Skip to content
Threat Feed

March 2026 (5)

high advisory

RegPwn Windows Local Privilege Escalation Vulnerability

RegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.

windows lpe privilege-escalation
2r 1t
medium advisory

Kubernetes Endpoint Permission Enumeration

A single user and source IP attempts to enumerate Kubernetes endpoints, issuing API requests across multiple endpoints to identify accessible resources for further exploitation.

kubernetes enumeration discovery
2r 1t
medium advisory

Kubernetes Sensitive Role Creation or Modification

This rule detects the creation or modification of Kubernetes Roles or ClusterRoles that grant high-risk permissions, such as wildcard access or RBAC escalation verbs (e.g., bind, escalate, impersonate), potentially leading to privilege escalation or unauthorized access within the cluster.

kubernetes rbac privilege-escalation persistence
2r 2t
critical advisory

Apache Artemis and ActiveMQ Artemis Authentication Bypass Vulnerability

CVE-2026-27446 allows an unauthenticated remote attacker to inject malicious messages or exfiltrate data from Apache Artemis and ActiveMQ Artemis brokers due to a missing authentication check in the Core protocol.

apache-artemis apache-activemq authentication-bypass message-injection data-exfiltration
2r 5t
low advisory

AWS STS Role Assumption by User

Detection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.

aws privilege-escalation lateral-movement
2r 2t

February 2026 (21)

high advisory

Fortigate VPN CVE-2023-27997 Exploitation Attempt

IDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.

fortigate vpn cve-2023-27997 exploit initial-access
2r 1t
medium advisory

Maltrail IOCs Report: Tracking Multiple Threat Actors

This brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.

maltrail threat-intelligence apt malware
3r 5t 27i
critical advisory

Critical Unauthenticated RCE Vulnerability in Junos OS Evolved

A critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.

junos rce vulnerability
2r 3t
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Platform

Multiple critical vulnerabilities in n8n versions prior to 2.10.1, 2.9.3, and 1.123.22 enable authenticated users to execute arbitrary code and system commands, potentially leading to full system compromise.

n8n code-injection sql-injection vulnerability
3r 3t
critical advisory

Critical Command Injection Vulnerability in Zyxel Routers (CVE-2026-13942)

A critical command injection vulnerability (CVE-2026-13942) in the UPnP function of Zyxel routers allows remote attackers to execute arbitrary operating system commands by sending crafted UPnP SOAP requests.

zyxel router command injection cve-2026-13942 upnp
2r 1t
critical advisory

Mobility46 Charging Station Vulnerabilities Allow Unauthorized Control and Disruption

Multiple vulnerabilities in Mobility46 charging stations allow attackers to gain unauthorized administrative control or disrupt charging services through missing authentication, improper authentication restrictions, insufficient session expiration, and exposed credentials.

mobility46 charging-station vulnerability ics
2r 3t 1i
critical advisory

Multiple Vulnerabilities in SWITCH EV Charging Stations

Multiple vulnerabilities in SWITCH EV swtchenergy.com charging stations could allow attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data due to missing authentication, rate limiting issues, session expiration flaws, and exposed credentials.

electric-vehicle charging-station websocket
2r 7t 1i
high advisory

Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution

Multiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.

ics denial-of-service out-of-bounds write
2r 3t
critical advisory

Critical RCE Vulnerability in Cisco Catalyst SD-WAN Controller

A critical remote code execution vulnerability exists in Cisco Catalyst SD-WAN Controllers (CVE-2026-20127) due to improper authentication, allowing unauthenticated remote attackers to bypass authentication and gain administrative privileges, potentially leading to network configuration manipulation.

cisco sd-wan rce vulnerability
2r 2t
critical advisory

EV2GO Charging Station Vulnerabilities Allow Impersonation and Denial of Service

Multiple vulnerabilities in EV2GO charging stations, including missing authentication and session management flaws, could allow attackers to impersonate stations, hijack sessions, and cause denial-of-service conditions.

ev2go charging-station vulnerability denial-of-service
2r 3t 1i
high advisory

Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability

An authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.

cve-2026-1241 authentication-bypass ip-camera ics
2r 1t
critical advisory

Copeland XWEB and XWEB Pro Multiple Vulnerabilities

Multiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and earlier could allow attackers to bypass authentication, inject commands, and execute arbitrary code, leading to complete system compromise.

copeland xweb vulnerability ics
2r 6t
critical advisory

Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution

Multiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.

solarwinds serv-u rce vulnerability
2r 3t
critical advisory

Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities

Multiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.

ics ot vulnerability
2r 4t
critical advisory

Multiple Vulnerabilities in Chargemap Charging Stations

Unauthenticated attackers can exploit multiple vulnerabilities in Chargemap's charging stations, including missing authentication, improper authentication attempt restrictions, insufficient session expiration, and unprotected credentials, potentially leading to unauthorized control and denial-of-service.

ics ot vulnerability denial-of-service
2r 5t 1i
critical advisory

Multiple Vulnerabilities in EV Energy ev.energy Charging Stations

Multiple vulnerabilities exist in EV Energy ev.energy that could allow an attacker to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.

ev.energy charging-station ics vulnerability dos
2r
high advisory

Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent

Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.

fortigate vpn cve-2023-27997 exploit network
3r 2t
critical advisory

VMware Aria Operations Vulnerabilities Allow Remote Code Execution and Privilege Escalation

Multiple vulnerabilities in VMware Aria Operations, Cloud Foundation, and Telco Cloud Platform/Infrastructure could allow unauthenticated remote code execution (CVE-2026-22719) and privilege escalation (CVE-2026-22720, CVE-2026-22721).

vmware aria-operations rce privilege-escalation
2r 2t
critical advisory

Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution

Critical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.

freescout rce vulnerability apache
2r 2t
critical advisory

Ongoing Exploitation of Cisco SD-WAN Systems

Malicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.

cisco-sdwan vulnerability exploitation network
3r 4t
critical threat

Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)

CVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.

LockBit +2 activemq rce cve-2023-46604 ransomware
2r 2t