<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Beazley Security Labs Advisories</title>
  <link href="https://labs.beazley.security/advisories" rel="alternate"/>
  <id>https://labs.beazley.security/advisories</id>
  <updated>Mon, 09 Mar 2026 23:00:00 GMT</updated>

  <entry><title>Known Abuse of Ivanti EPM Authentication Bypass (CVE-2026-1603)</title><link href="https://labs.beazley.security/advisories/BSL-A1158" rel="alternate"/><updated>2026-03-09T23:00:00.000Z</updated><published>2026-03-09T23:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1158</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On Feb 10th, Ivanti published CVE-2026-1603 to NIST <a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US">disclosing an authentication bypass</a> in Ivanti Endpoint Manager that allowed a &quot;remote unauthenticated attacker to leak specific stored credential data&quot;. Three days later WatchTowr Labs <a href="https://x.com/watchtowrcyber/status/2022305033086235108">discovered and disclosed</a> a hard-coded <code>logintype</code> key that if exploited, bypassed authentication mechanisms allowing an attacker privileged access on an affected device. On March 9th the flaw was confirmed as being actively exploited in the wild when the CVE was added to CISA’s Known Exploited Vulnerabilities Catalog (KEV).</p><p>
Authenticating with this <code>logintype</code> allows future compromise of user sessions and access of arbitrary data on the Endpoint Manager host. Subsequently, Ivanti updated their Security Advisory to claim the vulnerability required an “authenticated user” to bypass authorization.</p><p>
Given confirmed active exploitation and public disclosure, Beazley Security believes that additional threat actors will continue to leverage this flaw to gain unauthorized access unpatched Ivanti systems. Organizations operating Ivanti Endpoint Manager systems should review systems for signs of compromise and patch immediately.
</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p><b>Product</b></p></th><th><p><b>Affected Versions</b></p></th><th><p><b>Fixed Versions</b></p></th><th><p><b>Availability</b></p></th></tr><tr><td><p>Ivanti Endpoint Manager (EPM)</p></td><td><p>2024 SU4 SR1 and prior</p></td><td><p>2024 SU5</p></td><td><p>Available no</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Affected organizations that are unable to immediately patch should ensure strict network access controls are in place. Any organization with a publicly exposed Ivanti EPM product should immediately rotate passwords and access for all EPM accounts, as well as audit authentication logs for any unexplained access.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Ivanti has released fixes for all supported versions of the Ivanti Endpoint Manager in their Ivanti <a href="https://forums.ivanti.com/s/article/How-to-access-software-downloads-in-the-Ivanti-License-System">License System portal</a> which requires login.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>While Ivanti stated it was unaware of customer exploitation prior to public disclosure, CISA confirmed active exploitation of CVE-2026-1603 in the wild as of March 9, 2026, when the vulnerability was added to its KEV catalog.</p><p>Ivanti has not published specific indicators of compromise tied to active exploitation of this vulnerability, however Beazley Security recommends organizations monitor for the following indicators:</p><ul><li><p>Unusual or unexpected access attempts against Ivanti EPM services</p></li><li><p>Unexpected or anomalous administrative actions within the EPM console, such as unauthorized user creations</p></li><li><p>Unexpected or suspicious outbound connections originating from the EPM server</p></li></ul><p>We believe that outside of WAF logs that could identify this specific parameter being passed to an EPM instance, little can be discerned to identify compromises of publicly accessible Ivanti EPM systems running vulnerable software versions.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>WatchTowr disclosed that CVE-2026-1906’s authentication bypass is an undocumented <code>logintype</code> parameter with a value of <code>64</code> provided as a <code>POST</code> request to the <code>/RemoteControlAuth/api/Auth</code> endpoint in Ivanti EPM bypasses regular authenticated attempts.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US">https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US</a></p></li><li><p><a href="https://www.cve.org/CVERecord?id=CVE-2026-1603">https://www.cve.org/CVERecord?id=CVE-2026-1603</a></p></li><li><p><a href="https://x.com/watchtowrcyber/status/2022305033086235108">https://x.com/watchtowrcyber/status/2022305033086235108</a></p></li><li><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p></li></ul></div>]]></content><summary type="html">Known Abuse of Ivanti's Endpoint Manager (EPM) Authentication Bypass (CVE-2026-1603) was reported by CISA's Known Exploited Vulnerabilities Catalog (KEV).</summary></entry><entry><title>Critical Vulnerabilities in Cisco SD-Wan Systems Under Active Exploitation (CVE-2026-20127, CVE-2026-20128, CVE-2026-20122)</title><link href="https://labs.beazley.security/advisories/BSL-A1157" rel="alternate"/><updated>2026-02-25T23:00:00.000Z</updated><published>2026-02-25T23:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1157</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p><b>03/09/2026 Update</b>: Cisco has issued an update to their initial post identifying several more CVEs that affect Cisco Catalyst SD-WAN and Manager systems (CVE-2026-20122, CVE-2026-20126, CVE-2026-20128, CVE-2026-20129, CVE-2026-20133). The CVEs range from medium to critical severity, and Cisco has confirmed that there are no workarounds other than updating any affected products.  Please review the Patching guidance below for actionable information.</p><p>
On February 25<sup>th</sup>, Cisco disclosed a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager systems. The flaw allows an unauthenticated attacker with network access to the SD-WAN peering service to bypass authentication and establish unauthorized control-plane connections.</p><p>Successful exploitation enables an attacker to provision a rogue peer into the SD-WAN fabric and may allow the attacker to obtain elevated access to the affected controller. Cisco Talos has <b>confirmed active exploitation</b> of this vulnerability by a sophisticated threat actor, with evidence of malicious activity dating back to 2023. The vulnerability, now tracked as CVE-2026-20127, was confirmed as a zero-day following investigations in late 2025.</p><p>Given confirmed active exploitation and public disclosure, Beazley Security believes that additional threat actors will begin to weaponize this flaw. Organizations operating Cisco Catalyst SD-WAN systems, especially those with externally accessible peering services, should review systems for signs of compromise and patch immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><p><b>03</b><b>/</b><b>09</b><b>/</b><b>2026 Update</b>: The table has been updated with asterisks identifying changes from the original publication based on additional CVE releases.</p><table><tbody><tr><th><p>Product</p></th><th><p>Affected Versions</p></th><th><p>Fixed Versions</p></th></tr><tr><td><p>Cisco Catalyst SD-WAN
Release</p></td><td><p>20.9</p></td><td><p>20.9.8.2</p></td></tr><tr><td><p>* Cisco Catalyst SD-WAN
Release</p></td><td><p>20.11</p></td><td><p>20.12.6.1</p></td></tr><tr><td><p>* Cisco Catalyst SD-WAN
Release</p></td><td><p>20.12</p></td><td><p>20.12.5.3
20.12.6.1</p></td></tr><tr><td><p>*Cisco Catalyst SD-WAN
Release</p></td><td><p>20.13</p></td><td><p>20.15.4.2</p></td></tr><tr><td><p>*Cisco Catalyst SD-WAN
Release</p></td><td><p>20.14</p></td><td><p>20.15.4.2</p></td></tr><tr><td><p>Cisco Catalyst SD-WAN
Release</p></td><td><p>20.15</p></td><td><p>20.15.4.2</p></td></tr><tr><td><p>*Cisco Catalyst SD-WAN
Release</p></td><td><p>20.16</p></td><td><p>20.18.2.1</p></td></tr><tr><td><p>Cisco Catalyst SD-WAN
Release</p></td><td><p>20.18</p></td><td><p>20.18.2.1</p></td></tr></tbody></table><p>
According to <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk">Cisco’s official advisory</a>, organizations running versions earlier than 20.9, or
versions 20.11, 20.13, 20.14, and 20.16 (which have reached End of Software Maintenance)
should migrate to a supported fixed release immediately.</p></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Cisco has released software updates addressing CVE-2026-20127 and applying the vendor
provided patches to affected Cisco SD-WAN controller and manager systems is the
recommended course of action to reduce risk.</p><p>
