<feed xmlns="http://www.w3.org/2005/Atom">
  <title>Beazley Security Labs Advisories</title>
  <link href="https://labs.beazley.security/advisories" rel="alternate"/>
  <id>https://labs.beazley.security/advisories</id>
  <updated>Mon, 06 Apr 2026 07:00:00 GMT</updated>

  <entry><title>Critical Auth Bypass Vulnerability in FortiClient EMS Under Active Exploitation (CVE-2026-35616)</title><link href="https://labs.beazley.security/advisories/BSL-A1166" rel="alternate"/><updated>2026-04-06T07:00:00.000Z</updated><published>2026-04-06T07:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1166</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On April 6<sup>th</sup>, CISA added a critical remote code execution (RCE) vulnerability in FortiClient Enterprise Management Server (EMS) to its Known Exploited Vulnerability (KEV) database. The vulnerability is being tracked as CVE-2026-35616 and impacts FortiClient EMS versions 7.4.5 and 7.4.6.</p><p>Limited technical details regarding the vulnerability have been released at the time of this writing. However, Fortinet PSIRT has also confirmed active exploitation in the wild.</p><p>As active exploitation has been documented, Beazley Security recommends that any affected organizations check FortiClient EMS systems for signs of compromise and apply released hotfixes immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><td><p>Product</p></td><td><p>Affected Version</p></td><td><p>Patch / Fix Available</p></td></tr><tr><td><p>FortiClient EMS</p></td><td><p>7.4.5</p></td><td><p><a href="https://docs.fortinet.com/document/forticlient/7.4.5/ems-release-notes/832484">7.4.5 Hotfix Available </a></p></td></tr><tr><td><p>FortiClient EMS</p></td><td><p>7.4.6</p></td><td><p><a href="https://docs.fortinet.com/document/forticlient/7.4.6/ems-release-notes/832484">7.4.6 Hotfix Available </a></p></td></tr></tbody></table><p>*FortiClient EMS 7.4.7 will also include a hotfix for this issue, but it has not been released at the time of this writing. </p></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>As active exploitation has been confirmed in the wild and hotfixes have been released, organizations should patch as soon as possible. If patching is not an immediate option, risk can be temporarily reduced by:</p><ul><li><p>Restricting access to FortiClient EMS management interfaces to internal, trusted networks only.</p></li><li><p>If remote access is required to manage endpoint security, secure access to FortiClient EMS behind a Virtual Private Network.</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Fortinet has confirmed that hotfixes have been released for versions 7.4.5 and 7.4.6 to prevent exploitation of this vulnerability. FortiClient EMS 7.4.7 will also include a fix. Hotfixes can be found by accessing the PSIRT <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">advisory</a>.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>At the time of this writing, Fortinet PSIRT confirmed active exploitation in the wild but have not publicly released indicators of compromise or technical details about the vulnerability.</p><p>The attack does not require authentication or user interaction, meaning exploitation can be carried out remotely by an attacker that has network access to an exposed FortiClient EMS instance.</p><p>Although no indicators of compromised have been released, defenders can monitor for:</p><ul><li><p>Unexpected configuration changes to FortiClient EMS devices or modifications to downstream endpoint security policies.</p></li><li><p>Unauthorized user accounts or privilege escalation on FortiClient EMS devices.</p></li><li><p>Unexpected process execution or processes spawned by EMS services.</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>Fortinet PSIRT teams have not released technical details regarding this vulnerability at the time of writing. CVE-2026-35616 is classified with NIST as an insufficient access control vulnerability meaning a remote attacker can exploit the vulnerability without any authentication checks.</p><p>FortiClient EMS functions as an endpoint management platform handling endpoint security policy such as antivirus configuration, web filtering, and other endpoint security features. Compromise of an EMS server could grant an attacker administrative positioning within the management plane of an environment. An attacker with control over EMS could issue malicious commands to compromise downstream managed endpoints and further compromise sensitive data and assets.</p><p>Given active exploitation in the wild and downstream impacts of compromise, Beazley Security recommends affected organizations apply hotfixes immediately.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team.</a></p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35616">https://nvd.nist.gov/vuln/detail/CVE-2026-35616</a></p></li><li><p><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">https://fortiguard.fortinet.com/psirt/FG-IR-26-099</a></p></li><li><p><a href="https://docs.fortinet.com/document/forticlient/7.4.6/ems-release-notes/832484">https://docs.fortinet.com/document/forticlient/7.4.6/ems-release-notes/832484</a></p></li><li><p><a href="https://docs.fortinet.com/document/forticlient/7.4.5/ems-release-notes/832484">https://docs.fortinet.com/document/forticlient/7.4.5/ems-release-notes/832484</a></p></li></ul></div>]]></content><summary type="html">On April 6th, CISA added a critical remote code execution vulnerability in FortiClient Enterprise Management Server to its Known Exploited Vulnerability (KEV) database. The vulnerability is being tracked as CVE-2026-35616 and is under active exploitation.</summary></entry><entry><title>Critical Vulnerabilities in Progress ShareFile (CVE-2026-2699, CVE-2026-2701)</title><link href="https://labs.beazley.security/advisories/BSL-A1165" rel="alternate"/><updated>2026-04-02T05:00:00.000Z</updated><published>2026-04-02T05:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1165</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On April 2<sup>nd</sup>, 2026, the cybersecurity research company watchTowr publicly disclosed a proof-of-concept exploit for two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) affecting Progress ShareFile. When chained together, these vulnerabilities allow an unauthenticated attacker to bypass authentication and achieve remote code execution (RCE) on targeted systems. </p><p>Although Progress Software has not confirmed active exploitation at the time of this writing, watchTowr has released exploit code including an in-depth analysis of the vulnerabilities and exploit chain. Because ShareFile Storage is commonly used to manage and store sensitive enterprise data, the software is particularly attractive to threat actors with similar platforms having a long history of being targeted. </p><p>Given the public disclosure of exploit code and sensitive data hosted in these systems, Beazley Security suspects exploitation attempts will begin soon and recommends organizations patch affected systems immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product</p></th><th><p>Affected Versions</p></th><th><p>Fixed Version</p></th></tr><tr><td><p>ShareFile Storage Zones Controller 5x</p></td><td><p>5.x prior to 5.12.4</p></td><td><p>5.12.4</p></td></tr></tbody></table><p>*All 6.x versions are unaffected. Customers on vulnerable versions of 5.x can also upgrade to 6.x releases for remediation</p></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Given the recent exploit disclosure by WatchTowr, it is strongly recommended that affected organizations upgrade to fixed versions of the ShareFile Storage software. Progress ShareFile has released patches to remediate these vulnerabilities. Please see the “Patches” section for more information.</p><p>If patching cannot be immediately applied, these mitigations may help temporarily reduce risk of compromise:</p><ul><li><p>Restrict network access to the Storage Zones Controller to trusted and expected B2B traffic only.</p></li><li><p>Implement a Web Application Firewall (WAF) to detect and block malicious requests to the /ConfigService/Admin.aspx endpoint.</p></li><li><p>Ensure modern EDR is running and up to date on the affected hosting server.