ltr;"><a href="https://www.rapid7.com/services/managed-detection-and-response-mdr/" target="_blank"><span style='font-size: undefined;'>Rapid7 MDR</span></a><span style='font-size: undefined;'> customers receive the security knowledge of our threat intelligence, detection engineering, incident response, and security operations center analysts. Input from all of these sources directly feeds into how we create detections and respond to alerts. Following is an explanation of how we use events like these to further provide and enhance our services for customers. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As previously mentioned, ClickFix activity is not new. Detection engineers in the MDR service know this and build rules to address these techniques, such as the rule that caught the activity discussed in this blog.. Detection rules are created in response to activity observed in incident response, customer requests, activity observed from the SOC, threat intelligence, and observations of the security landscape. Rapid7’s detection engineers work with the SOC to monitor these rules for efficacy. Rules that are primarily used to detect initial compromise, such as the one that alerted on this campaign, are additionally monitored to identify any new campaigns. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once the campaign is identified, our detection engineers research it to create additional rules. They can also perform retroactive threat hunts across the Rapid7 customer base using IOCs or any new behavioral detections created from researching the campaign. Results from researching campaigns like this one then go on to feed threat intelligence and help inform our detection strategy. This campaign provides a great example of how Rapid7 works on the backend to detect and prevent threats in customer environments. </span></p><h2 style="direction: ltr;">Mitigation guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Monitor the following registry key to watch for potential ClickFix attacks such as the one observed in this case:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU</strong></span></span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>While Rapid7 MDR customers were covered by the managed SOC, Rapid7 recommends the following actions for containment:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em>If the activity is not expected, apply containment and review the user's browsing history for the source of the command. The initial lure is often presented to the user when they attempt to browse the internet for free downloads (media, software, etc.). In some cases the malicious command may have been copied to the user's clipboard when visiting the initial webpage, and can be viewed by inspecting the source code of the site. If the infection is successful, an information stealer is often executed as the final payload, meaning that any credentials stored on the infected system should be reset as part of restoration.</em></span></p><h2 style="direction: ltr;">MITRE ATT&CK techniques</h2><table><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>System Binary Proxy Execution: Mshta</span></p></td><td><p>T1218.005</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obfuscated Files or Information: Encrypted/Encoded File</span></p></td><td><p>T1027.013</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obfuscated Files or Information: Command Obfuscation</span></p></td><td><p>T1027.010</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Command and Scripting Interpreter: PowerShell</span></p></td><td><p>T1059.001</p><p></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Process Injection</span></p></td><td><p style="direction: ltr;">T1055</p></td></tr></tbody></table><h2 style="direction: ltr;">Indicators of compromise (IOCs)</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Cloude.Msixbundle:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>2b99ade9224add2ce86eb836dcf70040315f6dc95e772ea98f24a30cdf4fdb97</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Domains observed by Rapid7:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Oakenfjrod[.]ru</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>download-version[.]1-5-8[.]com</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>download[.]get-version[.]com</span></p></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-clickfix-phishing-campaign-fake-claude-installer</link>
      <guid isPermaLink="false">blt0b210f7c6858f774</guid>
      <category><![CDATA[Phishing]]></category>
      <category><![CDATA[Incident Response]]></category><dc:creator><![CDATA[Nicholas Spagnola]]></dc:creator>
      <pubDate>Thu, 16 Apr 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt62de3c632e7d1ef7/6984a555a6b5ef052cb93196/Chrysalis-backdoor-blog.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[A Clearer Path from Prioritized Exposures to Remediation Progress]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security leaders know that reducing risk is not just about finding the right exposures, but helping the organization act on them before known issues turn into real incidents. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That is often where remediation gets harder. Security teams may know which actions matter most, but progress can slow when infrastructure, cloud, endpoint, and IT teams do not have the context needed to execute. Teams need clear asset detail to scope the work, trusted status signals to validate remediation, and usable reporting to track progress and stay aligned.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is exactly the challenge </span><a href="https://www.rapid7.com/products/command/exposure-management/" target="_blank"><span style='font-size: undefined;'>Exposure Command</span></a><span style='font-size: undefined;'> is built to help solve. Exposure Command helps customers understand and prioritize the exposures that matter most, while Remediation Hub (a prioritized remediation view within Exposure Command) helps teams turn that prioritization into action. With new enhancements to Remediation Hub, customers can now do that with more context and confidence, along with better visibility into progress over time through exportable reports. </span></p><h2 style="direction: ltr;">Why remediation work slows down</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Prioritization is an important step, but remediation rarely happens in one place or with one team. Security, infrastructure, cloud, endpoint, and IT operations all need enough context to understand what is being asked of them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When that context is hard to access, progress slows. Security teams may know what should be fixed, but asset owners still need the information required to assess impact, plan the work, and take action. Teams also need to understand whether assets are actually protected, whether patching has fully taken effect, and how remediation progress should be tracked over time. Without that clarity, remediation becomes harder to coordinate and harder to validate.</span></p><h2 style="direction: ltr;">Making remediation more actionable</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Top Remediations Report helps close that gap by adding a comprehensive asset-level breakdown for each remediation. In addition to summary remediation information, customers can see source-specific metadata such as operating system, IP address, cloud provider, tags, endpoint protection, and patch management.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It can be used as a high-level summary of remediation priorities; many security teams use it to define remediation goals and share clear, actionable guidance with teams that may not work directly in security tools.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That gives teams a clearer view of the work behind each remediation and makes it easier to move from prioritization to execution.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Customers can also tailor reports to match the way they work, with customizable filters for specific environments, tags, or ownership groups. Reports can be exported in CSV, HTML, and PDF formats, shared with the teams responsible for action, and automatically generated and emailed on a schedule.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt96d405832d0943b1/69df881bb01d6bd4165468af/exposure-command-top-remediations-report.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="exposure-command-top-remediations-report.png" asset-alt="exposure-command-top-remediations-report.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt96d405832d0943b1/69df881bb01d6bd4165468af/exposure-command-top-remediations-report.png" data-sys-asset-uid="blt96d405832d0943b1" data-sys-asset-filename="exposure-command-top-remediations-report.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="exposure-command-top-remediations-report.png" sys-style-type="display"/></figure><h2 style="direction: ltr;">Building clearer visibility into patching and endpoint coverage</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Action is only part of the equation, since teams also need clear, trustworthy context around asset posture.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Remediation Hub now shows the source of patch management and endpoint protection coverage directly in remediation details, giving customers clearer visibility into where that data comes from and which tools are protecting a given asset. This is especially helpful in environments with multiple solutions in use, and reduces confusion when missing integrations would otherwise make assets appear unprotected.