Beyond patching, organizations should consider reviewing Cisco’s SD-WAN <a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide">hardening guide</a>
including steps to:</p><ul><li><p>Inventory and audit expected peer networks within SD-WAN infrastructure.</p></li><li><p>Reduce internet exposure by locking SD-WAN controller peering services down to known and authorized peer networks.</p></li><li><p>Restrict access to SD-WAN controller and management planes to a dedicated administrative network.</p></li></ul><p>Affected organizations that are unable to immediately patch should ensure strict network
access controls are in place around SD-WAN controllers, related peering services, and check
audit logs any signs of compromise.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p><b>03/09/2026 Update</b>: Cisco has provided an <a href="https://www.cisco.com/c/dam/en/us/td/docs/Website/enterprise/catalyst-sdwan-upgrade-matrix/index.html">upgrade path tool</a> for upgrading Cisco Catalyst SD-WAN Instances. The initial links below to the <a href="https://software.cisco.com/download/home">software download center</a> are accurate and provide updated patches.</p><p>At the time of writing, Cisco has released fixes for all supported versions of their Catalyst SD-
Wan solution except for 20.9 which is estimated to be released February 27, 2026. Please see
the Affected System and Products section above in this report for additional information.</p><p>
Cisco’s original advisory provides this <a href="https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes">guidance document</a> for obtaining software fixes and the
vendor also hosts a <a href="https://software.cisco.com/download/home">software download center</a> requiring login.</p><p>
Alternatively, customers can contact Cisco’s Technical Assistance Center (TAC) to request
additional software upgrade support.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>A detailed Cisco SD-WAN threat hunting guide has been compiled by multiple agencies
which includes post-exploitation activity and can be found <a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">here</a>.</p><p>
Cisco Talos has also provided <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">validation checks</a> that can be performed within SD-Wan
logging:</p><ul><li><p>Peer type mismatches for your environment, especially vManage peering types if not
expected as exampled in the log below:</p></li></ul><p><code>Feb 20 22:03:33 vSmart-01 VDAEMON_0[2571]: %Viptela-vSmart-VDAEMON_0-5-
NTCE-1000001: control-connection-state-change new-state:up peer-type:vmanage peer-
system-ip:1.1.1.10 public-ip:&lt;unexpected IP> public-port:12345 domain-id:1 site-id:1005</code></p><ul><li><p>Peering connections from unexpected or unrecognized IP addresses</p></li><li><p>Peering connections established outside of expected windows your environment</p></li><li><p>Logs showing indicators of CVE-20222-20775 exploitation - username path traversal
strings (E.g. <code>/../../</code> or <code>/\n&amp;../\n&amp;../</code>).</p></li><li><p>Unexpected reboots, and upgraded versions reverting to previous software versions</p></li><li><p>Evidence of log and history clearing</p></li></ul><p>On March 1st, Cisco published additional <a href="https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/225525-internal-remediate-catalyst-sd-wan.html">remediation and collection guidance</a> to help identify affected and potentially compromised devices.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p><b>03/09/2026 Update</b>: The newly disclosed CVEs are listed below with their associated CVE scores and details:</p><ul><li><p>CVE-2026-20122 - (7.1):
An API vulnerability in Cisco Catalyst SD-WAN Manager allows for authenticated remote attackers with read-only credentials to overwrite arbitrary files on the host system.</p></li><li><p>CVE-2026-20126: - (7.8):
An REST API authentication vulnerability in Cisco Catalyst SD-WAN Manager allows for unauthenticated local attackers to gain root privileges on the host system.</p></li><li><p>CVE-2026-20128 - (5.5):
The Cisco SD-WAN Manager's Data Collection Agent (DCA) has a vulnerability that allows an unauthenticated local attacker to access user privileges on SD-WAN Manager instances so long as the user has <code>vmanage</code> credentials on the system.</p></li><li><p>CVE-2026-20129 - (9.8):
An API authentication vulnerability in Cisco SD-WAN Manager allows an unauthenticated remote attacker to gain access to the n<code>etadmin</code> role.</p></li><li><p>CVE-2026-20133 - (7.5):
The Cisco Catalyst SD-WAN Manager allows an unauthenticated remote attacker to read &quot;sensitive information&quot; on the host system due to insufficient file system access restrictions.</p></li></ul><hr/><p>
CVE-2026-20127 is reported as a critical vulnerability within the peering authentication flow of
Cisco Catalyst SD-WAN components, affecting the control connection peering mechanism that
establishes trust relationships between SD-WAN components.</p><p>
The flaw allows an unauthenticated attacker to establish rogue peer connections originating
from attacker-controlled infrastructure. If successfully exploited, the rogue peer is given an IP
address within the SD-WANs network, allowing a threat actor access to the SD-WAN
management and control plane. With adequate privileges to the SD-WAN controller, an
attacker can further leverage NETCONF to manipulate and alter configurations within the SD-
WAN network.</p><p>
Cisco Talos has <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">reported</a> that CVE-2026-20127 was observed to be abused in combination
with <a href="https://nvd.nist.gov/vuln/detail/cve-2022-20775">CVE-2022-20775</a>, an older local privilege escalation vulnerability affecting Cisco SD-Wan
software. The threat actor, tracked as UAT-8616 reportedly performed a software downgrade
to a vulnerable version of software, exploited CVE-2022-20775 via the CLI to obtain root
access, and then restored back to original versioning to persist root access.</p><p>
In response to active exploitation, the U.S. Cyber Security and Infrastructure Security Agency
(CISA) has issued <a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems">emergency directive 26-03</a> requiring impacted agencies to apply Cisco
provided updates by February 27th, 2026.</p><p>
Beazley Security recommends that affected organizations check for signs of compromise, and
upgrade to fixed versions of SD-WAN Controller or SD-WAN Manager software immediately.</p><p>
This Cisco SD-WAN <a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide">hardening guide</a> can also be referenced for configuring SD-WAN fabric
and implementations to best practices.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management
Platform to identify impacted devices and support organizations in remediation of any issues
found.</p><p>
We are also conducting threat hunts across our MDR environment to detect potential
exploitation attempts against our clients.
If you believe your organization may have been impacted by this attack campaign and need
support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk"><u>https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk</u></a> </p></li><li><p><a href="https://software.cisco.com/download/home"><u>https://software.cisco.com/download/home</u></a> </p></li><li><p><a href="https://nvd.nist.gov/vuln/detail/cve-2022-20775"><u>https://nvd.nist.gov/vuln/detail/cve-2022-20775</u></a> </p></li><li><p><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf"><u>https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf</u></a> </p></li><li><p><a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide"><u>https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide</u></a> </p></li><li><p><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf"><u>https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf</u></a> </p></li><li><p><a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"><u>https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems</u></a> </p></li><li><p><a href="https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/225525-internal-remediate-catalyst-sd-wan.html">https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/225525-internal-remediate-catalyst-sd-wan.html</a></p></li><li><p><a href="https://www.cisco.com/c/dam/en/us/td/docs/Website/enterprise/catalyst-sdwan-upgrade-matrix/index.html">https://www.cisco.com/c/dam/en/us/td/docs/Website/enterprise/catalyst-sdwan-upgrade-matrix/index.html</a></p></li></ul></div>]]></content><summary type="html">Updated 03/09/2026 to include additional CVEs disclosed by Cisco affecting the same product line.