</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches have been made available by Progress ShareFile via their <a href="https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26">documentation website</a>. Affected customers on versions of the 5.x branch should upgrade to 5.12.4 or migrate to supported 6.x releases. Technical support is available to customers under active warranty and maintenance.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>At the time of this writing, Progress Software confirmed they’ve not had reports of these vulnerabilities exploited in the wild. However, watchTowr Labs publicly disclosed a full exploit chain and working proof of concept as of April 2, 2026.</p><p>Defenders can watch for the following behavioral indicators of attack: </p><ul><li><p>Monitor for suspicious access attempts to /ConfigService/Admin.aspx, especially requests that return HTTP 302 responses with very large response bodies.</p></li><li><p>Review ShareFile Storage Zone configurations for unauthorized or unexpected changes to Storage Repositories, which could indicate post exploitation activity.</p></li><li><p>Audit webroot directories such as c:\inetpub\wwwroot\ShareFile\StorageCenter\ for unexpected .aspx files, which may be an indicator of a webshell deployment.</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>According to research from <a href="https://labs.watchtowr.com/youre-not-supposed-to-sharefile-with-everyone-progress-sharefile-pre-auth-rce-chain-cve-2026-2699-cve-2026-2701/">watchTowr</a>, the unauthenticated RCE exploit chain involves two vulnerabilities: CVE-2026-2699, an authentication bypass, and CVE-2026-2701, which enables RCE through an arbitrary file upload within the ShareFile Storage Zone Controller.</p><p>The full exploitation process is more involved, and watchTower provides a detailed technical write-up of how the vulnerabilities were identified and chained together. A simplified summary is provided below:</p><p><b>CVE-2026-2699 – Authentication Bypass</b></p><p>A flaw exists due to how the application handles unauthenticated requests in its admin page (/ConfigService/Admin.aspx). When a user who is not logged in accesses this page, the application attempts to redirect them away. In this case, the redirect is implemented in a way that the server still provides the rest of the admin page in its redirect response. An attacker can force the application to ignore the redirect behavior, allowing the full admin interface to load without authentication.</p><p><b>CVE-2026-2701 – Post Authentication Remote Code Execution</b></p><p>After bypassing authentication with CVE-2026-2699, an attacker can access admin interfaces and modify network storage locations, including pointing to local filesystem and web accessible directories on the controller. The /StorageCenter/Upload.aspx endpoint can then be used to upload and extract zipped archives. When these issues are combined, a malicious .aspx webshell can be uploaded and then extracted to an exposed repository location reachable over HTTP to execute commands resulting in RCE.</p><p>In summary, CVE-2026-2699 allows attackers to bypass authentication and access the ShareFile admin interface, while CVE-2026-2701 can then be used to upload and execute malicious files on the server resulting in RCE and compromise of the server.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team</a>.</p></div>]]></content><summary type="html">On April 2nd, 2026, the cybersecurity research company watchTowr publicly disclosed a proof-of-concept exploit for two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) affecting Progress ShareFile. When chained together, these vulnerabilities allow an unauthenticated attacker to bypass authentication and achieve remote code execution (RCE) on targeted systems. </summary></entry><entry><title>Critical Supply Chain Attack of NPM Package Axios</title><link href="https://labs.beazley.security/advisories/BSL-A1164" rel="alternate"/><updated>2026-03-30T22:00:00.000Z</updated><published>2026-03-30T22:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1164</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On March 30<sup>th</sup>, An NPM supply chain attack was performed on the widely used NPM package Axios. Axios is one of the most ubiquitous JavaScript libraries, and is commonly seen in most JavaScript deployments. The attackers gained access to the NPM credentials of one of the Axios developers and released a malicious package that would fetch and install a cross-platform Remote Access Trojan (RAT) to macOS, Windows, and Linux systems. </p><p>The malicious libraries published to NPM were removed within three hours and are not available to download as of the time of publication. </p><p>Organizations that are affected should immediately audit to see npm packages to confirm whether <code>axios@1.14.1</code> or <code>axios@0.30.4</code> were installed. If so treat the machine as compromised and follow the Mitigations and Workarounds below.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p>Product </p></th><th><p>Affected Version </p></th><th><p>Unaffected Version </p></th></tr><tr><td><p>Axios </p></td><td><p>1.14.1 </p></td><td><p>1.14.0 </p></td></tr><tr><td><p>Axios </p></td><td><p>0.30.4 </p></td><td><p>0.30.3</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Block the endpoint used for Command and Control for this attack: <code>sfrclak[.]com</code> on port 8000 at the time of the attack this was resolving to <code>142.11.206.73</code> If you believe that a machine has already been compromised, we do not advise cleaning in place and recommend re-imaging or rebuilding affected machines from known good images. Using pinned versions of libraries is recommended to prevent this kind of attack if new malicious versions are released for any library. To specifically pin axios to a known unaffected version perform the following depending on your existing version: </p><ul><li><p><code>npm install axios@1.14.0</code></p></li><li><p><code>npm install axios@0.30.3</code></p></li></ul><p>NPM offers a configuration <code>npm config set min-release-age 3</code> that will enforce a two to 3 day waiting period on new package releases before installing them on your machine. This is advised for all developers using external packages. For machines running without human interaction, such as CI/CD pipelines we advise not only version pinning of packages but disabling scripts on installs with the <code>--ignore-scripts</code> argument wherever possible. </p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>While not strictly a patch, ensuring that any installed affected npm packages are removed and purged from your machines is strongly recommended. This involves removing the affected packages and installing pinned versions of the unaffected axios package: </p><ul><li><p><code>rm -rf node_modules/plain-crypto-js </code></p></li><li><p><code>npm install --ignore-scripts </code></p></li><li><p><code>npm cache clean –force</code></p></li></ul></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><ul><li><p><b>Network Activity</b></p><ul><li><p><code>sfrclak[.]com:8000</code></p></li><li><p><code>callnrwise[.]com</code></p></li><li><p><code>142.11.206[.]73</code></p></li></ul></li><li><p><b>Windows Files</b></p><ul><li><p><code>%PROGRAMDATA%\wt.exe</code></p></li><li><p><code>%PROGRAMDATA%\system.bat</code></p></li><li><p><code>%TEMP%\6202033.vbs</code></p></li><li><p><code>%TEMP%\6202033.ps1</code></p></li><li><p><code>%TEMP%\&lt;GUID>.ps1</code></p></li></ul></li><li><p><b>Windows Registry Entries</b></p><ul><li><p><code>Key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code></p></li><li><p><code>Name: MicrosoftUpdate</code></p></li><li><p><code>Value: %PROGRAMDATA%\system.bat</code></p></li></ul></li><li><p><b>macOS Files</b></p><ul><li><p><code>/Library/Caches/com.apple.act.mond</code></p></li><li><p><code>/tmp/.XXXXXX.scpt</code></p></li><li><p><code>/private/tmp/.