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The update also surfaces whether an asset still requires a reboot after patching, helping explain why vulnerabilities may persist even when remediation work has already started. Together, these additions make it easier for teams to assess true exposure, validate remediation progress, and identify where follow-up is still needed.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8cdd075812ccb546/69df88614a14ca83b732b268/remediation-hub-package-update-progress.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="remediation-hub-package-update-progress.png" asset-alt="remediation-hub-package-update-progress.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8cdd075812ccb546/69df88614a14ca83b732b268/remediation-hub-package-update-progress.png" data-sys-asset-uid="blt8cdd075812ccb546" data-sys-asset-filename="remediation-hub-package-update-progress.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="remediation-hub-package-update-progress.png" sys-style-type="display"/></figure><h2 style="direction: ltr;">Extending remediation data into operational workflows</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Remediation does not stop once a team has identified what to fix or validated that a change has been made. Security leaders also need ways to track progress, measure performance, and share remediation outcomes across the organization. That is where exported remediation data becomes important.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By extending access to remediation data outside the platform, customers can more easily support the workflows across reporting, operations, and leadership teams. This makes it easier to analyze remediation activity over time, align to internal reporting needs, and give stakeholders a clearer view of progress.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For security leaders, that means better visibility into whether remediation efforts are moving the organization in the right direction. For operational teams, it means less manual work to assemble and share updates, and more flexibility in how remediation data is used.</span></p><h2 style="direction: ltr;">What this looks like in practice</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For vulnerability management teams, this means faster handoff. Instead of sharing a remediation recommendation and then answering follow-up questions, they can send a report that already includes the asset context needed to begin planning.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For infrastructure and cloud teams, it becomes easier to focus on the parts of the environment they own. Filters help narrow remediation data to the assets, environments, and ownership groups that matter most, reducing noise and making action more straightforward.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For endpoint and patching teams, greater visibility into coverage source and reboot status helps explain why exposure may still remain, even when remediation work is already underway. That makes validation easier and helps teams troubleshoot more effectively.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For security and IT leaders, scheduled reporting and exported remediation data improve shared visibility. Rather than relying on one-off exports or manual updates, teams can more consistently track prioritized remediation work and measure progress over time.</span></p><h2 style="direction: ltr;">Better context, faster progress</h2><p style="direction: ltr;"><span style='font-size: undefined;'>These enhancements help customers do more than identify top remediation priorities. They help teams act on them, validate them, and track them with more confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By bringing together deeper asset context, clearer patch and endpoint visibility, and more usable remediation reporting, Remediation Hub helps reduce the friction that often slows remediation down. The result is smoother collaboration across functional teams, less manual effort, and quicker progress on the remediation work that matters most.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Read more about how </span><a href="https://www.rapid7.com/products/command/exposure-management/" target="_blank"><span style='font-size: undefined;'>Exposure Command</span></a><span style='font-size: undefined;'> helps teams share remediation context, improve coordination, and move faster on risk reduction.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-path-from-prioritized-exposures-to-remediation-progress</link>
      <guid isPermaLink="false">blt76d15aecf237782c</guid>
      <category><![CDATA[Exposure Command]]></category><dc:creator><![CDATA[Michael Chroney]]></dc:creator>
      <pubDate>Wed, 15 Apr 2026 12:37:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt09a532eac4a02570/6852c5968e72c44b89691ca4/PSN-gov-showcase-hero-image-2.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - April 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 167 vulnerabilities on </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr"><span style='font-size: undefined;'>April 2026 Patch Tuesday</span></a><span style='font-size: undefined;'>. Microsoft is aware of exploitation in the wild for one of today’s vulnerabilities, and public disclosure for one other. Microsoft evaluates 19 of the vulnerabilities published today as more likely to see future exploitation. So far this month, Microsoft has provided patches to address 80 browser vulnerabilities, which are not included in the Patch Tuesday count above.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Increasing volumes of vulnerabilities</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Regular Patch Tuesday watchers will know that these vulnerability totals are significantly higher than usual, especially the browser numbers. Late last week, Microsoft published patches to resolve more than 60 browser vulnerabilities in a single day, which is a new record in that very specific category.</span></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc2c9a951c0214419/69deb0f56fc5d83cfe975eec/microsoft-edge-cve-publications.png" alt="A bar chart showing the number of Microsoft browser advisories per day from 2017 to 2026. A significant spike is visible in April 2026." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing the number of Microsoft browser advisories per day from 2017 to 2026. A significant spike is visible in April 2026." style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc2c9a951c0214419/69deb0f56fc5d83cfe975eec/microsoft-edge-cve-publications.png" data-sys-asset-uid="bltc2c9a951c0214419" data-sys-asset-filename="microsoft-edge-cve-publications.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing the number of Microsoft browser advisories per day from 2017 to 2026. A significant spike is visible in April 2026." data-sys-asset-position="center" sys-style-type="display"/></figure><p><span style='font-size: undefined;'>It might be tempting to imagine that this sudden spike was tied to the buzz around the announcement a week ago today of </span><a href="https://www.rapid7.com/blog/post/ai-what-project-glasswing-means-for-security-leaders/"><span style='font-size: undefined;'>Project Glasswing</span></a><span style='font-size: undefined;'>, but this is not the case. Edge is based on the Chromium engine, and the Chromium maintainers </span><a href="https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html"><span style='font-size: undefined;'>acknowledge</span></a><span style='font-size: undefined;'> a wide range of researchers for the vulnerabilities which Microsoft republished last Friday. This reflects a significant industry-wide uptick in the volume of vulnerability reports over the past few weeks. A safe conclusion is that this increase in volume is driven by ever-expanding AI capabilities. We should expect to see further increases in vulnerability reporting volume as the impact of AI models extend further, both in terms of capability and availability.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SharePoint: zero-day spoofing</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>When everything is changing rapidly, it can be tempting to look to familiar things for comfort. SharePoint admins should start by addressing </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201"><span style='font-size: undefined;'>CVE-2026-32201</span></a><span style='font-size: undefined;'>, an exploited-in-the-wild spoofing vulnerability. The advisory doesn’t offer much detail, but does mention </span><a href="https://cwe.mitre.org/data/definitions/20.html"><span style='font-size: undefined;'>CWE-20: Improper Input Validation</span></a><span style='font-size: undefined;'> and low impact to confidentiality and integrity, with no impact to availability. Of course, the greatest attacker impact is typically achieved by chaining together multiple vulnerabilities that by themselves might not seem so bad.