On February 25th, Cisco disclosed a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager systems. The flaw allows an unauthenticated attacker with network access to the SD-WAN peering service to bypass authentication and establish unauthorized control-plane connections. This vulnerability has been exploited in the wild according to Cisco by a sophisticated threat actor with evidence of exploitation reaching back to 2023.</summary></entry><entry><title>Critical Vulnerabilities in Microsoft Windows and Office Under Active Widespread Exploitation (CVE-2026-21510)</title><link href="https://labs.beazley.security/advisories/BSL-A1156" rel="alternate"/><updated>2026-02-11T08:00:00.000Z</updated><published>2026-02-11T08:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1156</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>Microsoft's February 2026 Patch Tuesday addresses several critical security vulnerabilities, with six zero-day flaws reported as actively exploited in the wild before patches were made available to the public. The disclosed vulnerabilities affect built in Windows components including Windows Shell, MSHTML, Microsoft Word, Windows Notepad, Desktop Window Manager, Remote Desktop Services, and Remote Access Connection Manager.</p><p>These zero-day flaws enable attackers to bypass security features, with potential to trick users into executing malicious code with minimal user interaction through phishing attacks and other social engineering methods.</p><p>With exploitation campaigns widespread and public proof-of-concept code circulating, Beazley Security strongly recommends organizations patch these vulnerabilities immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p><b>Affected Product</b></p></th><th><p><b>MS CVE Advisory</b></p></th><th><p><b>CVSS Score</b></p></th></tr><tr><td><p>Windows Shell</p></td><td><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21510">CVE-2026-21510</a></p></td><td><p>8.8</p></td></tr><tr><td><p>MSHTML Platform</p></td><td><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21513">CVE-2026-21513</a></p></td><td><p>8.8</p></td></tr><tr><td><p>Microsoft Word</p></td><td><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21514">CVE-2026-21514</a></p></td><td><p>7.8</p></td></tr><tr><td><p>Desktop Window Manager</p></td><td><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21519">CVE-2026-21519</a></p></td><td><p>7.8</p></td></tr><tr><td><p>Remote Desktop Services</p></td><td><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21533">CVE-2026-21533</a></p></td><td><p>7.8</p></td></tr><tr><td><p>Remote Access Connection Manager</p></td><td><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21525">CVE-2026-21525</a></p></td><td><p>6.2</p></td></tr></tbody></table><p>*This table does not include all vulnerabilities from Microsoft’s February Patch Tuesday disclosure but highlights critical flaws either under active or imminent exploitation.</p><p>A comprehensive list of vulnerability disclosures can be found via <a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb">Microsoft’s Security Update Guide</a>.</p></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Beazley Security strongly recommends applying February 2026 updates as soon as possible to help protect affected systems. Additionally, the following steps can be taken to help reduce risk:</p><ul><li><p>Restrict user privileges on endpoints to limit impact of privilege escalation</p></li><li><p>Monitor for suspicious activity across endpoints and ensure endpoint protection defenses are up to date</p></li><li><p>Screen email attachments with secure email gateways and other file-sharing systems for malicious files and links</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Affected organizations should accelerate deployment of February 2026 security updates to their environments, prioritizing CVEs known to be under active exploitation as listed in the “Affected Systems and Products” section above.</p><p>A comprehensive list of fixes can be found by reviewing Microsoft’s Patch Tuesday <a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb">release notes</a>.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>Of the six zero-days reported to be under active exploitation, the three with the highest CVSS scores are:</p><ul><li><p>CVE-2026-21510 (8.8) – Affects the Windows shell, threat actors successfully luring targeted users into clicking on a malicious link could bypass Microsoft SmartScreen to install malware</p></li><li><p>CVE-2026-21513 (8.8) – Affects the MSHTML framework, threat actors successfully luring targeted users into clicking on a malicious HTML or lnk file could bypass Microsoft security features to install malware</p></li><li><p>CVE-2026-21514 (7.8) – Affects Microsoft 365 and Microsoft Office, threat actors successfully luring targeted users into opening a malicious Office file could bypass security mitigations to install malware</p></li></ul><p>Of those three, CVE-2026-21510 is reported by Google Threat Intelligence to be “under widespread, active exploitation”. All three require user interaction, and the nature of each vulnerability is a strong indication that the current exploit waves are phishing or malicious email types of campaigns.</p><p>These vulnerabilities are particularly dangerous as they are likely to be weaponized by threat actors to conduct phishing and social engineering attacks. Their “one click” exploitability through malicious links or attachments makes them ideal for large scale phishing and malware delivery campaigns that target users within enterprise environments.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring and conducting threat hunts across MDR environments to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by these attacks and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team.</a></p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb">Microsoft: February 2026 Security Updates</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510">Microsoft: Windows Shell Security Feature Bypass Vulnerability CVE-2026-21510</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513">Microsoft: MSHTML Framework Security Feature Bypass Vulnerability (CVE-2026-21513)</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21514">Microsoft: Microsoft Word Security Feature Bypass Vulnerability (CVE-2026-21514)</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519">Microsoft: Desktop Window Manager Elevation of Privilege Vulnerability (CVE-2026-21519)</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533">Microsoft: Windows Remote Desktop Services Elevation of Privilege Vulnerability (CVE-2026-21533)</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21525">Microsoft: Windows Remote Access Connection Manager Denial of Service Vulnerability (CVE-2026-21525)</a></p></li><li><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20841">Microsoft: Windows Notepad App Remote Code Execution Vulnerability (CVE-2026-20841)</a></p></li></ul></div>]]></content><summary type="html">Microsoft's February 2026 Patch Tuesday addresses several critical security vulnerabilities, with six zero-day flaws reported as actively exploited in the wild before patches were made available to the public. The disclosed vulnerabilities affect built in Windows components including Windows Shell, MSHTML, Microsoft Word, Windows Notepad, Desktop Window Manager, Remote Desktop Services, and Remote Access Connection Manager.</summary></entry><entry><title>Critical Vulnerability (CVE-2026-1731) in Beyond Trust Under Active Exploitation</title><link href="https://labs.beazley.security/advisories/BSL-A1154" rel="alternate"/><updated>2026-02-04T08:00:00.000Z</updated><published>2026-02-04T08:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1154</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p><b>Update: 2/13/2026:</b> <b>Active exploitation of this vulnerability has been reported in the wild following public disclosure of proof of concept code. Threat actors have been observed deploying remote management tools for persistence after exploitation, and conducting further lateral movement into victim environments.</b></p><p>A critical pre-authentication remote code execution vulnerability within BeyondTrust Remote Support and certain versions of Privileged Remote Access Products has <b>now been assigned CVE-2026-1731 </b>with a critical CVSS score of 9.9. </p><p>Given the internet-facing nature of these systems, confirmed active exploitation in the wild, and the public availability of proof-of-concept exploit code, Beazley Security strongly recommends that affected organizations running self hosted versions immediately apply patches to vulnerable systems.</p><p>On February 4, 2025, Beyond Trust reported in their Customer Portal that a critical vulnerability was discovered affecting the Remote Support (RS) and Privileged Remote Access (PRA) products. At time of writing, there was no CVE assigned and no public information on the vulnerability, but it is being tracked by the vendor as BT26-02. Beyond Trust published more information for customers in a non-public <a href="https://beyondtrustcorp.service-now.com/csm?id=csm_kb_article&amp;sysparm_article=KB0023293">Knowledge Article</a>.