*</code></p></li></ul></li><li><p><b>Linux Files</b></p><ul><li><p><code>/tmp/ld.py</code></p></li></ul></li></ul><p>File Hashes </p><table><tbody><tr><th><p><b>Hash (SHA-256)</b> </p></th><th><p><b>Description</b> </p></th></tr><tr><td><p>fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf </p></td><td><p>/tmp/ld.py - linux RAT</p></td></tr><tr><td><p>92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a </p></td><td><p>/Library/Caches/com.apple.act.mond - macOS RAT </p></td></tr><tr><td><p>617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 </p></td><td><p>%PROGRAMDATA%\wt.exe - Windows RAT</p></td></tr><tr><td><p>e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 </p></td><td><p>setup.js – Dropper Script </p></td></tr><tr><td><p>f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd </p></td><td><p>system.bat – PowerShell Script </p></td></tr><tr><td><p>e49c2732fb9861548208a78e72996b9c3c470b6b562576924bcc3a9fb75bf9ff </p></td><td><p>system.bat – PowerShell Script </p></td></tr><tr><td><p>ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c </p></td><td><p>6202033 – PowerShell Script </p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients. </p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach"><u>contact our Incident Response team.</u></a> </p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://github.com/axios/axios/issues/10604">https://github.com/axios/axios/issues/10604</a></p></li><li><p><a href="https://www.invictus-ir.com/news/the-poisoned-pipeline-axios-supply-chain-attack">https://www.invictus-ir.com/news/the-poisoned-pipeline-axios-supply-chain-attack</a></p></li><li><p><a href="https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package">https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package</a></p></li></ul></div>]]></content><summary type="html">On March 30th, An NPM supply chain attack was performed on the widely used NPM package Axios. Axios is one of the most ubiquitous JavaScript libraries. The attack involves a malicious cross-platform Remote Access Trojan (RAT) to macOS, Windows, and Linux systems.</summary></entry><entry><title>Critical Vulnerability Under Active Exploitation in F5 BIG-IP APM (CVE-2025-53521)</title><link href="https://labs.beazley.security/advisories/BSL-A1163" rel="alternate"/><updated>2026-03-30T07:00:00.000Z</updated><published>2026-03-30T07:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1163</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On March 28<sup>th</sup>, F5 published an advisory updating the severity of a previously reported vulnerability in BIG-IP APM (CVE-2025-53521) to a CVSS score of 9.8. Initially classified as a denial-of-service (DoS) vulnerability, it was discovered that the bug was instead being actively used for remote code execution (RCE). BIG-IP devices are commonly deployed on network perimeters, so successful compromise can provide threat actors initial access into an organization’s network.</p><p>The bug was initially reported in October 2025 along with a large number of other F5 product vulnerabilities exposed by an APT breach that <a href="https://labs.beazley.security/advisories/BSL-A1140">we previously reported on</a>. As predicted, threat actors appear to have used the stolen data to develop vulnerabilities and deploy weaponized exploits.</p><p>While there are no known <i>publicly available</i> proof of concept (PoC) exploits available for CVE-2025-53521 at time of writing, the vulnerability <i>is</i> already being actively exploited in the wild as confirmed by its addition to the CISA KEV catalogue. Beazley Security strongly recommends affected organizations apply the security fixes released by F5.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><p>CVE-2025-53521 affects BIG-IP devices where Access Policy Manager (APM) has been enabled. For more details on that system see the <a href="https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-config-11-4-0/apm_config_intro.html">product documentation</a>.</p><table><tbody><tr><th><p><b>Product</b></p></th><th><p><b>Affected Versions</b></p></th><th><p><b>Fixed Version</b></p></th></tr><tr><td><p>BIG-IP APM 17.x</p></td><td><p>17.5.0 - 17.5.1</p><p>17.1.0 - 17.1.2</p></td><td><p>17.5.1.3</p><p>17.1.3</p></td></tr><tr><td><p>BIG-IP APM 16.x</p></td><td><p>16.1.0 - 16.1.6</p></td><td><p>16.1.6.1</p></td></tr><tr><td><p>BIG-IP APM 15.x</p></td><td><p>15.1.0 - 15.1.10</p></td><td><p>15.1.10.8</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>No mitigations or workarounds aside from the security patches were reported for CVE-2025-53521.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches have been available for some time now, review the table above for specific version numbers and the <a href="https://my.f5.com/manage/s/article/K000156741">vendor advisory</a> for guidance on applying upgrades.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>F5 provided a detailed article <a href="https://my.f5.com/manage/s/article/K000160486">documenting IOCs</a> observed in an incident referenced by their <a href="https://my.f5.com/manage/s/article/K000156741">CVE-2025-53521 advisory</a>. We will summarize some of those here.</p><p><b>File Activity</b></p><ul><li><p>Presence of new files <code>/run/bigtlog.pipe</code> and/or <code>/run/bigstart.ltm</code></p></li><li><p>Changes to existing files <code>/usr/bin/umount</code> and/or <code>/usr/sbin/httpd</code></p></li></ul><p><b>Log Activity</b></p><ul><li><p>Log file: <code>/var/log/restjavad-audit.&lt;NUMBER>.log</code></p></li></ul><p><code>[ForwarderPassThroughWorker{&quot;user&quot;:&quot;local/f5hubblelcdadmin&quot;,&quot;method&quot;:&quot;POST&quot;,&quot;uri&quot;:&quot;http://localhost:8100/mgmt/tm/util/bash&quot;,&quot;status&quot;:200,&quot;from&quot;:&quot;Unknown&quot;}</code></p><ul><li><p>Log file: <code>/var/log/auditd/audit.log.&lt;NUMBER></code></p></li></ul><p><code>msg='avc: received setenforce notice (enforcing=0) exe=&quot;/usr/lib/systemd/systemd&quot; sauid=0 hostname=? addr=? terminal=?'</code></p><ul><li><p>Log file: <code>/var/log/audit</code></p></li></ul><p><code>user=f5hubblelcdadmin folder=/Common module=(tmos)# status=[Command OK] cmd_data=run util bash &lt;VARIABLE_COMMAND></code></p><p><b>Command Output</b></p><ul><li><p>sys-eicheck: An integrity check application that was observed reporting failures for the files <code>/usr/bin/umount</code> and <code>/usr/sbin/httpd</code> mentioned above</p></li><li><p>lsof -n: The common ‘list open files’ application was observed showing entries for the above mentioned <code>/run/bigtlog.pipe</code> file</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>No in-depth technical details of the vulnerability or proof-of-concept exploit code are known at time of writing.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found. </p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients. </p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team</a>. </p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://my.f5.com/manage/s/article/K000156741">F5: K000156741: BIG-IP APM vulnerability CVE-2025-53521</a></p></li><li><p><a href="https://my.f5.com/manage/s/article/K000160486">F5: K000160486: Indicators of Compromise for c05d5254</a></p></li><li><p><a href="https://www.cisa.gov/news-events/alerts/2026/03/27/cisa-adds-one-known-exploited-vulnerability-catalog">CISA KEV: F5 BIG-IP Remote Code Execution Vulnerability</a></p></li><li><p><a href="https://labs.beazley.security/advisories/BSL-A1140">BSL: A1140 - F5 Source Code, Engineering Documentation and undisclosed vulnerabilities stolen by Nation State Threat Actors</a></p></li></ul></div>]]></content><summary type="html">On March 28th, F5 published an advisory updating the severity of a previously reported vulnerability in BIG-IP APM (CVE-2025-53521) to a CVSS score of 9.8. Initially classified as a denial-of-service (DoS) vulnerability, it was discovered that the bug was instead being actively used for remote code execution (RCE). BIG-IP devices are commonly deployed on network perimeters, so successful compromise can provide threat actors initial access into an organization’s network.</summary></entry><entry><title>Critical Vulnerability in Citrix NetScaler ADC and Gateway Security Products (CVE-2026-3055)</title><link href="https://labs.beazley.security/advisories/BSL-A1162" rel="alternate"/><updated>2026-03-30T14:42:35.023Z</updated><published>2026-03-23T05:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1162</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p><b>03/30/2026 Update: </b>Citrix has disclosed additional details identifying the component leveraged in this exploit as part of the the SAML authentication workflow. Beazley Security Labs has identified several reports of attackers increasing probing of this vulnerability in the wild. This behavior implies attackers are actively developing or already have created an exploit and that patching and updating any vulnerable systems is more critical.</p><p>