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ever-increasing novel AI capabilities in offensive cybersecurity now appear to provide real competition for all but the most elite human researchers; if it was ever valid to suppose that a vulnerability with a CVSS v3 base score of 6.5 was unlikely to cause much pain, it’s certainly not a safe defensive assumption in 2026. Patches are available for all supported versions of SharePoint, including SharePoint 2016, which </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/sharepoint-server-2016"><span style='font-size: undefined;'>moves beyond extended support</span></a><span style='font-size: undefined;'> on July 14, 2026.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Defender: zero-day elevation of privilege</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Defender receives a patch today for </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33825"><span style='font-size: undefined;'>CVE-2026-33825</span></a><span style='font-size: undefined;'>, a local privilege escalation vulnerability for which Microsoft is aware of public disclosure. Successful exploitation leads to SYSTEM privileges, so this is certainly worth patching sooner rather than later. Microsoft points out that no action should be required to install this update, since the Microsoft Defender Antimalware Platform automatically updates by default. A further silver lining is that systems that have disabled Microsoft Defender are not in an exploitable state. Hopefully, any such system is running a suitable third-party replacement for Defender’s capabilities.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows [I don’t like] IKE: zero-day pre-auth RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows Internet Key Exchange (IKE) Services Extensions is the site of </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-33824"><span style='font-size: undefined;'>CVE-2026-33824</span></a><span style='font-size: undefined;'>, a critical unauthenticated remote code execution vulnerability. Exploitation requires an attacker to send specially crafted packets to a Windows machine with IKE v2 enabled, which could enable remote code execution. Vulnerabilities leading to unauthenticated RCE against modern Windows assets are relatively rare, or we’d see more wormable vulnerabilities self-propagating across the internet. However, since IKE provides secure tunnel negotiation services, for instance for VPNs, it is necessarily exposed to untrusted networks and reachable in a pre-authorization context. It’s hard to imagine this turning into a rampaging internet-wide worm, but there’s plenty of scope for initial access abuse, so this IKE vulnerability is still yikes.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The advisory does contain a section with potential mitigations for anyone unable to patch immediately, which center on least-privilege restriction of relevant UDP traffic. This same portion of the advisory also furnishes a helpful link to the definition of the word “mitigations” in the MSDN glossary. All versions of Windows back as far as Server 2016 and Windows 10 1607 LTSC receive patches.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The advisory credits both the WARP and </span><a href="https://www.microsoft.com/en-us/security/blog/author/microsoft-offensive-research-security-engineering-team/"><span style='font-size: undefined;'>MORSE</span></a><span style='font-size: undefined;'> (Microsoft Offensive Research & Security Engineering) teams at Microsoft. MORSE appears in Acknowledgements over the past few years, but today marks the first explicit mention of WARP in a Microsoft security advisory Acknowledgements section; we can speculate that WARP is an internal designator for the Microsoft Windows Enterprise Security Team.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>In Microsoft lifecycle news, extended support ends April 14, 2026 for a wide range of Microsoft product legacy enterprise tools, including </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/dynamics-c5-2016"><span style='font-size: undefined;'>Dynamics C5 2016</span></a><span style='font-size: undefined;'>, </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/dynamics-nav-2016"><span style='font-size: undefined;'>Dynamics NAV 2016</span></a><span style='font-size: undefined;'>, </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-application-virtualization-50"><span style='font-size: undefined;'>App-V 5.0</span></a><span style='font-size: undefined;'> and </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-application-virtualization-hosting-51-for-windows-desktops?branch=live"><span style='font-size: undefined;'>App-V 5.1</span></a><span style='font-size: undefined;'>, </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/user-experience-virtualization-uev-21"><span style='font-size: undefined;'>UE-V 2.1</span></a><span style='font-size: undefined;'>, and </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-bitlocker-administration-and-monitoring-25"><span style='font-size: undefined;'>BitLocker Administration and Monitoring 2.5 SP1</span></a><span style='font-size: undefined;'>. Microsoft .NET 9 STS (Standard Term Support, as distinct from Long Term Support) was originally scheduled to move past the end of support in May 2026, but late last year, Microsoft </span><a href="https://devblogs.microsoft.com/dotnet/dotnet-sts-releases-supported-for-24-months/#:~:text=To%20solve%20this%20problem%2C%20we,Original%20Release%20Date"><span style='font-size: undefined;'>granted a six-month extension</span></a><span style='font-size: undefined;'>, so that </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-net-and-net-core"><span style='font-size: undefined;'>.NET 9 STS</span></a><span style='font-size: undefined;'> now reaches end of support on November 10, 2026.</span></p><h2>Summary charts</h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3a4fdde55a12b5dd/69deb1adaa80f03583cf6fd2/2026-04-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Apr" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Apr" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3a4fdde55a12b5dd/69deb1adaa80f03583cf6fd2/2026-04-vuln_count_component.png" data-sys-asset-uid="blt3a4fdde55a12b5dd" data-sys-asset-filename="2026-04-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Apr" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5f52b0590ab59940/69deb1ad2321dc82f9bad1d4/2026-04-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Apr" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Apr" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5f52b0590ab59940/69deb1ad2321dc82f9bad1d4/2026-04-vuln_count_impact.png" data-sys-asset-uid="blt5f52b0590ab59940" data-sys-asset-filename="2026-04-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Apr" data-sys-asset-position="none" sys-style-type="display"/></figure><p></p><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fc6645d88bab5e1/69deb1ad2d94d4142105df29/2026-04-vuln_count_impact-component-heatmap.png" alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Apr" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Apr" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fc6645d88bab5e1/69deb1ad2d94d4142105df29/2026-04-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt9fc6645d88bab5e1" data-sys-asset-filename="2026-04-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Apr" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><p></p><p></p><p></p><p></p><h2>Summary tables</h2><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32171">CVE-2026-32171</a></td><td><p>Azure Logic Apps Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32168">CVE-2026-32168</a></td><td><p>Azure Monitor Agent Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32192">CVE-2026-32192</a></td><td><p>Azure Monitor Agent Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32184">CVE-2026-32184</a></td><td><p>Microsoft High Performance Compute (HPC) Pack Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32203">CVE-2026-32203</a></td><td><p>.NET and Visual Studio Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26171">CVE-2026-26171</a></td><td><p>.NET Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32226">CVE-2026-32226</a></td><td><p>.NET Framework Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23666">CVE-2026-23666</a></td><td><p>.NET Framework Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32178">CVE-2026-32178</a></td><td><p>.NET Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33116">CVE-2026-33116</a></td><td><p>.