Briefs
April 2026 (30)
ABB Ability OPTIMAX Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVECVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.
ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution
2 rules 3 TTPs 3 CVEsMultiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.
ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure
3 rules 1 TTP 3 CVEsMultiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).
ABB Edgenius Management Portal Authentication Bypass Vulnerability
2 rules 1 TTP 1 CVEAn authentication bypass vulnerability in ABB Edgenius Management Portal versions 3.2.0.0 and 3.2.1.1 allows attackers to execute arbitrary code and modify application configurations by sending a specially crafted message to the system node.
Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation
2 rules 1 TTPA local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.
Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution
3 rules 3 TTPsMultiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.
Multiple Vulnerabilities in Absolute Secure Access
2 rules 3 TTPs 1 CVEMultiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.
Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.
Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS
2 rules 3 TTPs 3 CVEsMultiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.
Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath
2 rules 4 TTPsA remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.
libsndfile Vulnerability Allows Denial of Service
2 rules 1 TTPA remote, unauthenticated attacker can exploit an unpatched vulnerability in libsndfile to cause a denial of service.
CUPS Vulnerability Allows Local Privilege Escalation
2 rules 1 TTPA local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.
Multiple Vulnerabilities in CUPS
2 rules 4 TTPs 1 CVEMultiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.
Sudo Privilege Escalation Vulnerabilities
2 rules 1 TTP 2 CVEsMultiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.
GIMP Multiple Vulnerabilities Allow Remote Code Execution
2 rules 1 TTP 5 CVEsA remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.
Multiple Vulnerabilities in Google Chrome
2 rules 5 TTPs 5 CVEsMultiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.
PackageKit Local Privilege Escalation Vulnerability
2 rules 1 TTPA local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.
Multiple Vulnerabilities in Xen and Citrix Systems XenServer
3 rules 7 TTPsMultiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.
DNSdist Multiple Vulnerabilities Leading to Denial of Service
2 rules 1 TTP 1 CVEMultiple vulnerabilities in DNSdist can be exploited by an attacker to perform a denial of service attack, impacting the availability of DNS services.
Multiple Vulnerabilities in Wazuh Allow for Code Execution and Data Manipulation
2 rules 6 TTPs 5 CVEsMultiple vulnerabilities in Wazuh allow an attacker to perform a denial of service attack, execute arbitrary code, manipulate data, disclose confidential information, or bypass security measures.
OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)
2 rules 2 TTPs 1 CVECVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.
CVE-2026-28388 NULL Pointer Dereference in Delta CRL Processing
2 rules 1 CVECVE-2026-28388 is a NULL Pointer Dereference vulnerability in an unspecified Microsoft product when processing a Delta CRL, potentially leading to a denial-of-service condition.
CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability
2 rules 1 TTP 1 CVECVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.
CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access
2 rules 1 CVECVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.
CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption
2 rules 1 TTP 1 CVECVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.
CVE-2026-34073: Incomplete DNS Name Constraint Enforcement Vulnerability
2 rules 1 CVECVE-2026-34073 is a vulnerability in unspecified Microsoft products due to incomplete DNS name constraint enforcement on peer names, potentially leading to certificate validation bypass.
Microsoft CVE-2026-32778 Vulnerability Published
2 rules 1 CVEMicrosoft published information regarding vulnerability CVE-2026-32778, but no details regarding the vulnerability are available at this time.
Microsoft Published Information on CVE-2026-32776
1 CVEMicrosoft published information regarding CVE-2026-32776, however, further details require JavaScript to be enabled, limiting the actionable intelligence at this time.
Microsoft Published Information on CVE-2026-32777
1 CVEMicrosoft has published information regarding CVE-2026-32777, but no further details regarding the vulnerability or its exploitation are currently available.
Tenda 4G300 Stack-Based Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEA remote stack-based buffer overflow vulnerability exists in the Tenda 4G300 router, version US_4G300V1.0Mt_V1.01.42_CN_TDC01, allowing an attacker to potentially execute arbitrary code by manipulating the 'page' argument to the sub_427C3C function in the /goform/SafeMacFilter file.