On March 23<sup>rd</sup>, Citrix published an advisory detailing a critical severity vulnerability in their NetScaler ADC and Gateway products. The vulnerability, tracked as CVE-2026-3055, and with a CVSS score of 9.3 allows an unauthenticated attacker to cause a memory overread in the device.</p><p>Beazley Security Labs has no additional details other than what is provided by the vendor in the advisory, however the flaw is conceptually similar to critical information disclosure vulnerabilities in the past referred to as “CitrixBleed”. Such vulnerabilities have the potential to leak credential material and other sensitive data that can be used to compromise these internet facing devices, providing attackers initial access to an organization’s network.</p><p>The vulnerability was discovered by internal Citrix teams, and patches were provided with the advisory. At time of writing, there are no publicly available proof-of-concept (PoC) exploits available or reports of threat actor abuse in the wild.</p><p>Given the ease of exploitation and high impact of previous similar vulnerabilities, Beazley Security expects threat actors to study the patches and deploy weaponized exploits in the coming days. We strongly recommend affected organizations patch their devices as soon as possible. If organizations are unable to apply the patch, they should disable the SAML IdP functionality as described in the &quot;Mitigations and Workarounds&quot; section of this document.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><p>The advisory only affects customer-managed NetScaler ADC and Gateway products. Citrix-managed appliances had software updates applied prior to disclosure.</p><p>Additionally, <b>a device needed to be configured as a SAML Identity Provider (IdP) to be vulnerable</b>. Citrix provided the following configuration string to help identify impacted device configurations:</p><p><code>add authentication samlIdPProfile.*</code></p><table><tbody><tr><td><p><b>Product</b></p></td><td><p><b>Affected Versions</b></p></td><td><p><b>Fixed Version</b></p></td></tr><tr><td><p>NetScaler ADC and NetScaler Gateway 14.1</p></td><td><p>&lt; 14.1-66.59</p></td><td><p>14.1-66.59</p></td></tr><tr><td><p>NetScaler ADC and NetScaler Gateway 13.1</p></td><td><p>&lt; 13.1-62.23</p></td><td><p>13.1-62.23</p></td></tr><tr><td><p>NetScaler ADC FIPS and NDcPP</p></td><td><p>&lt; 13.1.37.262</p></td><td><p>13.1.37.262</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Citrix provided no specific mitigation or workaround steps in their advisory outside of applying product upgrade patches. However, given the pre-condition of having SAML IdP configured in order for a device to be vulnerable, Beazley Security recommends turning this feature off as a precaution if you are unable to apply patches immediately.</p><p>Additional information regarding this component can be found in the NetScaler SAML IdP <a href="https://docs.netscaler.com/en-us/citrix-adc/current-release/aaa-tm/authentication-methods/saml-authentication/citrix-adc-saml-idp.html">product documentation</a>.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches were made available at the time of disclosure, more details can be found in the official Citrix advisory <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300">here</a>.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p><b>03/30/2026 Update:</b> Citrix included additional details identifying vulnerable systems as those configured as a SAML identity provider. This was likely Citrix attempting to communicate the affected population was smaller than every publicly accessible ADC instance, but it reveals the specific component required for an attackers. With this update, reports have shown that there is an increase in traffic to SAML endpoints on ADC hosts. Administrators should identify if the <code>Add authentication samlIdPProfile .*</code> configuration string is present on a host to know if they are actively being targeted, and should prioritize patching immediately.</p><p>

The bug was discovered by internal Citrix teams, and no in-depth technical details were provided within their advisory at the time of this writing. However, a pre-authentication, network reachable vulnerability that results in a “memory overread” is a highly similar condition to previous high-impact information disclosure vulnerabilities in Citrix products infamously dubbed <a href="https://www.cybereason.com/blog/threat-alert-citrixbleed-cve-2023-4966">CitrixBleed</a> and <a href="https://www.akamai.com/blog/security-research/mitigating-citrixbleed-memory-vulnerability-ase">CitrixBleed 2</a>.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team</a>.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300">Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368</a></p></li><li><p><a href="https://www.cybereason.com/blog/threat-alert-citrixbleed-cve-2023-4966">Cyberreason: Threat Alert: CitrixBleed (CVE-2023-4966)</a></p></li><li><p><a href="https://www.akamai.com/blog/security-research/mitigating-citrixbleed-memory-vulnerability-ase">Akamai: Mitigating CitrixBleed 2 (CVE‑2025‑5777) NetScaler Memory Disclosure with App &amp; API Protector</a></p></li></ul></div>]]></content><summary type="html">On March 23rd, Citrix published an advisory detailing a critical severity vulnerability in their NetScaler ADC and Gateway products. The vulnerability, tracked as CVE-2026-3055, and with a CVSS score of 9.3 allows an unauthenticated attacker to cause a memory overread in the device potentially disclosing sensitive information.</summary></entry><entry><title>Critical Vulnerability in Oracle Identity Manager and Web Services Manager (CVE-2026-21992)</title><link href="https://labs.beazley.security/advisories/BSL-A1161" rel="alternate"/><updated>2026-03-23T05:00:00.000Z</updated><published>2026-03-23T05:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1161</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>Oracle has released an emergency out-of-band patch for a critical remote code execution vulnerability affecting Oracle Identity Manager (OIM) and Oracle Web Services Manager (OWSM). The vulnerability is tracked as CVE-2026-21992 and is rated at a critical CVSS score of 9.8.</p><p>If successfully exploited, the flaw allows an unauthenticated attacker to execute code remotely over affected HTTP endpoints on the system without user interaction, which could result in a complete compromise of underlying hosting servers. These applications are commonly deployed on a network perimeter, and successful compromise by a threat actor can grant them initial access into an organization’s network.</p><p>Flaws within Oracle Identity Manager and Fusion Middleware have a recent, documented history of being targeted and weaponized by threat actors. Beazley Security assesses that CVE-2026-21992 is likely to be exploited soon and strongly recommends that affected organizations patch immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><td><p>Product</p></td><td><p>Affected Versions</p></td><td><p>Fixed Versions</p></td></tr><tr><td><p>Oracle Identity Manager (OIM)</p></td><td><p>12.2.1.4.0, 14.1.2.1.0</p></td><td><p>Fusion Middleware KB878741</p></td></tr><tr><td><p>Oracle Web Services Manager (OWSM)</p></td><td><p>12.2.1.4.0, 14.1.2.1.0</p></td><td><p>Fusion Middleware KB878741</p></td></tr></tbody></table><p>Affected versions patched via Oracle out-of-band update (KB878741). Please see the “Patches” section for more information.</p></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Given recent targeting and active exploitation events against Oracle components by Ransomware operators, patching is strongly encouraged. Oracle has released emergency patches to remediate this vulnerability, please see the “patches” section for more information.