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23653">CVE-2026-23653</a></td><td><p>GitHub Copilot and Visual Studio Code Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32631">CVE-2026-32631</a></td><td><p>GitHub: CVE-2026-32631 'git clone' from manipulated repositories can leak NTLM hashes</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21637">CVE-2026-21637</a></td><td><p>HackerOne: CVE-2026-21637 TLS PSK/ALPN Callback Exceptions Bypass Error Handlers</p></td><td><p>N/A</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26143">CVE-2026-26143</a></td><td><p>Microsoft PowerShell Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32072">CVE-2026-32072</a></td><td><p>Active Directory Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32181">CVE-2026-32181</a></td><td><p>Connected User Experiences and Telemetry Service Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27924">CVE-2026-27924</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32154">CVE-2026-32154</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27923">CVE-2026-27923</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32155">CVE-2026-32155</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32091">CVE-2026-32091</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26152">CVE-2026-26152</a></td><td><p>Microsoft Cryptographic Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26155">CVE-2026-26155</a></td><td><p>Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27914">CVE-2026-27914</a></td><td><p>Microsoft Management Console Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25250">CVE-2026-25250</a></td><td><p>MITRE: CVE-2026-25250 Secure Boot disable Eazy Fix</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32081">CVE-2026-32081</a></td><td><p>Package Catalog Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26170">CVE-2026-26170</a></td><td><p>PowerShell Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26183">CVE-2026-26183</a></td><td><p>Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32157">CVE-2026-32157</a></td><td><p>Remote Desktop Client Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26160">CVE-2026-26160</a></td><td><p>Remote Desktop Licensing Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26159">CVE-2026-26159</a></td><td><p>Remote Desktop Licensing Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26151">CVE-2026-26151</a></td><td><p>Remote Desktop Spoofing Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32085">CVE-2026-32085</a></td><td><p>Remote Procedure Call Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-0390">CVE-2026-0390</a></td><td><p>UEFI Secure Boot Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32212">CVE-2026-32212</a></td><td><p>Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32214">CVE-2026-32214</a></td><td><p>Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32079">CVE-2026-32079</a></td><td><p>Web Account Manager Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33104">CVE-2026-33104</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33826">CVE-2026-33826</a></td><td><p>Windows Active Directory Remote Code Execution Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26178">CVE-2026-26178</a></td><td><p>Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32073">CVE-2026-32073</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26168">CVE-2026-26168</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26173">CVE-2026-26173</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26177">CVE-2026-26177</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26182">CVE-2026-26182</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27922">CVE-2026-27922</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33099">CVE-2026-33099</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33100">CVE-2026-33100</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32088">CVE-2026-32088</a></td><td><p>Windows Biometric Service Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27913">CVE-2026-27913</a></td><td><p>Windows BitLocker Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26175">CVE-2026-26175</a></td><td><p>Windows Boot Manager Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26176">CVE-2026-26176</a></td><td><p>Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27926">CVE-2026-27926</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32162">CVE-2026-32162</a></td><td><p>Windows COM Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20806">CVE-2026-20806</a></td><td><p>Windows COM Server Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32070">CVE-2026-32070</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33098">CVE-2026-33098</a></td><td><p>Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26153">CVE-2026-26153</a></td><td><p>Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32087">CVE-2026-32087</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32093">CVE-2026-32093</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32086">CVE-2026-32086</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32150">CVE-2026-32150</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27931">CVE-2026-27931</a></td><td><p>Windows GDI Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27930">CVE-2026-27930</a></td><td><p>Windows GDI Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27906">CVE-2026-27906</a></td><td><p>Windows Hello Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26156">CVE-2026-26156</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32149">CVE-2026-32149</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27910">CVE-2026-27910</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33824">CVE-2026-33824</a></td><td><p>Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27912">CVE-2026-27912</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26180">CVE-2026-26180</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26163">CVE-2026-26163</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32215">CVE-2026-32215</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32217">CVE-2026-32217</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32218">CVE-2026-32218</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26169">CVE-2026-26169</a></td><td><p>Windows Kernel Memory Information Disclosure Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32071">CVE-2026-32071</a></td><td><p>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27929">CVE-2026-27929</a></td><td><p>Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20930">CVE-2026-20930</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26162">CVE-2026-26162</a></td><td><p>Windows OLE Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32084">CVE-2026-32084</a></td><td><p>Windows Print Spooler Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27927">CVE-2026-27927</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26184">CVE-2026-26184</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32069">CVE-2026-32069</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32074">CVE-2026-32074</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32078">CVE-2026-32078</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26167">CVE-2026-26167</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32158">CVE-2026-32158</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32159">CVE-2026-32159</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32160">CVE-2026-32160</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26172">CVE-2026-26172</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20928">CVE-2026-20928</a></td><td><p>Windows Recovery Environment Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27909">CVE-2026-27909</a></td><td><p>Windows Search Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26161">CVE-2026-26161</a></td><td><p>Windows Sensor Data Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26174">CVE-2026-26174</a></td><td><p>Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26154">CVE-2026-26154</a></td><td><p>Windows Server Update Service (WSUS) Tampering Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27918">CVE-2026-27918</a></td><td><p>Windows Shell Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32151">CVE-2026-32151</a></td><td><p>Windows Shell Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32225">CVE-2026-32225</a></td><td><p>Windows Shell Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32202">CVE-2026-32202</a></td><td><p>Windows Shell Spoofing Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32082">CVE-2026-32082</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32083">CVE-2026-32083</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32068">CVE-2026-32068</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32183">CVE-2026-32183</a></td><td><p>Windows Snipping Tool Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33829">CVE-2026-33829</a></td><td><p>Windows Snipping Tool Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32089">CVE-2026-32089</a></td><td><p>Windows Speech Brokered Api Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32090">CVE-2026-32090</a></td><td><p>Windows Speech Brokered Api Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32153">CVE-2026-32153</a></td><td><p>Windows Speech Runtime Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33827">CVE-2026-33827</a></td><td><p>Windows TCP/IP Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27908">CVE-2026-27908</a></td><td><p>Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27921">CVE-2026-27921</a></td><td><p>Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27915">CVE-2026-27915</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27919">CVE-2026-27919</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32075">CVE-2026-32075</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27916">CVE-2026-27916</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27920">CVE-2026-27920</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32077">CVE-2026-32077</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27925">CVE-2026-27925</a></td><td><p>Windows UPnP Device Host Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32156">CVE-2026-32156</a></td><td><p>Windows UPnP Device Host Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32165">CVE-2026-32165</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27911">CVE-2026-27911</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32163">CVE-2026-32163</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32164">CVE-2026-32164</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23670">CVE-2026-23670</a></td><td><p>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27917">CVE-2026-27917</a></td><td><p>Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33103">CVE-2026-33103</a></td><td><p>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26149">CVE-2026-26149</a></td><td><p>Microsoft