Skip to content
Threat Feed

March 2026 (30)

high advisory

CVE-2026-2328 Unauthenticated Path Traversal Vulnerability

CVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.

path-traversal vulnerability webserver
2r 1t
medium advisory

CrowdStrike Falcon Cloud Security Advances CNAPP with Adversary-Informed Risk Prioritization

CrowdStrike Falcon Cloud Security enhances its CNAPP capabilities, incorporating adversary intelligence to prioritize cloud risks based on threat actor behavior, particularly focusing on groups like LABYRINTH CHOLLIMA and SCATTERED SPIDER, to enable security teams to understand and remediate cloud exposures more effectively.

Lazarus Group +10 cloud-security cnapp threat-intelligence
2r 5t
high advisory

Securing AI Agents and Governing Shadow AI

CrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.

AI agentic-soc shadow-ai
2r 1t
critical advisory

Compromised trivy-action GitHub Action Leads to Credential Theft

The aquasecurity/trivy-action GitHub Action was compromised via git tag repointing, injecting a multi-stage credential stealer into CI/CD pipelines, allowing for the theft of secrets and credentials.

supply-chain credential-theft github-actions
2r 1t
high advisory

GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)

GitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.

gitlab jira authentication authorization cve-2026-2370
2r 2t
critical advisory

Xiongmai DVR/NVR Root OS Command Injection Vulnerability (CVE-2026-34005)

Xiongmai DVR/NVR devices are vulnerable to root OS command injection (CVE-2026-34005) due to shell metacharacters in the HostName value, exploitable via an authenticated DVRIP request, potentially allowing arbitrary command execution with root privileges.

CVE-2026-34005 command-injection xiongmai dvr nvr
2r 1t
high advisory

OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability

The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.

openclaw vulnerability authorization
2r 1t
high advisory

Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)

A remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.

traefik grpc authorization-bypass cve-2026-33186
2r 1t
high advisory

XPath Boolean Expression DoS Vulnerability

A vulnerability in the antchfx/xpath package allows for denial of service via CPU exhaustion by exploiting boolean expressions that evaluate to true, leading to an infinite loop.

xpath denial-of-service cve-2026-32287
2r 1t
critical advisory

Tenda FH1201 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5046)

A stack-based buffer overflow vulnerability (CVE-2026-5046) in Tenda FH1201 version 1.2.0.14(408) allows remote attackers to execute arbitrary code by manipulating the GO argument in the formWrlExtraSet function of the /goform/WrlExtraSet component.

CVE-2026-5046 tenda buffer-overflow router
2r 1t
medium advisory

CrowdStrike Falcon Next-Gen SIEM Supports Third-Party EDR Tools

CrowdStrike's Falcon Next-Gen SIEM now supports third-party EDR solutions, starting with Microsoft Defender, to extend AI-native SOC capabilities without replacing existing endpoint agents.

siem edr threat-intelligence
2r 2t
critical advisory

Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5044) in Belkin F9K1122 version 1.00.33 allows remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the formSetSystemSettings function, potentially leading to complete system compromise.

cve-2026-5044 buffer-overflow belkin router
2r 1t
high advisory

OpenClaw Credential Exposure via Leaked Pairing Codes

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.

credential-access vulnerability openclaw
2r 1t
critical advisory

OpenClaw Bootstrap Code Replay Vulnerability (CVE-2026-32987)

OpenClaw before 2026.3.13 is vulnerable to a replay attack during device pairing verification, allowing attackers to repeatedly verify a bootstrap code and escalate privileges to operator.admin.

replay-attack privilege-escalation device-pairing
2r 2t
high advisory

OpenClaw Code Execution via Script Modification (CVE-2026-32979)

OpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.

cve-2026-32979 code-execution openclaw
2r 1t
medium advisory

OpenClaw Insufficient File Permissions Vulnerability (CVE-2026-33572)

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents and extract sensitive information.

cve-2026-33572 file-permissions credential-access
2r 1t
critical advisory

OpenClaw Exec Allowlist Bypass via POSIX Path Overmatching (CVE-2026-32973)

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability (CVE-2026-32973) due to improper normalization of patterns, allowing attackers to execute unintended commands via wildcard matching in POSIX paths.

cve-2026-32973 openclaw allowlist-bypass
2r 1t
high advisory

OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)

OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.

authentication-bypass webhook cve-2026-32974
2r 1t
critical advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-32922)

OpenClaw before 2026.3.11 is vulnerable to privilege escalation in the device.token.rotate function, allowing attackers with limited operator.pairing scope to mint tokens with elevated operator.admin privileges, potentially leading to remote code execution.

privilege-escalation remote-code-execution cve
2r 2t
high advisory

OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.

openclaw sandbox-escape authorization
2r 1t
high advisory

OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.

insufficient-access-control privilege-escalation web-application
2r 1t
high advisory

OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.

sandbox-escape privilege-escalation cve-2026-32915
2r 2t
critical advisory

Belkin F9K1122 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5042) exists in the Belkin F9K1122 router version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the webpage argument in the formCrossBandSwitch function.

cve-2026-5042 buffer-overflow router
2r 3t
high advisory

Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.

phishing credential-theft cloud
2r 2t
critical advisory

Tenda 4G06 Router Stack-Based Buffer Overflow Vulnerability (CVE-2026-5036)

A stack-based buffer overflow vulnerability (CVE-2026-5036) exists in the fromDhcpListClient function of the Tenda 4G06 router (version 04.06.01.29), potentially allowing remote attackers to execute arbitrary code by manipulating the 'page' argument in the /goform/DhcpListClient endpoint.

cve-2026-5036 buffer-overflow router tenda
2r 1t
high threat

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for risk prioritization, application-layer visibility, and runtime analysis, addressing critical gaps in cloud security and enabling faster remediation based on threat actor behavior like LABYRINTH CHOLLIMA and SCATTERED SPIDER.

Lazarus Group +10 cloud_security cnapp threat_intelligence
3r 3t
high advisory

Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.

ai prompt-injection data-security
2r 5t
high threat

CrowdStrike CNAPP Enhancements Prioritize Risk Based on Adversary Behavior

CrowdStrike's CNAPP enhancements prioritize cloud risk based on adversary behavior, correlating application insights with cloud infrastructure telemetry to identify and address critical exposures targeted by specific threat actors like LABYRINTH CHOLLIMA and SCATTERED SPIDER.

Lazarus Group +10 cloud-security cnapp threat-intelligence
2r 8t
medium advisory

CrowdStrike CNAPP Adds Adversary-Informed Risk Prioritization

CrowdStrike's CNAPP enhancements prioritize cloud risks based on adversary behavior, application context, and configuration change tracking to reduce breach likelihood.

Lazarus Group +10 cnapp cloud-security risk-prioritization
2r 1t
medium advisory

Securing AI Agents with Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents by blocking prompt injection attacks, redacting sensitive data, defanging malicious content, and moderating unwanted topics, ensuring compliance and preventing abuse.

ai-security prompt-injection data-protection
3r 4t