</p><ul><li><p>If patching cannot be immediately applied, the following mitigations may temporarily reduce the risk of exposure:</p></li><li><p>If possible, restrict public network access to or consider temporary isolation of Oracle systems, especially those exposing OIM and WSM endpoints</p></li><li><p>Implement Web Application Firewall (WAF) rules to detect and block malicious or unexpected payloads targeting Oracle middleware endpoints</p></li><li><p>Monitor OIM and OWSM servers for unusual activity, including unexpected process executions and other outbound connections</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches are available through Oracle’s Fusion Middleware Patch Availability <a href="https://support.oracle.com/support/?documentId=KB878741">Document</a> (requires Oracle login) which provides step-by-step installation instructions tailored to supported versions.</p><p>For additional information, please see Oracle’s original <a href="https://www.oracle.com/security-alerts/alert-cve-2026-21992.html">security advisory</a>.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>Oracle has not confirmed active exploitation of CVE-2026-21992 or released any public indicators of compromise at the time of this advisory. Given the history of Oracle Identity Manager vulnerabilities being targeted, defenders can monitor for the following indicators of attack:</p><ul><li><p>Unusual HTTP/HTTPS POST requests to Oracle middleware endpoints</p></li><li><p>Unexpected access attempts to oim or wsm resource paths</p></li><li><p>Unexpected process execution on Oracle application servers</p></li><li><p>Abnormal outbound network connections originating from affected servers</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>The vulnerability in Oracle Identity Manager and Oracle Web Services Manager products is being tracked as CVE-2026-21992 and classified by Oracle as “remotely exploitable without authentication”. If exploited, the flaw allows unauthenticated attackers with network access to compromise Oracle Identity Manager and Oracle Web Services Manager via HTTP, potentially resulting in full system compromise.</p><p>Oracle has released limited technical details about the flaw at the time of this advisory. Although exploit details have not been publicly disclosed, the affected components (OIM and OWSM) are commonly exposed through web accessible middleware endpoints. NIST has assessed the vulnerability as “<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21992">easily</a>” exploitable, indicating that the flaw may not require sophistication to compromise.</p><p>Beazley Security Labs cannot confirm the validity of a publicly referenced exploit posted on <a href="https://github.com/TEXploited/CVE-2026-21992">GitHub</a> at the time of this writing, but a purported PoC was observed for sale at approximately $2.5k USD given current exchange rates. A seemingly related vulnerability (<a href="https://labs.beazley.security/advisories/BSL-A1145">CVE-2025-61757</a>) stemmed from insufficient authentication protections within Oracle Identity Manager in October 2025 and was quickly confirmed as exploited in the wild after disclosure. </p><p>Given the severity of this vulnerability, potential for exploitation, and historical targeting and weaponization of similar flaws discovered in Oracle, Beazley Security strongly recommends that organizations apply the available patches as soon as possible.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team</a>.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://support.oracle.com/support/?documentId=KB878741">https://support.oracle.com/support/?documentId=KB878741</a></p></li><li><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21992">https://nvd.nist.gov/vuln/detail/CVE-2026-21992</a></p></li><li><p><a href="https://www.oracle.com/security-alerts/alert-cve-2026-21992.html">https://www.oracle.com/security-alerts/alert-cve-2026-21992.html</a></p></li><li><p><a href="https://labs.beazley.security/advisories/BSL-A1145">https://labs.beazley.security/advisories/BSL-A1145</a></p></li><li><p><a href="https://github.com/TEXploited/CVE-2026-21992">https://github.com/TEXploited/CVE-2026-21992</a></p></li></ul></div>]]></content><summary type="html">Oracle has released an emergency out-of-band patch for a critical remote code execution vulnerability affecting Oracle Identity Manager (OIM) and Oracle Web Services Manager (OWSM). The vulnerability is tracked as CVE-2026-21992 and is rated at a critical CVSS score of 9.8. </summary></entry><entry><title>Critical Vulnerability in Microsoft SharePoint under Active Exploitation (CVE-2026-20963)</title><link href="https://labs.beazley.security/advisories/BSL-A1160" rel="alternate"/><updated>2026-03-20T05:00:00.000Z</updated><published>2026-03-20T05:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1160</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On March 18<sup>th</sup>, 2026, CISA added a Microsoft SharePoint vulnerability tracked as CVE-2026-20963 to its Known Exploited Vulnerabilities (KEV) catalog, confirming that the vulnerability is now being actively exploited in the wild.</p><p>The vulnerability is classified as a deserialization flaw that allows unauthenticated remote attackers to achieve remote code execution on affected SharePoint servers, potentially resulting in complete compromise of the server and hosted data. Microsoft released patches to fix this vulnerability in January 2026. Impacted versions of Microsoft SharePoint include SharePoint Server Subscription Edition, SharePoint Server 2019, and Microsoft SharePoint Enterprise Server 2016.</p><p>Due to confirmed exploitation, and the sensitive nature of data hosted in SharePoint, Beazley Security strongly recommends organizations immediately patch affected SharePoint versions.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><td><p>Product</p></td><td><p>Affected Versions</p></td><td><p>Fixed Version</p></td></tr><tr><td><p>Microsoft SharePoint Server Subscription Edition</p></td><td><p>Prior to 16.0.19127.20442</p></td><td><p>16.0.19127.20442 </p></td></tr><tr><td><p>Microsoft SharePoint Enterprise Server 2016</p></td><td><p>Prior to 16.0.10417.20083</p></td><td><p>16.0.10417.20083 </p></td></tr><tr><td><p>Microsoft SharePoint Server 2019</p></td><td><p>Prior to 16.0.5535.1001</p></td><td><p>16.0.5535.1001 </p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Given the sensitive nature of SharePoint data and confirmed active exploitation of CVE-20216-20963, organizations should prioritize patching with the available January 2026 fixes provided by Microsoft. If patching is not immediately possible, risk may be reduced by:</p><ul><li><p>Restricting network access to affected SharePoint servers from the internet and other untrusted sources.</p></li><li><p>Following best practice network segmentation to isolate vulnerable SharePoint servers from other sensitive internal resources, which limits potential for lateral movement if compromised.</p></li><li><p>Deploying Web Application Firewalls (WAFs) to detect and block attacks targeting vulnerable systems.</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Patches are available through the “Security Updates” section within Microsoft’s Security Response Center (MSRC) and can be located toward the bottom of this <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963">website</a>.</p><p>Microsoft originally released fixes as part of its January 2026 “Patch Tuesday” release cycle.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>Neither CISA nor Microsoft have publicly released details about indicators of compromise or attack. The identity or attribution of threat actors exploiting this vulnerability have also not been publicly disclosed at the time of this writing.</p><p>Prior critical SharePoint vulnerabilities such as “<a href="https://labs.beazley.security/advisories/BSL-A1124">ToolShell</a>” have been targeted by state-sponsored groups and ransomware operators, who deployed and weaponized web shells on affected systems.</p><p>Given the lack of public indicators, defenders can watch for the following behaviors common to deserialization attacks against SharePoint servers:</p><ul><li><p>Unexpected processes spawned by SharePoint worker processes, such as w3wp.exe launching system tools like cmd.exe, powershell.exe, or net.exe.</p></li><li><p>Malicious webshell files commonly appended with .aspx, .ashx, or .asmx, indicating post-exploitation activity and persistence.