Power Apps Security Feature Bypass</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.0</p></td></tr></tbody></table><p></p><p></p><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32188">CVE-2026-32188</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32189">CVE-2026-32189</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32197">CVE-2026-32197</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32198">CVE-2026-32198</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32199">CVE-2026-32199</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32190">CVE-2026-32190</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32200">CVE-2026-32200</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20945">CVE-2026-20945</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32201">CVE-2026-32201</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33822">CVE-2026-33822</a></td><td><p>Microsoft Word Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33095">CVE-2026-33095</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23657">CVE-2026-23657</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33114">CVE-2026-33114</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33115">CVE-2026-33115</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40386">CVE-2026-40386</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>4.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40385">CVE-2026-40385</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>4.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-40393">CVE-2026-40393</a></td><td><p></p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31416">CVE-2026-31416</a></td><td><p>netfilter: nfnetlink_log: account for netlink header size</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31423">CVE-2026-31423</a></td><td><p>net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31424">CVE-2026-31424</a></td><td><p>netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31417">CVE-2026-31417</a></td><td><p>net/x25: Fix overflow when accumulating packets</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31422">CVE-2026-31422</a></td><td><p>net/sched: cls_flow: fix NULL pointer dereference on shared blocks</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31414">CVE-2026-31414</a></td><td><p>netfilter: nf_conntrack_expect: use expect-&gt;helper</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31427">CVE-2026-31427</a></td><td><p>netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31426">CVE-2026-31426</a></td><td><p>ACPI: EC: clean up handlers on probe failure in acpi_ec_setup()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31419">CVE-2026-31419</a></td><td><p>net: bonding: fix use-after-free in bond_xmit_broadcast()</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31420">CVE-2026-31420</a></td><td><p>bridge: mrp: reject zero test interval to avoid OOM panic</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31421">CVE-2026-31421</a></td><td><p>net/sched: cls_fw: fix NULL pointer dereference on shared blocks</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31428">CVE-2026-31428</a></td><td><p>netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-31418">CVE-2026-31418</a></td><td><p>netfilter: ipset: drop logically empty buckets in mtype_del</p></td><td><p>n/a</p></td><td><p>No</p></td><td><p>8.1</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33120">CVE-2026-33120</a></td><td><p>Microsoft SQL Server Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32167">CVE-2026-32167</a></td><td><p>SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32176">CVE-2026-32176</a></td><td><p>SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr></tbody></table><h3>System Center vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33825">CVE-2026-33825</a></td><td><p>Microsoft Defender Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>Yes</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32072">CVE-2026-32072</a></td><td><p>Active Directory Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-20585">CVE-2023-20585</a></td><td><p>AMD: CVE-2023-20585 IOMMU Write Buffer Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25184">CVE-2026-25184</a></td><td><p>Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32181">CVE-2026-32181</a></td><td><p>Connected User Experiences and Telemetry Service Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27924">CVE-2026-27924</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32152">CVE-2026-32152</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32154">CVE-2026-32154</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27923">CVE-2026-27923</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32155">CVE-2026-32155</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33096">CVE-2026-33096</a></td><td><p>HTTP.sys Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26181">CVE-2026-26181</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32219">CVE-2026-32219</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32091">CVE-2026-32091</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26152">CVE-2026-26152</a></td><td><p>Microsoft Cryptographic Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26155">CVE-2026-26155</a></td><td><p>Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27914">CVE-2026-27914</a></td><td><p>Microsoft Management Console Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25250">CVE-2026-25250</a></td><td><p>MITRE: CVE-2026-25250 Secure Boot disable Eazy Fix</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32081">CVE-2026-32081</a></td><td><p>Package Catalog Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26170">CVE-2026-26170</a></td><td><p>PowerShell Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26183">CVE-2026-26183</a></td><td><p>Remote Access Management service/API (RPC server) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32157">CVE-2026-32157</a></td><td><p>Remote Desktop Client Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26160">CVE-2026-26160</a></td><td><p>Remote Desktop Licensing Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26159">CVE-2026-26159</a></td><td><p>Remote Desktop Licensing Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26151">CVE-2026-26151</a></td><td><p>Remote Desktop Spoofing Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32085">CVE-2026-32085</a></td><td><p>Remote Procedure Call Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-0390">CVE-2026-0390</a></td><td><p>UEFI Secure Boot Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32220">CVE-2026-32220</a></td><td><p>UEFI Secure Boot Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32212">CVE-2026-32212</a></td><td><p>Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32214">CVE-2026-32214</a></td><td><p>Universal Plug and Play (upnp.dll) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32079">CVE-2026-32079</a></td><td><p>Web Account Manager Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33104">CVE-2026-33104</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33826">CVE-2026-33826</a></td><td><p>Windows Active Directory Remote Code Execution Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32196">CVE-2026-32196</a></td><td><p>Windows Admin Center Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26178">CVE-2026-26178</a></td><td><p>Windows Advanced Rasterization Platform Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32073">CVE-2026-32073</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26168">CVE-2026-26168</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26173">CVE-2026-26173</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26177">CVE-2026-26177</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26182">CVE-2026-26182</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27922">CVE-2026-27922</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33099">CVE-2026-33099</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33100">CVE-2026-33100</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32088">CVE-2026-32088</a></td><td><p>Windows Biometric Service Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27913">CVE-2026-27913</a></td><td><p>Windows BitLocker Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26175">CVE-2026-26175</a></td><td><p>Windows Boot Manager Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26176">CVE-2026-26176</a></td><td><p>Windows Client Side Caching driver (csc.