Overview
Description
Statistics
- 17 Posts
- 48 Interactions
Fediverse
Pretty much as expected, Ubuntu running snapd as root was always going to turn out well :-|
https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888/78627
My friends, time to bring your Ubuntu system up to date:
sudo apt update && sudo apt upgrade && systemctl reboot
Quite the Ubuntu 24.04 vulnerability, via snap packages. Surprise surprise.
https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt
A serious Ubuntu vulnerability (CVE-2026-3888) allows local users to gain full root access. If you run Ubuntu 24.04 or later, you should update your system right now.
More details here: https://ostechnix.com/ubuntu-snapd-privilege-escalation-cve-2026-3888-fix/
Alerte pour les bubuntuistes:
https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html
CVE-2026-3888 en #Ubuntu: escalada a root aprovechando snap-confine y la limpieza de systemd-tmpfiles
Bluesky
Overview
Description
Statistics
- 13 Posts
Fediverse
The Interlock ransomware group is actively exploiting a Cisco Firewall 0-day vulnerability (CVE-2026-20131) to deploy their ransomware, a flaw that allows unauthenticated remote attackers to execute arbitrary Java code. This exploitation began before the vulnerability's public disclosure, enabling the group to compromise organizations unaware of the threat.
https://cybersecuritynews.com/cisco-firewall-0-day-ransomware/
Interlock ransomware exploited Cisco firewall zero-day (CVE-2026-20131) before disclosure.
• Unauth RCE → root
• Memory webshells
• WebSocket C2
https://www.technadu.com/interlock-ransomware-campaign-exploited-cisco-firewall-vulnerability-cve-2026-20131-weeks-before-disclosure/623700/
Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure https://securityaffairs.com/189636/malware/interlock-group-exploiting-the-cisco-fmc-flaw-cve-2026-20131-36-days-before-disclosure.html
Zero-Day-Lücke in Cisco-Firewall: Interlock-Ransomware nutzte Schwachstelle 36 Tage vor Bekanntgabe aus
Cisco-Schwachstelle CVE-2026-20131 – was steckt dahinter?
Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.
Bluesky
Overview
Description
Statistics
- 1 Post
- 141 Interactions
Fediverse
Rooting OpenWRT from the parking lot: I discovered an XSS in the OpenWRT SSID scan page, that can be chained to remote root access 👾
Write-up and demo: https://mxsasha.eu/posts/openwrt-ssid-xss-to-root/
CVE-2026-32721, fixed in 24.10.6 / 25.12.1
Overview
Description
Statistics
- 6 Posts
- 1 Interaction
Fediverse
⚠️ CRITICAL: CISA reports active exploits of CVE-2026-20963 in Microsoft SharePoint. Remote code execution allows full server compromise. Patch now, monitor logs, segment networks! https://radar.offseq.com/threat/cisa-warns-of-attacks-exploiting-recent-sharepoint-171abc90 #OffSeq #SharePoint #Vuln #RCE
Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.
Bluesky
Overview
- GNU
- inetutils
Description
Statistics
- 7 Posts
- 2 Interactions
Fediverse
RT @TheHackersNews
⚠️ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials.
One connection to port 23 is enough to trigger memory corruption and execute code as root.
No patch yet. Prior telnet flaw is already exploited in the wild.
🔗Read → https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html
Bluesky
Overview
Description
Statistics
- 5 Posts
- 1 Interaction
Fediverse
Bluesky
Overview
- Ubiquiti Inc
- UniFi Network Application
Description
Statistics
- 6 Posts
- 3 Interactions
Fediverse
#infosec #cybersecurity #bugbounty
CVE-2026-22557
UniFi Network Application Path Traversal Account "Access Vulnerability"
A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.
Overview
Description
Statistics
- 4 Posts
- 3 Interactions
Bluesky
Overview
- kanboard
- kanboard
Description
Statistics
- 4 Posts
Fediverse
https://0dave.ch/posts/cve-2026-33058/
Overview
Description
Statistics
- 2 Posts
- 11 Interactions
Fediverse
Earlier today the JRuby team was informed of a low-severity vulnerability in the bcrypt-ruby gem. We worked with the library's maintainers to arrange a fix and disclosure. The issue is now fixed in versions 3.1.22 and higher. Exposure risk is low, but upgrading is recommended.
CVE-2026-33306: Integer Overflow Causes Zero Key-Strengthening Iterations at Cost=31 on JRuby
https://github.com/bcrypt-ruby/bcrypt-ruby/security/advisories/GHSA-f27w-vcwj-c954