</p></li><li><p>Other unexpected or unauthorized files appearing on vulnerable SharePoint servers, specifically in SharePoint web directories.</p></li></ul></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>CVE-2026-2093 is classified as a deserialization vulnerability affecting SharePoint Enterprise Server 2016, SharePoint Server 2019, and SharePoint Server Subscription Edition. This flaw allows an unauthenticated remote attacker to send a specially crafted serialized payload to a vulnerable SharePoint endpoint, resulting in remote code execution on the hosting server.</p><p>If successfully exploited, executed code is expected to run under the security context of the SharePoint application process, granting the attacker ability to read and write files to the server, interact with connected resources, and deploy additional payloads in attempt to establish persistence.</p><p>Active exploitation has been <b>confirmed in the wild</b>, and SharePoint has a documented history of being targeted by nation-state actors and opportunistic ransomware operators. </p><p>Given that SharePoint commonly serves as a central repository for sensitive information, Beazley Security strongly recommends that affected organizations apply provided January 2026 fixes immediately.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client environments through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please <a href="https://beazley.security/report-security-breach">contact our Incident Response team.</a></p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963</a></p></li><li><p><a href="https://www.cve.org/CVERecord?id=CVE-2026-20963">https://www.cve.org/CVERecord?id=CVE-2026-20963</a></p></li><li><p><a href="https://labs.beazley.security/advisories/BSL-A1124">https://labs.beazley.security/advisories/BSL-A1124</a></p></li></ul></div>]]></content><summary type="html">On March 18th, 2026, CISA added a Microsoft SharePoint vulnerability tracked as CVE-2026-20963 to its Known Exploited Vulnerabilities (KEV) catalog, confirming that the vulnerability is now being actively exploited in the wild.</summary></entry><entry><title>Critical Vulnerability in Ubiquiti Network Application (CVE-2026-22557)</title><link href="https://labs.beazley.security/advisories/BSL-A1159" rel="alternate"/><updated>2026-03-18T23:00:00.000Z</updated><published>2026-03-18T23:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1159</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On March 18th, Ubiquiti disclosed a Path Traversal vulnerability within its Unifi Network Application, CVE-2026-22557, which can be exploited to gain access to and manipulate system files that result in compromise of an underlying account. Given the proliferation of Ubiquiti appliances deployed without direct network access we are unable to identify the majority of Ubiquiti Network Management deployments.</p><p>Beazley Security recommends that affected organizations patch immediately, especially if vulnerable Ubiquiti systems have management consoles exposed to the internet.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p><b>Product</b> </p></th><th><p><b>Affected Versions</b> </p></th><th><p><b>Fixed Versions</b> </p></th></tr><tr><td><p>UniFi Network application Official Release</p></td><td><p>&lt;10.1.85</p></td><td><p>10.1.85</p></td></tr><tr><td><p>UniFi Network application Release Candidate</p></td><td><p>&lt;10.2.93</p></td><td><p>10.2.93</p></td></tr><tr><td><p>UniFi Network application UniFi Express (UX)</p></td><td><p>&lt;9.0.114</p></td><td><p>9.0.114</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Currently no mitigations and workarounds exist for this vulnerability. Ubiquiti and Beazley Security advise updating any Network instances in your UniFi console.

It’s advisable to not allow external network access to your UniFi Management console and instead leverage <a href="https://help.ui.com/hc/en-us/articles/20680072882967-UniFi-Remote-Management-via-Site-Manager">Ubiquiti’s Remote Site Management</a> service.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Updating a Ubiquti UniFi Network Application is performed through the UniFi Portal within the Control Plane Settings.</p><ol><li><p>Click the settings cog in on the left-most pane.</p></li><li><p>Access the “Control Plane” settings.</p></li><li><p>Within the loaded pane, ensure you select “Updates”</p></li><li><p>Click the “Update to X.X.X” button within the Network Application Row.</p></li></ol><img src="//images.ctfassets.net/2nw9zhl2ydi6/q1sAX9fwIoFnEHE12JXUb/a1a9050ef32a3d067245117b60bcbace/unifi_network_update.png" alt="UniFi Netowork Update Instructions" style="max-width:100%;"/><p>Beazley Security also advises users running the UniFi Management Systems to enable automatic updates on their machines if possible. This is accessible by clicking the Application row within the UI and selecting a Release Channel and update Cadence from within the UI.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>Ubiquiti has not released any IoCs or indicators of attack related to this vulnerability at the time of disclosure.</p><p>Given that successful exploition of this vulnerability could give attackers the ability to make changes to the UniFi network, add accounts, or add other mechanisms to access to internal systems it is advised to review affected UniFi Console configurations for unexpected or anomalous activity.</p><p>UniFi Consoles enable backups and restoration of the Control Plane and should be leveraged if unexpected changes appear to be made.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>At the time of this writing Ubiquiti have released limited technical details within their <a href="https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b">security advisory</a>. The vulnerability is stated as a Path Traversal vulnerability within the UniFi Network Application, that if exploited could allow an unauthenticated attacker access to sensitive accounts.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b">https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b</a></p></li><li><p><a href="https://help.ui.com/hc/en-us/articles/20680072882967-UniFi-Remote-Management-via-Site-Manager">https://help.ui.com/hc/en-us/articles/20680072882967-UniFi-Remote-Management-via-Site-Manager</a></p></li></ul></div>]]></content><summary type="html">On March 18th, Ubiquiti disclosed a Path Traversal vulnerability in the Unifi Network Application, CVE-2026-22557, which can be leveraged to access the underlying file system and could lead to further modifications and result in compromise of an underlying account.</summary></entry><entry><title>Known Abuse of Ivanti EPM Authentication Bypass (CVE-2026-1603)</title><link href="https://labs.beazley.security/advisories/BSL-A1158" rel="alternate"/><updated>2026-03-09T23:00:00.000Z</updated><published>2026-03-09T23:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1158</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p>On Feb 10th, Ivanti published CVE-2026-1603 to NIST <a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US">disclosing an authentication bypass</a> in Ivanti Endpoint Manager that allowed a &quot;remote unauthenticated attacker to leak specific stored credential data&quot;. Three days later WatchTowr Labs <a href="https://x.com/watchtowrcyber/status/2022305033086235108">discovered and disclosed</a> a hard-coded <code>logintype</code> key that if exploited, bypassed authentication mechanisms allowing an attacker privileged access on an affected device. On March 9th the flaw was confirmed as being actively exploited in the wild when the CVE was added to CISA’s Known Exploited Vulnerabilities Catalog (KEV).</p><p>
Authenticating with this <code>logintype</code> allows future compromise of user sessions and access of arbitrary data on the Endpoint Manager host. Subsequently, Ivanti updated their Security Advisory to claim the vulnerability required an “authenticated user” to bypass authorization.</p><p>
Given confirmed active exploitation and public disclosure, Beazley Security believes that additional threat actors will continue to leverage this flaw to gain unauthorized access unpatched Ivanti systems. Organizations operating Ivanti Endpoint Manager systems should review systems for signs of compromise and patch immediately.