</p><p>The Remote Support and Privileged Remote Access products facilitate remote access to a wide range of end point types, and these products are typically deployed internet facing by design. As such, a breach of these products can give threat actors not only initial access into an organizations network, but immediate control of internal hosts. Given the urgency communicated by the vendor and the high risk of this type of product being compromised, organizations are urged to update their affected systems as soon as possible.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><td><p>Product</p></td><td><p>Affected Version</p></td><td><p>Fixed Version</p></td></tr><tr><td><p>Remote Support (RS)</p></td><td><p>25.3.1 and prior</p></td><td><p>25.3.2</p></td></tr><tr><td><p>Privileged Remote Access (PRA)</p></td><td><p>24.3.4 and prior</p></td><td><p>24.3.5</p></td></tr></tbody></table><p>Note: Customers running SaaS versions of the software were automatically patched February 2, 2026</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>For SaaS deployments of Remote Support and Privileged Remote Access, patch BT26-02-RS or BT26-02-PRA has automatically been applied. Customers using hosted or managed versions of these products should already be covered but should also check their servers to verify.</p><p>For on-premises solutions, patch BT26-02-RS and BT26-02-PRA have been released to mitigate this vulnerability. Further details can be found within the <a href="https://beyondtrustcorp.service-now.com/csm?id=csm_kb_article&amp;sysparm_article=KB0023293">Knowledge Article Portal.</a></p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>Active exploitation of CVE-2026-1731 has been observed in the wild following the availability of proof of concept exploit code. According to <a href="https://arcticwolf.com/resources/blog/update-arctic-wolf-observes-threat-campaign-targeting-beyondtrust-remote-support-following-cve-2026-1731-poc-availability/">Arctic Wolf</a>, threat actors have been observed:</p><ul><li><p>Deploying renamed SimpleHelp remote management tool binaries with names including &quot;remote access.exe&quot; </p></li><li><p>Adding domain accounts via net commands:</p></li></ul><p><code>net user REDACTED_USERNAME REDACTED_PASSWORD /add /domain
net group \”enterprise admins\” REDACTED_USERNAME /add /domain
net group \”domain admins\” REDACTED_USERNAME /add /domain</code></p><ul><li><p>Pushing SimpleHelp installations to move laterally across the network with PSexec</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>CVE-2026-1731 is a command injection flaw within BeyondTrust Remote Support and Privileged Remote Access systems allowing a remote attacker to run remote commands on the software without requiring any authentication. </p><p>According to an analysis by <a href="https://attackerkb.com/topics/jNMBccstay/cve-2026-1731/rapid7-analysis">Rapid7</a>, the flaw appears to exist in how the application processes requests to its web services, which can be maliciously crafted to embed commands that will be run in the context of the application by attackers. </p><p>Specifically, the analysis calls out a flaw in Bash based validation checks within thin-scc-wrapper, a script on the server that checks remote software version numbers and is used when communicating to the application. A malicious 'version number', or command, can be injected within a crafted websocket request resulting in execution of arbitrary OS commands.</p><p>Given the critical nature of this pre-authentication remote code execution vulnerability, confirmed active exploitation in the wild, and demonstrated proof-of-concept code, self-hosted customers should patch immediately.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team.</a></p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://arcticwolf.com/resources/blog/update-arctic-wolf-observes-threat-campaign-targeting-beyondtrust-remote-support-following-cve-2026-1731-poc-availability/">https://arcticwolf.com/resources/blog/update-arctic-wolf-observes-threat-campaign-targeting-beyondtrust-remote-support-following-cve-2026-1731-poc-availability/</a></p></li><li><p><a href="https://attackerkb.com/topics/jNMBccstay/cve-2026-1731/rapid7-analysis">https://attackerkb.com/topics/jNMBccstay/cve-2026-1731/rapid7-analysis</a></p></li><li><p><a href="https://www.beyondtrust.com/trust-center/security-advisories/bt26-02">https://www.beyondtrust.com/trust-center/security-advisories/bt26-02</a></p></li></ul></div>]]></content><summary type="html">On February 4, 2025, Beyond Trust reported in their Customer Portal that a critical vulnerability was discovered affecting the Remote Support (RS) and Privileged Remote Access (PRA) products. CVE-2026-1731 and a CVSS score of 9.9 have now been assigned to this vulnerability and is under active exploitation. </summary></entry><entry><title>Notepad++ Update Process Hijacked by Sophisticated Adversary</title><link href="https://labs.beazley.security/advisories/BSL-A1155" rel="alternate"/><updated>2026-02-04T08:00:00.000Z</updated><published>2026-02-04T08:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1155</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On December 9<sup>th</sup>, text editor application Notepad++ reported an incident where some of their software update infrastructure had been hijacked to deliver sophisticated backdoor malware to specific targets. Rapid7 published some <a href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">additional analysis</a> on one of the payloads delivered and attributed the campaign to Chinese state sponsored APT group Lotus Blossom.</p><p>The attack appears to be highly targeted, as reporting indicates only specific traffic results in malicious packages delivered. <a href="https://securelist.com/notepad-supply-chain-attack/118708/">Reporting from Kaspersky</a> added that attacker infrastructure was constantly rotated and tailored to attack specific intended targets.</p><p>The incident was a man-in-the-middle attack against the update infrastructure, not against Notepad++ code itself. Because the attack compromised the update process, Beazley Security, out of an abundance of caution, recommends affected users delete existing versions of Notepad++ and install fixed versions from scratch as soon as possible.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product</p></th><th><p>Affected Version</p></th><th><p>Fixed Version</p></th></tr><tr><td><p>Notepad++</p></td><td><p>&lt; v.8.8.9</p></td><td><p>>= v8.8.9</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Security fixes were made available at the time of reporting and are available via normal update channels. Because the attack compromised the update process, Beazley Security, out of an abundance of caution, recommends users delete current installs of Notepad++ and install patched versions from scratch as soon as possible.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>IOCs have been provided by both <a href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Rapid7</a> and <a href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky</a>, though their usefulness may be limited as the threat actor has been observed rotating out almost all pieces of infrastructure from C2 servers to malware families and payload hashes.</p><p>That said, we will include a limited summary of them here to assist with threat hunts.