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27926">CVE-2026-27926</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32162">CVE-2026-32162</a></td><td><p>Windows COM Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20806">CVE-2026-20806</a></td><td><p>Windows COM Server Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32070">CVE-2026-32070</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33098">CVE-2026-33098</a></td><td><p>Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26153">CVE-2026-26153</a></td><td><p>Windows Encrypted File System (EFS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32087">CVE-2026-32087</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32093">CVE-2026-32093</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32086">CVE-2026-32086</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32150">CVE-2026-32150</a></td><td><p>Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27931">CVE-2026-27931</a></td><td><p>Windows GDI Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27930">CVE-2026-27930</a></td><td><p>Windows GDI Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32221">CVE-2026-32221</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27906">CVE-2026-27906</a></td><td><p>Windows Hello Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27928">CVE-2026-27928</a></td><td><p>Windows Hello Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26156">CVE-2026-26156</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32149">CVE-2026-32149</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27910">CVE-2026-27910</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33824">CVE-2026-33824</a></td><td><p>Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27912">CVE-2026-27912</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26179">CVE-2026-26179</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26180">CVE-2026-26180</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32195">CVE-2026-32195</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26163">CVE-2026-26163</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32215">CVE-2026-32215</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32217">CVE-2026-32217</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32218">CVE-2026-32218</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26169">CVE-2026-26169</a></td><td><p>Windows Kernel Memory Information Disclosure Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32071">CVE-2026-32071</a></td><td><p>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27929">CVE-2026-27929</a></td><td><p>Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20930">CVE-2026-20930</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26162">CVE-2026-26162</a></td><td><p>Windows OLE Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33101">CVE-2026-33101</a></td><td><p>Windows Print Spooler Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32084">CVE-2026-32084</a></td><td><p>Windows Print Spooler Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27927">CVE-2026-27927</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26184">CVE-2026-26184</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32069">CVE-2026-32069</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32074">CVE-2026-32074</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32078">CVE-2026-32078</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26167">CVE-2026-26167</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32158">CVE-2026-32158</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32159">CVE-2026-32159</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32160">CVE-2026-32160</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26172">CVE-2026-26172</a></td><td><p>Windows Push Notifications Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20928">CVE-2026-20928</a></td><td><p>Windows Recovery Environment Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32216">CVE-2026-32216</a></td><td><p>Windows Redirected Drive Buffering System Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27909">CVE-2026-27909</a></td><td><p>Windows Search Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26161">CVE-2026-26161</a></td><td><p>Windows Sensor Data Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26174">CVE-2026-26174</a></td><td><p>Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32224">CVE-2026-32224</a></td><td><p>Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26154">CVE-2026-26154</a></td><td><p>Windows Server Update Service (WSUS) Tampering Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26165">CVE-2026-26165</a></td><td><p>Windows Shell Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26166">CVE-2026-26166</a></td><td><p>Windows Shell Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27918">CVE-2026-27918</a></td><td><p>Windows Shell Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32151">CVE-2026-32151</a></td><td><p>Windows Shell Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32225">CVE-2026-32225</a></td><td><p>Windows Shell Security Feature Bypass Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32202">CVE-2026-32202</a></td><td><p>Windows Shell Spoofing Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32082">CVE-2026-32082</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32083">CVE-2026-32083</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32068">CVE-2026-32068</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32183">CVE-2026-32183</a></td><td><p>Windows Snipping Tool Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33829">CVE-2026-33829</a></td><td><p>Windows Snipping Tool Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32089">CVE-2026-32089</a></td><td><p>Windows Speech Brokered Api Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32090">CVE-2026-32090</a></td><td><p>Windows Speech Brokered Api Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32153">CVE-2026-32153</a></td><td><p>Windows Speech Runtime Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27907">CVE-2026-27907</a></td><td><p>Windows Storage Spaces Controller Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32076">CVE-2026-32076</a></td><td><p>Windows Storage Spaces Controller Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33827">CVE-2026-33827</a></td><td><p>Windows TCP/IP Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27908">CVE-2026-27908</a></td><td><p>Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27921">CVE-2026-27921</a></td><td><p>Windows TDI Translation Driver (tdx.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27915">CVE-2026-27915</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27919">CVE-2026-27919</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32075">CVE-2026-32075</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27916">CVE-2026-27916</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27920">CVE-2026-27920</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32077">CVE-2026-32077</a></td><td><p>Windows UPnP Device Host Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27925">CVE-2026-27925</a></td><td><p>Windows UPnP Device Host Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32156">CVE-2026-32156</a></td><td><p>Windows UPnP Device Host Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32223">CVE-2026-32223</a></td><td><p>Windows USB Printing Stack (usbprint.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32165">CVE-2026-32165</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27911">CVE-2026-27911</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32163">CVE-2026-32163</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32164">CVE-2026-32164</a></td><td><p>Windows User Interface Core Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23670">CVE-2026-23670</a></td><td><p>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32080">CVE-2026-32080</a></td><td><p>Windows WalletService Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-27917">CVE-2026-27917</a></td><td><p>Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32222">CVE-2026-32222</a></td><td><p>Windows Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h2>Zero-Day Vulnerabilities: Known Exploited</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-32201">CVE-2026-32201</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h2>Zero-Day Vulnerabilities: Publicly Disclosed (No known exploitation)</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33825">CVE-2026-33825</a></td><td><p>Microsoft Defender Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>Yes</p></td><td><p>7.8</p></td></tr></tbody></table><h2>Critical RCEs and EoPs</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-33824">CVE-2026-33824</a></td><td><p>Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><p></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-april-2026</link>
      <guid isPermaLink="false">blt6be9cec698ae1713</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 14 Apr 2026 21:48:16 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Your Cloud Detection Strategy in 2026: What to Expect at the Global Cybersecurity Summit]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Cloud environments have changed how security teams detect and respond to threats. Signals come from more places, identities are harder to track, and attacks rarely stay within a single system. For many teams, the challenge is no longer visibility. It is having the risk context to understand what matters and act on it quickly. This shift is reflected in the conversations shaping this year’s Rapid7 Global Cybersecurity Summit.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Taking place May 12-13, the summit explores how detection and response are evolving across cloud, identity, and endpoint environments. The focus is practical: how attacks actually unfold, how teams respond under pressure, and how detection strategies need to adapt.</span></p><h2 style="direction: ltr;">Detection is no longer just about coverage</h2><p style="direction: ltr;"><span style='font-size: undefined;'>One of the clearest themes across the agenda is that traditional detection models are struggling to keep pace with attackers. Environments are more dynamic, and attackers are more targeted. Catching everything is no longer realistic, and in many cases it is not useful.