</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><table><tbody><tr><th><p><b>Product</b></p></th><th><p><b>Affected Versions</b></p></th><th><p><b>Fixed Versions</b></p></th><th><p><b>Availability</b></p></th></tr><tr><td><p>Ivanti Endpoint Manager (EPM)</p></td><td><p>2024 SU4 SR1 and prior</p></td><td><p>2024 SU5</p></td><td><p>Available no</p></td></tr></tbody></table></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Affected organizations that are unable to immediately patch should ensure strict network access controls are in place. Any organization with a publicly exposed Ivanti EPM product should immediately rotate passwords and access for all EPM accounts, as well as audit authentication logs for any unexplained access.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p>Ivanti has released fixes for all supported versions of the Ivanti Endpoint Manager in their Ivanti <a href="https://forums.ivanti.com/s/article/How-to-access-software-downloads-in-the-Ivanti-License-System">License System portal</a> which requires login.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>While Ivanti stated it was unaware of customer exploitation prior to public disclosure, CISA confirmed active exploitation of CVE-2026-1603 in the wild as of March 9, 2026, when the vulnerability was added to its KEV catalog.</p><p>Ivanti has not published specific indicators of compromise tied to active exploitation of this vulnerability, however Beazley Security recommends organizations monitor for the following indicators:</p><ul><li><p>Unusual or unexpected access attempts against Ivanti EPM services</p></li><li><p>Unexpected or anomalous administrative actions within the EPM console, such as unauthorized user creations</p></li><li><p>Unexpected or suspicious outbound connections originating from the EPM server</p></li></ul><p>We believe that outside of WAF logs that could identify this specific parameter being passed to an EPM instance, little can be discerned to identify compromises of publicly accessible Ivanti EPM systems running vulnerable software versions.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p>WatchTowr disclosed that CVE-2026-1906’s authentication bypass is an undocumented <code>logintype</code> parameter with a value of <code>64</code> provided as a <code>POST</code> request to the <code>/RemoteControlAuth/api/Auth</code> endpoint in Ivanti EPM bypasses regular authenticated attempts.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management Platform to identify impacted devices and support organizations in remediation of any issues found.</p><p>We are also conducting threat hunts across our MDR environment to detect potential exploitation attempts against our clients.</p><p>If you believe your organization may have been impacted by this attack campaign and need support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US">https://hub.ivanti.com/s/article/Security-Advisory-EPM-February-2026-for-EPM-2024?language=en_US</a></p></li><li><p><a href="https://www.cve.org/CVERecord?id=CVE-2026-1603">https://www.cve.org/CVERecord?id=CVE-2026-1603</a></p></li><li><p><a href="https://x.com/watchtowrcyber/status/2022305033086235108">https://x.com/watchtowrcyber/status/2022305033086235108</a></p></li><li><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p></li></ul></div>]]></content><summary type="html">Known Abuse of Ivanti's Endpoint Manager (EPM) Authentication Bypass (CVE-2026-1603) was reported by CISA's Known Exploited Vulnerabilities Catalog (KEV).</summary></entry><entry><title>Critical Vulnerabilities in Cisco SD-Wan Systems Under Active Exploitation (CVE-2026-20127, CVE-2026-20128, CVE-2026-20122)</title><link href="https://labs.beazley.security/advisories/BSL-A1157" rel="alternate"/><updated>2026-02-25T23:00:00.000Z</updated><published>2026-02-25T23:00:00.000Z</published><id>https://labs.beazley.security/advisories/BSL-A1157</id><content type="html"><![CDATA[<div class="rtf"><h3 class="rtf-title">Executive Summary</h3><p><b>03/09/2026 Update</b>: Cisco has issued an update to their initial post identifying several more CVEs that affect Cisco Catalyst SD-WAN and Manager systems (CVE-2026-20122, CVE-2026-20126, CVE-2026-20128, CVE-2026-20129, CVE-2026-20133). The CVEs range from medium to critical severity, and Cisco has confirmed that there are no workarounds other than updating any affected products.  Please review the Patching guidance below for actionable information.</p><p>
On February 25<sup>th</sup>, Cisco disclosed a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager systems. The flaw allows an unauthenticated attacker with network access to the SD-WAN peering service to bypass authentication and establish unauthorized control-plane connections.</p><p>Successful exploitation enables an attacker to provision a rogue peer into the SD-WAN fabric and may allow the attacker to obtain elevated access to the affected controller. Cisco Talos has <b>confirmed active exploitation</b> of this vulnerability by a sophisticated threat actor, with evidence of malicious activity dating back to 2023. The vulnerability, now tracked as CVE-2026-20127, was confirmed as a zero-day following investigations in late 2025.</p><p>Given confirmed active exploitation and public disclosure, Beazley Security believes that additional threat actors will begin to weaponize this flaw. Organizations operating Cisco Catalyst SD-WAN systems, especially those with externally accessible peering services, should review systems for signs of compromise and patch immediately.</p></div><div class="rtf"><h3 class="rtf-title">Affected Systems or Products</h3><p><b>03</b><b>/</b><b>09</b><b>/</b><b>2026 Update</b>: The table has been updated with asterisks identifying changes from the original publication based on additional CVE releases.</p><table><tbody><tr><th><p>Product</p></th><th><p>Affected Versions</p></th><th><p>Fixed Versions</p></th></tr><tr><td><p>Cisco Catalyst SD-WAN
Release</p></td><td><p>20.9</p></td><td><p>20.9.8.2</p></td></tr><tr><td><p>* Cisco Catalyst SD-WAN
Release</p></td><td><p>20.11</p></td><td><p>20.12.6.1</p></td></tr><tr><td><p>* Cisco Catalyst SD-WAN
Release</p></td><td><p>20.12</p></td><td><p>20.12.5.3
20.12.6.1</p></td></tr><tr><td><p>*Cisco Catalyst SD-WAN
Release</p></td><td><p>20.13</p></td><td><p>20.15.4.2</p></td></tr><tr><td><p>*Cisco Catalyst SD-WAN
Release</p></td><td><p>20.14</p></td><td><p>20.15.4.2</p></td></tr><tr><td><p>Cisco Catalyst SD-WAN
Release</p></td><td><p>20.15</p></td><td><p>20.15.4.2</p></td></tr><tr><td><p>*Cisco Catalyst SD-WAN
Release</p></td><td><p>20.16</p></td><td><p>20.18.2.1</p></td></tr><tr><td><p>Cisco Catalyst SD-WAN
Release</p></td><td><p>20.18</p></td><td><p>20.18.2.1</p></td></tr></tbody></table><p>
According to <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk">Cisco’s official advisory</a>, organizations running versions earlier than 20.9, or
versions 20.11, 20.13, 20.14, and 20.16 (which have reached End of Software Maintenance)
should migrate to a supported fixed release immediately.</p></div><div class="rtf"><h3 class="rtf-title">Mitigations / Workarounds</h3><p>Cisco has released software updates addressing CVE-2026-20127 and applying the vendor
provided patches to affected Cisco SD-WAN controller and manager systems is the
recommended course of action to reduce risk.</p><p>
Beyond patching, organizations should consider reviewing Cisco’s SD-WAN <a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide">hardening guide</a>
including steps to:</p><ul><li><p>Inventory and audit expected peer networks within SD-WAN infrastructure.</p></li><li><p>Reduce internet exposure by locking SD-WAN controller peering services down to known and authorized peer networks.</p></li><li><p>Restrict access to SD-WAN controller and management planes to a dedicated administrative network.</p></li></ul><p>Affected organizations that are unable to immediately patch should ensure strict network
access controls are in place around SD-WAN controllers, related peering services, and check
audit logs any signs of compromise.</p></div><div class="rtf"><h3 class="rtf-title">Patches</h3><p><b>03/09/2026 Update</b>: Cisco has provided an <a href="https://www.cisco.com/c/dam/en/us/td/docs/Website/enterprise/catalyst-sdwan-upgrade-matrix/index.html">upgrade path tool</a> for upgrading Cisco Catalyst SD-WAN Instances. The initial links below to the <a href="https://software.cisco.com/download/home">software download center</a> are accurate and provide updated patches.</p><p>At the time of writing, Cisco has released fixes for all supported versions of their Catalyst SD-