</p><table><tbody><tr><th><p>IoC</p></th><th><p>Type</p></th><th><p>Notes</p></th></tr><tr><td><p>8ea8b83645fba6e23d48075a0d3fc73ad2ba515b4536710cda4f1f232718f53e</p></td><td><p>sha256</p></td><td><p>NSIS script</p></td></tr><tr><td><p>77bfea78def679aa1117f569a35e8fd1542df21f7e00e27f192c907e61d63a2e</p></td><td><p>sha256</p></td><td><p>Encrypted shellcode</p></td></tr><tr><td><p>3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad</p></td><td><p>sha256</p></td><td><p>Malicious sideloaded DLL</p></td></tr><tr><td><p>0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd</p></td><td><p>sha256</p></td><td><p>Loader Variant</p></td></tr><tr><td><p>e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda</p></td><td><p>sha256</p></td><td><p>Loader Variant</p></td></tr><tr><td><p>b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3</p></td><td><p>sha256</p></td><td><p>Loader Variant</p></td></tr><tr><td><p>fcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a</p></td><td><p>sha256</p></td><td><p>Loader Variant</p></td></tr><tr><td><p>8e6e505438c21f3d281e1cc257abdbf7223b7f5a</p></td><td><p>sha1</p></td><td><p>NSIS installer</p></td></tr><tr><td><p>573549869e84544e3ef253bdba79851dcde4963a</p></td><td><p>sha1</p></td><td><p>NSIS installer</p></td></tr><tr><td><p>d7ffd7b588880cf61b603346a3557e7cce648c93</p></td><td><p>sha1</p></td><td><p>NSIS installer</p></td></tr><tr><td><p>6444dab57d93ce987c22da66b3706d5d7fc226da</p></td><td><p>sha1</p></td><td><p>DLL</p></td></tr><tr><td><p>2ab0758dda4e71aee6f4c8e4c0265a796518f07d</p></td><td><p>sha1</p></td><td><p>DLL</p></td></tr><tr><td><p>f7910d943a013eede24ac89d6388c1b98f8b3717</p></td><td><p>sha1</p></td><td><p>DLL</p></td></tr><tr><td><p>defb05d5a91e4920c9e22de2d81c5dc9b95a9a7c</p></td><td><p>sha1</p></td><td><p>ProShow.exe</p></td></tr><tr><td><p>06a6a5a39193075734a32e0235bde0e979c27228</p></td><td><p>sha1</p></td><td><p>load</p></td></tr><tr><td><p>bf996a709835c0c16cce1015e6d44fc95e08a38a</p></td><td><p>sha1</p></td><td><p>script.exe</p></td></tr><tr><td><p>ca4b6fe0c69472cd3d63b212eb805b7f65710d33</p></td><td><p>sha1</p></td><td><p>alien.ini</p></td></tr><tr><td><p>821c0cafb2aab0f063ef7e313f64313fc81d46cd</p></td><td><p>sha1</p></td><td><p></p></td></tr><tr><td><p>4c9aac447bf732acc97992290aa7a187b967ee2c</p></td><td><p>sha1</p></td><td><p></p></td></tr><tr><td><p>90e677d7ff5844407b9c073e3b7e896e078e11cd</p></td><td><p>sha1</p></td><td><p></p></td></tr><tr><td><p>api.skycloudcenter[.]com</p></td><td><p>hostname</p></td><td><p>C2</p></td></tr><tr><td><p>api.wiresguard[.]com</p></td><td><p>hostname</p></td><td><p>C2</p></td></tr><tr><td><p>cdncheck.it[.]com</p></td><td><p>hostname</p></td><td><p>C2</p></td></tr><tr><td><p>self-dns.it[.]com</p></td><td><p>hostname</p></td><td><p>C2</p></td></tr><tr><td><p>safe-dns.it[.]com</p></td><td><p>hostname</p></td><td><p>C2</p></td></tr><tr><td><p>59.110.7[.]32</p></td><td><p>IP</p></td><td><p>C2</p></td></tr><tr><td><p>124.222.137[.]114</p></td><td><p>IP</p></td><td><p>C2</p></td></tr><tr><td><p>45.76.155[.]202</p></td><td><p>IP</p></td><td><p>Malware Host</p></td></tr><tr><td><p>45.77.31[.]210</p></td><td><p>IP</p></td><td><p>C2</p></td></tr><tr><td><p>45.32.144[.]255</p></td><td><p>IP</p></td><td><p>C2</p></td></tr><tr><td><p>95.179.213[.]0</p></td><td><p>IP</p></td><td><p>C2</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>The attack itself was limited in scope; a former hosting provider for Notepad++ had a server compromised sometime in June 2025, and the threat actors persisted access until December 2025. In that time the threat actor was selectively redirecting specific targeted users to trojaned, malicious update packages. The attack was narrow to a degree that analysis from Kaspersky indicates as few as a dozen individual machines were specifically targeted. Changes referenced in Notepad++’s patch notes indicate that this man-in-the-middle supply chain attack was possible because of a lack of signature verification in the updater programs and on update server XMLs returned to the client.</p><p>Notepad++ has changed hosting providers for their update infrastructure and fixed their update process to include more strict signing certificate checks.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security has conducted threat hunts across our MDR environment to detect potential attempts to hijack client Notepad++ installations leveraging the Indicators of Compromise (IOCs) listed in this advisory. Beazley Security MDR will reach out to any impacted organizations and work to contain potential threat actors. </p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team.</a></p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://notepad-plus-plus.org/news/v889-released/">Notepad++: v8.8.9 release: Vulnerability-fix</a></p></li><li><p><a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/">Notepad++: Hijacked by State-Sponsored Hackers</a></p></li><li><p><a href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Rapid7: The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit</a></p></li><li><p><a href="https://securelist.com/notepad-supply-chain-attack/118708/">Securelist: The Notepad++ supply chain attack — unnoticed execution chains and new IoCs</a></p></li></ul></div>]]></content><summary type="html">On December 9th, text editor application Notepad++ reported an incident where some of their software update infrastructure had been hijacked to deliver sophisticated backdoor malware to specific targets. Rapid7 published some additional analysis on one of the payloads delivered and attributed the campaign to Chinese state sponsored APT group Lotus Blossom.</summary></entry><entry><title>Critical Vulnerabilities in Ivanti EPMM Under Active Exploitation (CVE-2026-1281, CVE-2026-1340)</title><link href="https://labs.beazley.security/advisories/BSL-A1153" rel="alternate"/><updated>2026-01-29T08:00:00.000Z</updated><published>2026-01-29T08:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1153</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On January 29<sup>th</sup>, Ivanti published an advisory concerning two vulnerabilities (tracked as CVE-2026-1281 and CVE-2026-1340) in their Endpoint Manager Mobile (EPMM) product. Both vulnerabilities were listed as remote command injection bugs that allow successful attackers to perform unauthenticated remote code execution (RCE) on an affected device. EPMM is often deployed directly connected to the internet, and as such can provide threat actors with initial access to an organizations network. Ivanti confirmed in their advisory that a “very limited number of customers” had been exploited at time of disclosure. Additionally, CISA added both vulnerabilities to their Known Exploited Vulnerabilities list the same day.</p><p>No deep technical details of the bug or public proof-of-concept (PoC) exploits have been published at time of writing, however, Ivanti released patches at the time of disclosure. Beazley Security expects threat actors who are not already in possession of private weaponized exploits to study the patches and deploy their own exploits in the coming days. Beazley Security strongly recommends affected organizations apply the vendor supplied security fixes as soon as possible.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product</p></th><th><p>Affected Version</p></th><th><p>Fixed Version</p></th></tr><tr><td><p>Ivanti Endpoint Manager Mobile (EPMM)</p></td><td><p>12.5.0.0 and prior</p><p>12.6.0.0 and prior</p><p>12.7.0.0 and prior</p></td><td><p>RPM 12.x.0.x</p></td></tr><tr><td><p>Ivanti Endpoint Manager Mobile (EPMM)</p></td><td><p>12.5.1.0 and prior</p><p>12.6.1.0 and prior</p></td><td><p>RPM 12.x.1.x</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>No mitigations or workarounds aside from the available security patches have been provided from Ivanti.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Ivanti provided software patches at the time of disclosure for the affected versions listed above. The patches are in RPM package format, and short instructions for where to get the patches and how to install the patch packages can be found in the advisory <a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">here</a>. Additionally, Ivanti encourages customers to upgrade to 12.8.0.0 which is to be released in Q1 2026.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>Ivanti provided good guidance on searching logs for indicators of attack and successful exploitation. Their recommendations are generic (rather than specific indicators like IPs or injected commands) and were informed by the few verified breaches that happened as a result of these vulnerabilities. Their guidance documentation with generalized indicators can be found <a href="https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">here</a>. We will provide a summarized version below.</p><p>The vulnerabilities affect two specific features:</p><ul><li><p>In-House Application Distribution, and</p></li><li><p>Android File Transfer Configuration</p></li></ul><p>Traffic to those endpoints can be reviewed in the Apache Access Log at:</p><p><code>/var/log/httpd/https-access_log</code></p><p>Normal traffic will result in HTTP response codes of 200, while exploit attempts will cause HTTP response codes of 404. More importantly, <b>exploit attempts will show bash commands in the HTTP parameters</b>.