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sessions like </span><span style='font-size: undefined;'><em>The New Rules of Detection Engineering</em></span><span style='font-size: undefined;'> will examine this shift in detail. The focus moves away from volume and toward precision. It will ask questions like: What makes a detection meaningful? How should teams prioritize signals? And how can detection strategies support real outcomes rather than just generate alerts? This is especially important in cloud environments, where context changes quickly and signals are often incomplete.</span></p><h2 style="direction: ltr;">Understanding how attacks actually unfold</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To improve detection, teams need to understand how attacks behave in practice. Several sessions across the summit focus on this directly.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em>The Reality of Running a SOC in 2026</em></span><span style='font-size: undefined;'> will explore how modern attacks begin — from identity misuse to cloud misconfigurations— and how they evolve over time. Rather than following a predictable path, attacks move across systems, taking advantage of gaps in visibility and delayed decisions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This theme continues in sessions like </span><span style='font-size: undefined;'><em>Inside the Modern SOC</em></span><span style='font-size: undefined;'>, where attendees follow a real investigation from first alert to outcome. These walkthroughs show how signals are correlated across environments and how decisions are made when time and clarity are limited.</span></p><h2 style="direction: ltr;">From exposure to runtime risk</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud security also requires a closer connection between exposure and detection. In many cases, incidents begin long before an alert is triggered.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Sessions such as </span><span style='font-size: undefined;'><em>From Cloud Exposure to Runtime Attack</em></span><span style='font-size: undefined;'> explore how misconfigurations, permissions, and overlooked risks lead to active threats. The focus is on how teams connect exposure insights with runtime behavior to improve prioritization and respond earlier in the attack lifecycle.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is a practical shift. Detection is no longer a separate function but part of a broader process that starts with understanding exposure and continues through to response.</span></p><h2 style="direction: ltr;">What this means for security teams</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Across these sessions, a consistent message emerges: Detection strategies need to be grounded in how environments actually behave, not how they are expected to behave.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This means focusing on signal quality rather than volume, connecting data across cloud, identity, and endpoint, and building workflows that support faster decisions. It also means accepting that not all alerts have equal weight, and that prioritization is a core part of modern detection.</span></p><h2 style="direction: ltr;">A preview of what’s to come</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud detection is just one part of a broader shift happening across the summit. Sessions on MDR, AI, and exposure management all connect back to the same idea. Security operations must move earlier, reduce noise, and act with greater confidence.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If you are rethinking how your team detects and responds to threats in cloud and hybrid environments, this is where those conversations come together.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Join us May 12–13 and see how security teams are evolving their detection strategies for 2026.</span></p><p style="direction: ltr;"><a href="https://rapid7.brighttalk.com/?utm_source=blog&amp;utm_medium=website&amp;utm_content=blog-4&amp;utm_campaign=global-pla-2026-global-virtual-summit-prospect-eng-etos-25" target="_blank"><span style='font-size: undefined;'>Register now</span></a><span style='font-size: undefined;'>.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-2026-cloud-detection-strategy-global-cybersecurity-summit</link>
      <guid isPermaLink="false">bltd18c4014441bcc9f</guid>
      <category><![CDATA[Events]]></category>
      <category><![CDATA[Cloud Security]]></category><dc:creator><![CDATA[Emma Burdett]]></dc:creator>
      <pubDate>Tue, 14 Apr 2026 12:31:19 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7652fa46396969f5/69a59e6cfbdb4d75ad7755a9/REQ-14706_-_1600x900px.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Turning Log Lines into Answers: Instant Clarity for SOC Teams]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security teams are flooded with logs, yet every alert demands fast, accurate context. In Verizon’s 2025 Data Breach Investigations Report [1], they analyzed 22,052 security incidents, of which 12,195 (55%) were confirmed breaches, underscoring how much activity teams must sift through to find what matters.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In practice, that means dozens of investigations per shift, each requiring fast judgment with incomplete context. A 2024 SANS survey shows that SOC teams report alert volume, limited context, and lack of automation continue to slow investigation and response [2].</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Speed suffers. So does consistency.</span></p><h2>Turn raw logs into a clear narrative</h2><p style="direction: ltr;"><span style='font-size: undefined;'>AI-Powered Log Summary in Rapid7 </span><a href="https://www.rapid7.com/products/siem/" target="_blank"><span style='font-size: undefined;'>Incident Command</span></a><span style='font-size: undefined;'> transforms raw log data into a clear, concise narrative directly within the investigation workflow. Analysts see what happened, why it matters, and what to do next in seconds, not minutes.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Instead of decoding logs line by line, analysts get:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Instant identification of who initiated the activity.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Fast understanding of exactly which actions occurred.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Clarity into when and where events unfolded.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Connectivity into why that behavior matters.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Analysts stay grounded in the original data, but they no longer have to fight through it to find answers. The summary provides immediate orientation and focus, keeping their focus on what to do next.</span></p><h2>Built for real SOC workflows</h2><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd486f0d5dee3b972/69dce931b6cab3fa67533b82/AI-Powered-Log-Summary-Endpoint-Activity-Detail.png" height="970" alt="AI-Powered-Log-Summary-Endpoint-Activity-Detail.png" caption="Figure 1: AI-Powered Log Summary Endpoint Activity Detail" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="AI-Powered-Log-Summary-Endpoint-Activity-Detail.png" width="1553" style="width: 1553px; height: 970px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd486f0d5dee3b972/69dce931b6cab3fa67533b82/AI-Powered-Log-Summary-Endpoint-Activity-Detail.png" data-sys-asset-uid="bltd486f0d5dee3b972" data-sys-asset-filename="AI-Powered-Log-Summary-Endpoint-Activity-Detail.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: AI-Powered Log Summary Endpoint Activity Detail" data-sys-asset-alt="AI-Powered-Log-Summary-Endpoint-Activity-Detail.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: AI-Powered Log Summary Endpoint Activity Detail</figcaption></div></figure><p style="direction: ltr;"><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>AI-Powered Log Summary is embedded directly into the log search workflow. No pivoting, and no context switching. With a single action, analysts generate a contextual summary tailored to their results in seconds. That means faster investigations without breaking flow.</span></p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Summaries can be shared with teammates or leadership to communicate findings quickly, without rewriting technical details into plain language. Everyone stays aligned on what happened and what comes next.</span></p><h2>AI integration in action</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 leverages the best available technology to protect our customers' attack surfaces. Our mission drives us to keep abreast of the latest AI advancements to deliver optimal value to customers while effectively managing the inherent risks of the technology. Integrating AI into our core processes enhances our operational security and underscores our commitment to ethical innovation. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At Rapid7, we are dedicated to leading responsibly in the AI space, ensuring that our technological advancements positively contribute to our customers, company, and society. Read </span><a href="https://www.rapid7.com/blog/post/2024/05/15/ai-trust-risk-and-security-management-why-tackle-them-now/" target="_blank"><span style='font-size: undefined;'>more</span></a><span style='font-size: undefined;'> about how our TRiSM (Trust, Risk, and Security Management) is a foundational strategy that guides us in navigating the intricate landscape of AI with confidence and security.