Wan solution except for 20.9 which is estimated to be released February 27, 2026. Please see
the Affected System and Products section above in this report for additional information.</p><p>
Cisco’s original advisory provides this <a href="https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes">guidance document</a> for obtaining software fixes and the
vendor also hosts a <a href="https://software.cisco.com/download/home">software download center</a> requiring login.</p><p>
Alternatively, customers can contact Cisco’s Technical Assistance Center (TAC) to request
additional software upgrade support.</p></div><div class="rtf"><h3 class="rtf-title">Indicators of Compromise (IoCs)</h3><p>A detailed Cisco SD-WAN threat hunting guide has been compiled by multiple agencies
which includes post-exploitation activity and can be found <a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">here</a>.</p><p>
Cisco Talos has also provided <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">validation checks</a> that can be performed within SD-Wan
logging:</p><ul><li><p>Peer type mismatches for your environment, especially vManage peering types if not
expected as exampled in the log below:</p></li></ul><p><code>Feb 20 22:03:33 vSmart-01 VDAEMON_0[2571]: %Viptela-vSmart-VDAEMON_0-5-
NTCE-1000001: control-connection-state-change new-state:up peer-type:vmanage peer-
system-ip:1.1.1.10 public-ip:&lt;unexpected IP> public-port:12345 domain-id:1 site-id:1005</code></p><ul><li><p>Peering connections from unexpected or unrecognized IP addresses</p></li><li><p>Peering connections established outside of expected windows your environment</p></li><li><p>Logs showing indicators of CVE-20222-20775 exploitation - username path traversal
strings (E.g. <code>/../../</code> or <code>/\n&amp;../\n&amp;../</code>).</p></li><li><p>Unexpected reboots, and upgraded versions reverting to previous software versions</p></li><li><p>Evidence of log and history clearing</p></li></ul><p>On March 1st, Cisco published additional <a href="https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/225525-internal-remediate-catalyst-sd-wan.html">remediation and collection guidance</a> to help identify affected and potentially compromised devices.</p></div><div class="rtf"><h3 class="rtf-title">Technical Details</h3><p><b>03/09/2026 Update</b>: The newly disclosed CVEs are listed below with their associated CVE scores and details:</p><ul><li><p>CVE-2026-20122 - (7.1):
An API vulnerability in Cisco Catalyst SD-WAN Manager allows for authenticated remote attackers with read-only credentials to overwrite arbitrary files on the host system.</p></li><li><p>CVE-2026-20126: - (7.8):
An REST API authentication vulnerability in Cisco Catalyst SD-WAN Manager allows for unauthenticated local attackers to gain root privileges on the host system.</p></li><li><p>CVE-2026-20128 - (5.5):
The Cisco SD-WAN Manager's Data Collection Agent (DCA) has a vulnerability that allows an unauthenticated local attacker to access user privileges on SD-WAN Manager instances so long as the user has <code>vmanage</code> credentials on the system.</p></li><li><p>CVE-2026-20129 - (9.8):
An API authentication vulnerability in Cisco SD-WAN Manager allows an unauthenticated remote attacker to gain access to the n<code>etadmin</code> role.</p></li><li><p>CVE-2026-20133 - (7.5):
The Cisco Catalyst SD-WAN Manager allows an unauthenticated remote attacker to read &quot;sensitive information&quot; on the host system due to insufficient file system access restrictions.</p></li></ul><hr/><p>
CVE-2026-20127 is reported as a critical vulnerability within the peering authentication flow of
Cisco Catalyst SD-WAN components, affecting the control connection peering mechanism that
establishes trust relationships between SD-WAN components.</p><p>
The flaw allows an unauthenticated attacker to establish rogue peer connections originating
from attacker-controlled infrastructure. If successfully exploited, the rogue peer is given an IP
address within the SD-WANs network, allowing a threat actor access to the SD-WAN
management and control plane. With adequate privileges to the SD-WAN controller, an
attacker can further leverage NETCONF to manipulate and alter configurations within the SD-
WAN network.</p><p>
Cisco Talos has <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">reported</a> that CVE-2026-20127 was observed to be abused in combination
with <a href="https://nvd.nist.gov/vuln/detail/cve-2022-20775">CVE-2022-20775</a>, an older local privilege escalation vulnerability affecting Cisco SD-Wan
software. The threat actor, tracked as UAT-8616 reportedly performed a software downgrade
to a vulnerable version of software, exploited CVE-2022-20775 via the CLI to obtain root
access, and then restored back to original versioning to persist root access.</p><p>
In response to active exploitation, the U.S. Cyber Security and Infrastructure Security Agency
(CISA) has issued <a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems">emergency directive 26-03</a> requiring impacted agencies to apply Cisco
provided updates by February 27th, 2026.</p><p>
Beazley Security recommends that affected organizations check for signs of compromise, and
upgrade to fixed versions of SD-WAN Controller or SD-WAN Manager software immediately.</p><p>
This Cisco SD-WAN <a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide">hardening guide</a> can also be referenced for configuring SD-WAN fabric
and implementations to best practices.</p></div><div class="rtf"><h3 class="rtf-title">Our Organizational Response</h3><p>Beazley Security is monitoring client perimeter devices through our Exposure Management
Platform to identify impacted devices and support organizations in remediation of any issues
found.</p><p>
We are also conducting threat hunts across our MDR environment to detect potential
exploitation attempts against our clients.
If you believe your organization may have been impacted by this attack campaign and need
support, please contact our Incident Response team.</p></div><div class="rtf"><h3 class="rtf-title">Sources</h3><ul><li><p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk"><u>https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk</u></a> </p></li><li><p><a href="https://software.cisco.com/download/home"><u>https://software.cisco.com/download/home</u></a> </p></li><li><p><a href="https://nvd.nist.gov/vuln/detail/cve-2022-20775"><u>https://nvd.nist.gov/vuln/detail/cve-2022-20775</u></a> </p></li><li><p><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf"><u>https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf</u></a> </p></li><li><p><a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide"><u>https://sec.cloudapps.cisco.com/security/center/resources/Cisco-Catalyst-SD-WAN-HardeningGuide</u></a> </p></li><li><p><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf"><u>https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf</u></a> </p></li><li><p><a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems"><u>https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems</u></a> </p></li><li><p><a href="https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/225525-internal-remediate-catalyst-sd-wan.html">https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/225525-internal-remediate-catalyst-sd-wan.html</a></p></li><li><p><a href="https://www.cisco.com/c/dam/en/us/td/docs/Website/enterprise/catalyst-sdwan-upgrade-matrix/index.html">https://www.cisco.com/c/dam/en/us/td/docs/Website/enterprise/catalyst-sdwan-upgrade-matrix/index.html</a></p></li></ul></div>]]></content><summary type="html">Updated 03/09/2026 to include additional CVEs disclosed by Cisco affecting the same product line.

On February 25th, Cisco disclosed a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager systems. The flaw allows an unauthenticated attacker with network access to the SD-WAN peering service to bypass authentication and establish unauthorized control-plane connections. This vulnerability has been exploited in the wild according to Cisco by a sophisticated threat actor with evidence of exploitation reaching back to 2023.</summary></entry>
</feed>