</p><p>The following regular expression was suggested to assist with log file triage:</p><p><code>^(?!127\.0\.0\.1:\d+ .*$).*?\/mifs\/c\/(aft|app)store\/fob\/.*?404 </code></p><p>Ivanti has also noted that in previous vulnerabilities targeting these systems, it was common for threat actors to attempt persistence post-compromise via:</p><ul><li><p>webshells disguised as HTTP error pages, like 401.jsp</p></li><li><p>unexpected WAR or JAR files imported to the device</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>At the time of the disclosure no in-depth technical details were provided by Ivanti; however, their analysis guidance documentation provided enough information to understand the nature of the vulnerabilities. Specifically, the two targeted EPMM systems were: In-House Application Distribution, and Android File Transfer Configuration.</p><p>Additionally, it was noted that exploit attempts against those system endpoints will result in 404 error messages in the logs, and to look for bash commands in the HTTP parameters. This hints at a classic case of incoming, attacker-controlled HTTP traffic being passed unfiltered to code that executes injected system commands.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team.</a></p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Ivanti: Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 &amp; CVE-2026-1340)</a></p></li><li><p><a href="https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US&amp;_gl=1*11h511z*_gcl_au*MTA3OTkxMjYzMC4xNzY5Njk5MTgw">Ivanti: Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 &amp; CVE-2026-1340</a></p></li><li><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-1281">CISA KEV: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability</a></p></li></ul></div>]]></content><summary type="html">On January 29th, Ivanti published an advisory concerning two vulnerabilities (tracked as CVE-2026-1281 and CVE-2026-1340) in their Endpoint Manager Mobile (EPMM) product. Both vulnerabilities were listed as remote command injection bugs that allow successful attackers to perform unauthenticated remote code execution (RCE) on an affected device. EPMM is often deployed directly connected to the internet, and as such can provide threat actors with initial access to an organizations network. Ivanti confirmed in their advisory that a “very limited number of customers” had been exploited at time of disclosure. Additionally, CISA added both vulnerabilities to their Known Exploited Vulnerabilities list the same day.</summary></entry><entry><title>Critical Auth Bypass Vulnerabilities in Fortinet Products Under Active Exploitation (CVE-2026-24858)</title><link href="https://labs.beazley.security/advisories/BSL-A1152" rel="alternate"/><updated>2026-01-27T23:00:00.000Z</updated><published>2026-01-27T23:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1152</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On January 27th, Fortinet published an advisory detailing an authentication bypass via an alternate path or channel vulnerability (CVE-2026-24858) affecting FortiOS, FortiManager, and FortiAnalyzer. A threat actor with a valid FortiCloud account and a registered device can abuse this vulnerability to authenticate to other devices registered under different FortiCloud accounts provided FortiCloud SSO is enabled on those target devices. This vulnerability was reported to already be in use by threat actors in-the-wild at the time of discovery. In December 2025, Fortinet had issued a similar advisory related to two FortiCloud single sign-on (SSO) bypass vulnerabilities <a href="https://labs.beazley.security/advisories/BSL-A1147">(CVE-2025-59718 and CVE-2025-59719) [BSL-A1147]</a> that the Fortinet product security team had internally discovered during a code audit. </p><p>The vulnerabilities described in the advisory allowed for unauthenticated bypass of SSO login authentication via crafted SAML sent to FortiOS, FortiWeb, FortiProxy, and FortiSwitch Manager devices when the FortiCloud SSO feature was enabled. </p><p>FortiCloud SSO is not enabled by default in factory configurations. However, when an administrator registers a device with FortiCare through the GUI, FortiCloud SSO is automatically enabled unless the “Allow administrative login using FortiCloud SSO” option is explicitly disabled during registration. </p><p>As mentioned, Fortinet observed this vulnerability being actively exploited in the wild by two malicious FortiCloud accounts, which were disabled on 2026-01-22. As an immediate mitigation, Fortinet temporarily disabled FortiCloud SSO at the FortiCloud service level on 2026-01-26. The feature was re-enabled on 2026-01-27 with additional restrictions, preventing authentication from devices running vulnerable versions. </p><p>Due to this, Beazley Security believes many Fortinet devices may be vulnerable without the administrator’s knowledge. Given the reports of active exploitation of these vulnerabilities in the wild and the significant risk of further compromise once initial access has been gained by a compromised Fortinet device, Beazley Security strongly recommends that affected organizations disable FortiCloud SSO until patches are available and can be applied. </p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product </p></th><th><p>Affected Version </p></th><th><p>Fixed Version </p></th></tr><tr><td><p>FortiAnalyzer 7.6 </p></td><td><p>7.6.0 through 7.6.5 </p></td><td><p>Upgrade to upcoming 7.6.6 or above </p></td></tr><tr><td><p>FortiAnalyzer 7.4 </p></td><td><p>7.4.0 through 7.4.9 </p></td><td><p>Upgrade to upcoming 7.4.10 or above </p></td></tr><tr><td><p>FortiAnalyzer 7.2 </p></td><td><p>7.2.0 through 7.2.11 </p></td><td><p>Upgrade to upcoming 7.2.12 or above </p></td></tr><tr><td><p>FortiAnalyzer 7.0 </p></td><td><p>7.0.0 through 7.0.15 </p></td><td><p>Upgrade to upcoming 7.0.16 or above </p></td></tr><tr><td><p>FortiManager 7.6 </p></td><td><p>7.6.0 through 7.6.5 </p></td><td><p>Upgrade to upcoming 7.6.6 or above </p></td></tr><tr><td><p>FortiManager 7.4 </p></td><td><p>7.4.0 through 7.4.9 </p></td><td><p>Upgrade to upcoming 7.4.10 or above </p></td></tr><tr><td><p>FortiManager 7.2 </p></td><td><p>7.2.0 through 7.2.11 </p></td><td><p>Upgrade to upcoming 7.2.13 or above </p></td></tr><tr><td><p>FortiManager 7.0 </p></td><td><p>7.0.0 through 7.0.15 </p></td><td><p>Upgrade to upcoming 7.0.16 or above </p></td></tr><tr><td><p>FortiOS 7.6 </p></td><td><p>7.6.0 through 7.6.5 </p></td><td><p>Upgrade to upcoming 7.6.6 or above </p></td></tr><tr><td><p>FortiOS 7.4 </p></td><td><p>7.4.0 through 7.4.10 </p></td><td><p>Upgrade to upcoming 7.4.11 or above </p></td></tr><tr><td><p>FortiOS 7.2 </p></td><td><p>7.2.0 through 7.2.12 </p></td><td><p>Upgrade to upcoming 7.2.13 or above </p></td></tr><tr><td><p>FortiOS 7.0 </p></td><td><p>7.0.0 through 7.0.18 </p></td><td><p>Upgrade to upcoming 7.0.19 or above </p></td></tr><tr><td><p>FortiProxy 7.6 </p></td><td><p>7.6.0 through 7.6.4 </p></td><td><p>Upgrade to upcoming 7.6.6 or above </p></td></tr><tr><td><p>FortiProxy 7.4 </p></td><td><p>7.4.0 through 7.4.12 </p></td><td><p>Upgrade to upcoming 7.4.13 or above </p></td></tr><tr><td><p>FortiProxy 7.2 </p></td><td><p>7.2 all versions </p></td><td><p>Migrate to a fixed release </p></td></tr><tr><td><p>FortiProxy 7.0 </p></td><td><p>7.0 all versions </p></td><td><p>Migrate to a fixed release </p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Patches have not been released at time of writing, and Beazley Security strongly recommends that patches be immediately applied as soon as they are available for any impacted appliances.