</span></p><h2>Less noise, more impact</h2><p style="direction: ltr;"><span style='font-size: undefined;'>By reducing time spent parsing logs, teams can focus on what matters: containment, remediation, and proactive threat hunting.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf65315198953e261/69dce9f17ec141c209b1210c/AI-Powered-Log-Summary-Web-Proxy-Detail.png" alt="AI-Powered-Log-Summary-Web-Proxy-Detail.png" caption="Figure 2: AI-Powered Log Summary Web Proxy Detail" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="AI-Powered-Log-Summary-Web-Proxy-Detail.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf65315198953e261/69dce9f17ec141c209b1210c/AI-Powered-Log-Summary-Web-Proxy-Detail.png" data-sys-asset-uid="bltf65315198953e261" data-sys-asset-filename="AI-Powered-Log-Summary-Web-Proxy-Detail.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: AI-Powered Log Summary Web Proxy Detail" data-sys-asset-alt="AI-Powered-Log-Summary-Web-Proxy-Detail.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: AI-Powered Log Summary Web Proxy Detail</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>This brings analysts:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Faster triage and investigations.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>More consistent analysis across shifts.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Lower cognitive load during high-volume periods.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Clear communication to stakeholders.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 is at the vanguard of integrating AI into its products to accelerate outcomes for our customers, with a particular focus on amplifying analyst impact and bringing speed and clarity to SOC operations throughout the threat detection and response lifecycle. </span></p><p><span style='font-size: undefined;'>That is how modern SOC teams move faster. Visit the </span><a href="https://www.rapid7.com/products/siem/" target="_blank"><span style='font-size: undefined;'>Incident Command page</span></a><span style='font-size: undefined;'> for more information. </span></p><p>⠀</p><p><span style='font-size: undefined;'><em>[1] </em></span><a href="https://www.verizon.com/business/resources/reports/2025-dbir-data-breach-investigations-report.pdf"><span style='font-size: undefined;'><em>Verizon 2025 DBIR</em></span></a></p><p><em>[2] </em><a href="https://swimlane.com/wp-content/uploads/SANS-SOC-Survey_2024.pdf"><span style='font-size: undefined;'><em>SANS 2024 SOC Survey</em></span></a></p>]]></description>
      <link>https://www.rapid7.com/blog/post/dr-log-lines-into-answers-instant-soc-clarity-ai</link>
      <guid isPermaLink="false">blteb5b02e980e90540</guid>
      <category><![CDATA[SIEM]]></category>
      <category><![CDATA[Product Updates]]></category>
      <category><![CDATA[Artificial Intelligence]]></category>
      <category><![CDATA[Log Management]]></category><dc:creator><![CDATA[Sean O'Brien]]></dc:creator>
      <pubDate>Mon, 13 Apr 2026 12:57:53 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 04/10/2026]]></title>
      <description><![CDATA[<h2>Speedup Improvements of MSFVenom & New Modules</h2><p>This week, we have added new modules to Metasploit Framework targeting Cisco Catalyst SD-WAN controllers and osTicket as well as updates and improvements to Windows service-for-user persistence, and LDAP/ADCS-related modules to automatically report related services resulting in an improved data stream, which can be queried by using the services command.</p><p>We also landed an improvement to msfvenom’s bootup time, thanks to <a href="https://github.com/bcoles">bcoles</a>, resulting in an approximate two-times speedup.</p><h2>New module content (4)</h2><h3>AD/CS Authenticated Web Enrollment Services Module</h3><p>Authors: Spencer McIntyre, bwatters-r7, and jhicks-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20752">#20752</a> contributed by <a href="https://github.com/bwatters-r7">bwatters-r7</a></p><p>Path: admin/http/web_enrollment_cert</p><p>Description: This adds a new auxiliary/admin/http/web_enrollment_cert modules that allows certificates to be issued from an Active Directory Certificate Services Web Enrollment portal. Its usage is the same as the auxiliary/admin/http/icpr_cert module but enables operators to issue certificates when the web enrollment portal is accessible but the MS-ICPR service is not.</p><h3>Cisco Catalyst SD-WAN Controller Authentication Bypass</h3><p>Author: sfewer-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21158">#21158</a> contributed by <a href="https://github.com/sfewer-r7">sfewer-r7</a></p><p>Path: admin/networking/cisco_sdwan_auth_bypass</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-20127&amp;referrer=blog">CVE-2026-20127</a></p><p>Description: This adds an auxiliary module to exploit an authentication bypass vulnerability, CVE-2026-20127, affecting Cisco Catalyst SD-WAN Controller. Recently exploited in the wild as a zero-day.</p><h3>osTicket Arbitrary File Read via PHP Filter Chains in mPDF</h3><p>Authors: Arkaprabha Chakraborty &lt;@t1nt1nsn0wy&gt; and HORIZON3.ai Team</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20948">#20948</a> contributed by <a href="https://github.com/ArkaprabhaChakraborty">ArkaprabhaChakraborty</a></p><p>Path: gather/osticket_arbitrary_file_read</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-22200&amp;referrer=blog">CVE-2026-22200</a></p><p>Description: This adds an auxiliary module to exploit, CVE-2026-22200, an authenticated file read vulnerability in osTicket.</p><h3>Windows Service for User (S4U) Scheduled Task Persistence - Event Trigger</h3><p>Authors: Brandon McCann "zeknox" <a href="mailto:bmccann@accuvant.com">bmccann@accuvant.com</a>, Thomas McCarthy "smilingraccoon" <a href="mailto:smilingraccoon@gmail.com">smilingraccoon@gmail.com</a>, and h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20814">#20814</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: windows/persistence/service_for_user/event</p><p>Description: Updates the Windows service-for-user persistence technique.</p><h2>Enhancements and features (7)</h2><ul><li><p><a href="https://github.com/rapid7/metasploit-framework/pull/20814">#20814</a> from <a href="https://github.com/h00die">h00die</a> - Updates the Windows service-for-user persistence technique.</p></li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20973">#20973</a> from <a href="https://github.com/bitstr3m-48">bitstr3m-48</a> - This release enables command execution for non-interactive HWBridge sessions via the sessions -c flag. Additionally, the hwbridge/connect module now preserves parsed JSON error bodies from failed HTTP responses, which improves error messaging.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20977">#20977</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This updates the exploit/unix/webapp/php_eval module to have a FORMDATA datastore option, which adds HTTP POST-request support and makes the HEADERS datastore option consistent with other modules.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20979">#20979</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This updates the exploit/unix/webapp/php_include module with additional datastore options and make its usage more consistent with the similar exploit/unix/webapp/php_eval module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21031">#21031</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Enhances the Metasploit’s LDAP/ADCS-related modules to automatically report related services (LDAP, DCERPC/ICertPassage/ADCS CA) and to improve vulnerability reporting by associating findings with the affected LDAP object’s DN (and, for ADCS template findings, the template name) so results are uniquely keyed and easier to interpret.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21143">#21143</a> from <a href="https://github.com/SaiSakthidar">SaiSakthidar</a> - This bumps the Metasploit payloads to include changes that enable the PHP Meterpreter to open TCP server sockets. This enables operators to listen for inbound connections on compromised hosts and closes a feature gap between PHP and the other Meterpreters.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21229">#21229</a> from <a href="https://github.com/bcoles">bcoles</a> - This updates the msfvenom utility to use the metadata cache. The result is roughly 2x faster execution times when listing modules</li></ul><h2>Bugs fixed (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21153">#21153</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - This fixes an issue with some mutable constant datastore options. Using shared options like CHOST or CPORT are not changing visibility across modules anymore.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21221">#21221</a> from <a href="https://github.com/cgranleese-r7">cgranleese-r7</a> - This PR improves module_doc_template.md with examples to better guide contributors.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-02T10%3A24%3A13Z..2026-04-08T15%3A01%3A17Z%22">Pull Requests 6.4.125...6.4.126</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.125...6.4.126">Full diff 6.4.125...6.4.126</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026</link>
      <guid isPermaLink="false">blte1ac7b403beedf01</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Simon Janusz]]></dc:creator>
      <pubDate>Fri, 10 Apr 2026 19:11:43 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
  </channel>
</rss>