</p><p>Additionally, Beazley Security Labs recommends disabling the FortiCloud SSO feature until patches are released and applied. To disable FortiCloud SSO admin logins:</p><ol><li><p>Go to System -> Settings -> Switch. </p></li><li><p>Change &quot;Allow administrative login using FortiCloud SSO&quot; to Off. </p></li></ol><p>Or type the following command in the CLI:</p><p><code>config system global</code></p><p><code>set admin-forticloud-sso-login disable</code></p><p><code>end </code></p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Fortinet has disabled FortiCloud SSO support for vulnerable device versions as of January 26, 2026. Customers must upgrade to the latest versions for FortiCloud SSO authentication to function. The FortiGuard advisory recommends using their <a href="https://docs.fortinet.com/upgrade-tool/fortigate"><u>provided upgrade tool</u></a> to update software on the affected products when the patches become available.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>At the time of this writing, <a href="https://-%09https:/www.fortiguard.com/psirt/FG-IR-26-060"><u>FortiGuard Labs</u></a> has officially released indicators of compromise, in addition there are public reports of exploitation in the wild.</p><h2>Emails</h2><p>The actor has been observed to have logged in with the following user accounts. </p><ul><li><p>cloud-noc@mail[.]io </p></li><li><p>cloud-init@mail[.]io</p></li></ul><h3>IP Addresses</h3><p>According to FortiGuard Labs the actor has been observed to log in via multiple IP addresses and appears to have switched to use Cloudflare protected IPs.</p><ul><li><p>104.28.244[.]115 </p></li><li><p>104.28.212[.]114 </p></li><li><p>104.28.212[.]115 </p></li><li><p>104.28.195[.]105 </p></li><li><p>104.28.195[.]106 </p></li><li><p>104.28.227[.]106 </p></li><li><p>104.28.227[.]105 </p></li><li><p>104.28.244[.]114 </p></li><li><p>37.1.209[.]19 </p></li><li><p>217.119.139[.]50</p></li></ul><h3>Malicious Local Account Creation</h3><p>Following authentication via SSO, it has been observed that the actor creates a local admin account with one of the following names. We recommend reviewing all admin accounts to look for any unexpected entries.</p><ul><li><p>audit </p></li><li><p>backup </p></li><li><p>itadmin </p></li><li><p>secadmin </p></li><li><p>support </p></li><li><p>backupadmin </p></li><li><p>deploy </p></li><li><p>itadmin </p></li><li><p>remoteadmin </p></li><li><p>security </p></li><li><p>svcadmin </p></li><li><p>system</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach"><u>contact our Incident Response team.</u></a> </p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://www.fortiguard.com/psirt/FG-IR-26-060"><u>https://www.fortiguard.com/psirt/FG-IR-26-060</u></a> </p></li><li><p><a href="https://docs.fortinet.com/upgrade-tool/fortigate"><u>https://docs.fortinet.com/upgrade-tool/fortigate</u></a> </p></li><li><p><a href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios"><u>https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios</u></a> </p></li><li><p><a href="https://labs.beazley.security/advisories/BSL-A1147"><u>https://labs.beazley.security/advisories/BSL-A1147</u></a></p></li></ul></div>]]></content><summary type="html">On January 27th, Fortinet published an advisory alerting users to an authentication bypass actively being used in the wild against FortiCloud SSO. This vulnerability being separate to but closely affiliated to (CVE-2025-59718 and CVE-2025-59719) from December 2025 warrant immediate action.</summary></entry><entry><title>Critical Vulnerability in Zimbra under active exploitation (CVE-2025-68645)</title><link href="https://labs.beazley.security/advisories/BSL-A1151" rel="alternate"/><updated>2026-01-23T08:00:00.000Z</updated><published>2026-01-23T08:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1151</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On January 23, CISA updated their Known Exploited Vulnerability (KEV) catalog with a critical Local File Inclusion (LFI) vulnerability in Zimbra Collaboration (ZCS). This vulnerability, tracked as CVE-2025-68645 and originally reported on December 22<sup>nd</sup>, allows unauthenticated remote attackers to include arbitrary files from the WebRoot directory by crafting malicious requests to an endpoint in the RestFilter servlet. This can potentially leak enough information to breach the targeted server and provide threat actors initial access into an organizations network.</p><p>A public proof-of-concept (PoCs) exploit is available in GitHub, and the inclusion in CISA’s KEV confirms active exploitation in real-world cyberattacks. Beazley Security Labs highly recommends users adopt the patch immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product</p></th><th><p>Affected Version</p></th><th><p>Fixed Version</p></th></tr><tr><td><p>Zimbra Collaboration (ZCS)</p></td><td><p>10.0–10.0.17 &amp; 10.1.0–10.1.12</p></td><td><p>10.0.18 &amp; 10.1.13</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches are available through Zimbra’s Patch Document which provides step-by-step installation instructions tailored to each supported version. </p><p>For 10.0.x instructions follow - <a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.0/patch_installation">10.0.x Patch Installation</a></p><p>For 10.1.x instructions follow - <a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.0/patch_installation">10.1.x Patch Installation</a></p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>There is a public proof-of-concept exploit available on GitHub. That, combined with the advisories from Zimbra and NIST describe a Local File Inclusion (LFI) vulnerability in the /h/rest endpoint of the RestFilter servlet in the Webmail Classic UI.</p><p>LFI vulnerabilities are a common bug class and in general allow remote attackers to manipulate local files on a target machine. CVE-2025-68645 appears to leak files from the WebRoot directory, which often contains sensitive configuration information. This information could then be leveraged by an attacker to further compromise the system or exfiltrate additional sensitive data.</p><p>The POC is straightforward:</p><p><code>https://&lt;target>/h/rest?javax.servlet.include.servlet_path=&lt;any WebRoot URI></code></p><p>And the contents of the sensitive WebRoot directory for a typical Zimbra install can be seen here: <a href="https://github.com/Zimbra/zm-web-client/tree/develop/WebRoot">https://github.com/Zimbra/zm-web-client/tree/develop/WebRoot</a></p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team</a>.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.18#Security_Fixes">Zimbra: Zimbra Daffodil 10.0.18 Patch Release</a></p></li><li><p><a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.13#Security_Fixes">Zimbra: Zimbra Daffodil (v10.1.13) Patch Release</a></p></li><li><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-68645">CISA KEV: Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability</a></p></li><li><p><a href="https://github.com/MaxMnMl/zimbramail-CVE-2025-68645-poc/blob/main/README.md">GitHub: zimbramail-CVE-2025-68645-poc</a></p></li></ul></div>]]></content><summary type="html">On January 23, CISA updated their Known Exploited Vulnerability (KEV) catalog with a critical Local File Inclusion (LFI) vulnerability in Zimbra Collaboration (ZCS). This vulnerability, tracked as CVE-2025-68645 and originally reported on December 22nd, allows unauthenticated remote attackers to include arbitrary files from the WebRoot directory by crafting malicious requests to an endpoint in the RestFilter servlet. This can potentially leak enough information to breach the targeted server and provide threat actors initial access into an organizations network.</summary></entry><entry><title>Critical Vulnerability in n8n (CVE-2026-21858)</title><link href="https://labs.beazley.security/advisories/BSL-A1150" rel="alternate"/><updated>2026-01-08T08:00:00.000Z</updated><published>2026-01-08T08:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1150</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On January 6th, 2026, CVE-2026-21858 was published by n8n, followed shortly by articles by Dor Attias and Cyera documenting critical flaws in n8n's request parsing. The vulnerability allows an unauthenticated attacker to exfiltrate sensitive data, which can lead to full compromise of the n8n system. If a vulnerable n8n system is directly connected to the internet, this could provide threat actors with initial access to an organizations internal network.</p><p>At the time of writing multiple proof-of-concept samples (PoCs) had already been published, meaning widespread exploitation is already underway. N8n had released an update to their software in November, and Beazley Security Labs highly recommends users adopt and deploy immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product</p></th><th><p>Affected Versions</p></th><th><p>Fixed Versions</p></th></tr><tr><td><p>n8n</p></td><td><p>>= 1.65.0</p></td><td><p>1.121.0</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>N8n has not provided any mitigation recommendations aside from applying available software updates. If possible, n8n systems should be deployed internally with no inbound connectivity allowed to it from the internet.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>N8n released 1.121.0 on November 18, 2025 that addresses this vulnerability. Given the proliferation of PoCs and news reporting of this vulnerability, it is strongly advised that any deployments of n8n are updated immediately.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>The vulnerability is due to a bug in the way n8n parses user input from workflows, specifically how the parseRequestBody() function handles Content-Type values. Some of the input control parameters can be changed and maliciously modified by a threat actor, and researchers at Cyera found that the Content-Type header, in conjunction with the req.body.files object, can be used to confuse n8n into reading an arbitrary file on the underlying operating system and reporting its contents back to the attacker.</p><p>Cyera also demonstrated that this arbitrary file read and be leveraged to exfiltrate:</p><ul><li><p>the n8n database (a plain text sqlite file), and</p></li><li><p>the local n8n encryption key (often stored in the same way for containerized deployments)</p></li></ul><p>These two files provide enough data to create valid authentication tokens to enable an attacker to access administrators of n8n. N8n administrators can then create workflows to execute commands on the host system.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://github.com/advisories/GHSA-v4pr-fm98-w9pg">n8n GitHub: n8n Vulnerable to Unauthenticated File Access via Improper Webhook Request Handling</a></p></li><li><p><a href="https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858">Cyera: Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858)</a></p></li></ul></div>]]></content><summary type="html">On January 6th, 2026, CVE-2026-21858 was published by n8n, followed shortly by articles by Dor Attias and Cyera documenting critical flaws in n8n's request parsing. The vulnerability allows an unauthenticated attacker to exfiltrate sensitive data, which can lead to full compromise of the n8n system. If a vulnerable n8n system is directly connected to the internet, this could provide threat actors with initial access to an organizations internal network.</summary></entry><entry><title>Critical Vulnerability in SmarterMail (CVE-2025-52691)</title><link href="https://labs.beazley.security/advisories/BSL-A1149" rel="alternate"/><updated>2025-12-29T06:00:00.000Z</updated><published>2025-12-29T06:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1149</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On December 28, 2025, NIST published a critical file upload vulnerability affecting SmarterTools SmarterMail server. The flaw, documented as CVE-2025-52691, carries a maximum CVSS score of 10 and allows remote unauthenticated attackers the ability to upload malicious files to the mail server, potentially leading to remote code execution.</p><p>This vulnerability could enable sensitive data exfiltration, and compromise of the system to facilitate further attacks against affected organizations. Shortly after the vulnerability was published, proof of concept exploit code was also publicly released.</p><p>Because mail servers are typically exposed directly to the internet to handle email traffic, Beazley Security recommends organizations patch immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><td><p>Product</p></td><td><p>Affected Versions</p></td><td><p>Fixed Versions</p></td></tr><tr><td><p>SmarterTools SmarterMail</p></td><td><p>Build 9406 and earlier</p></td><td><p>Build 9413 or later</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>No mitigations have been made available at the time of this advisory from SmarterTools, however security updates have been released to address this vulnerability.</p><p>Given the internet facing nature of these appliances and criticality of vulnerability, updating to SmarterMail Build 9413 or later is strongly recommended.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches addressing CVE-2025-52691 are available in Build 9413 or later. Organizations should install security updates as soon as possible. <a href="https://www.smartertools.com/smartermail/release-notes/current">Release notes</a> have been made available on the SmarterTools website, and new software downloads are made available <a href="https://www.smartertools.com/smartermail/downloads">here</a>.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>At the time of this writing, SmarterTools have not officially released any indicators of compromise and there are no public reports of exploitation in the wild. However as the vulnerability allows for malicious file uploads, BSL recommends checking for signs of compromise by reviewing directories hosting the SmarterMail server for unexpected or malicious files,  and suspicious posts to SmarterMail hosted web portals. Especially to the following endpoints:</p><ul><li><p>/api/upload</p></li><li><p>/api/v1/upload</p></li><li><p>/Interface/Frmx/UploadFile.aspx</p></li><li><p>/MRS/Upload.ashx</p></li><li><p>/Services/Upload.ashx</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>At the time of this writing, SmarterTools have not yet publicly provided technical details regarding this vulnerability, however vulnerability disclosures from <a href="https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/">CSA Singapore</a> classify CVE-2025-52691 as a critical arbitrary file upload vulnerability within SmarterMail server builds 9406 and earlier.</p><p>The vulnerability can be exploited by a remote, unauthenticated attacker and used to upload files to any location on an affected mail server without credentials. As the vulnerability permits uploading files to upload directories, attackers could place malicious executables or webshells that are able to execute under the same privileges of the SmarterMail service which could then be accessed remotely.</p><p>Shortly after release of this vulnerability, proof of concept exploit code <a href="https://github.com/yt2w/CVE-2025-52691">surfaced</a> on github which appear to attack web components of the SmarterMail server by attempting to place a concept ASPX webshell to these endpoints:</p><p><code><i>&quot;/api/upload&quot;,</i></code></p><p><code><i>&quot;/api/v1/upload&quot;,</i></code></p><p><code><i>&quot;/Interface/Frmx/UploadFile.aspx&quot;,</i></code></p><p><code><i>&quot;/MRS/Upload.ashx&quot;,</i></code></p><p><code><i>&quot;/Services/Upload.ashx&quot;</i></code></p><p>suggesting the vulnerability might allow files to be uploaded to the system at those locations and then accessed to run commands to further compromise a server.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://www.smartertools.com/smartermail/release-notes/current">https://www.smartertools.com/smartermail/release-notes/current</a></p></li><li><p><a href="https://www.smartertools.com/smartermail/downloads">https://www.smartertools.com/smartermail/downloads</a></p></li><li><p><a href="https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/">https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-124/</a></p></li><li><p><a href="https://github.com/yt2w/CVE-2025-52691">https://github.com/yt2w/CVE-2025-52691</a></p></li></ul></div>]]></content><summary type="html">On December 28, 2025, NIST published a critical file upload vulnerability affecting SmarterTools SmarterMail server. The flaw, documented as CVE-2025-52691, carries a maximum CVSS score of 10 and allows remote unauthenticated attackers the ability to upload malicious files to the mail server, potentially leading to remote code execution.</summary></entry>
</feed>
