24h | 7d | 30d

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
17 Apr 2026
Updated

CVSS
Pending
EPSS
46.64%

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 15 Posts
  • 5 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture fallback

An Anthropic researcher used Claude to find Apache ActiveMQ flaw CVE-2026-34197. Maintainers shipped the fix in seven days. CISA added the CVE to its federal exploited-vulnerability list. The same week, Cal.com closed source citing AI scanners as the reason. I have run defender-side tooling rollouts for 20 years. Every wave gets framed as attacker-only for six months first. One team shipped the patch. The other shipped the excuse.

#InfoSec #OpenSource #AI #CyberSecurity

  • 2
  • 3
  • 0
  • 12h ago
Profile picture fallback

⚠️ CRITICAL: CVE-2026-34197 is a remote code execution vuln in Apache ActiveMQ. No patch or confirmed exploitation yet. Monitor vendor advisories & apply security best practices. Details: radar.offseq.com/threat/recent

  • 0
  • 0
  • 1
  • 14h ago
Profile picture fallback

New KEV added 🚨
CVE-2026-34197 (Apache ActiveMQ)
• Active exploitation confirmed
• High-risk entry point
KEV = patch now, not later

Source: cisa.gov/news-events/alerts/20

💬 How fast is your patch cycle?
Follow @technadu

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
📢 CVE-2026-34197 : RCE critique dans Apache ActiveMQ Classic via l'API Jolokia 📝 ## 🔍 Contexte Publié le 7 avril 2026 par Horizon3.ai, cet article prése… https://cyberveille.ch/posts/2026-04-16-cve-2026-34197-rce-critique-dans-apache-activemq-classic-via-l-api-jolokia/ #Apache_ActiveMQ #Cyberveille
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Apr 16) CVE-2026-34197 Apache ActiveMQ 入力検証の不備 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
~Cisa~ CISA added actively exploited CVE-2026-34197 (Apache ActiveMQ) to its KEV catalog. - IOCs: CVE-2026-34197 - #Apache #CVE202634197 #ThreatIntel
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
CVE-2026-34197 Apache ActiveMQ Improper Input Validation Vulnerability
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
A high-severity security flaw in Apache ActiveMQ Classic, CVE-2026-34197, is actively exploited, requiring urgent fixes by April 30, 2026.
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation reconbee.com/apache-activ... #ActiveMQ #Apache #CISA #KEV #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
A vulnerability in Apache ActiveMQ Classic, CVE-2026-34197, is being actively exploited, requiring immediate patching by organizations.
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
New KEV entry: CVE-2026-34197 Apache ActiveMQ Actively exploited If it’s KEV → patch ASAP 💬 Are KEVs top priority for you? Follow TechNadu #CyberSecurity #KEV #InfoSec
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Microsoft
  • Microsoft Defender Antimalware Platform

14 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.04%

KEV

Description

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

Statistics

  • 8 Posts
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

⚡ Researchers confirm exploitation of three Microsoft Defender flaws—one patched (CVE-2026-33825) , two unpatched.

Attackers escalate privileges and can block Defender updates.

🔗 Learn how these flaws are used in attacks → thehackernews.com/2026/04/thre

  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback

Explotación activa de vulnerabilidades en Windows permite escalar privilegios y afectar a Defender

Se ha detectado explotación activa de tres técnicas filtradas —BlueHammer, RedSun y UnDefend— que permiten elevar privilegios hasta SYSTEM/admin y, en algunos casos, impedir que Microsoft Defender actualice sus definiciones. BlueHammer ya tiene identificador (CVE-2026-33825)...

unaaldia.hispasec.com/2026/04/

  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback

This Week in Security: Docker Auth, Windows Tools, and a Very Full Patch Tuesday

CVE-2026-34040 lets attackers bypass some Docker authentication plugins by allowing an empty request body. Present since 2024, this bug was caused by a previous fix to the auth workflow. In the 2024 bug, the authentication system could be tricked into passing a zero-length request to the authentication handler. In the modern vulnerability, the system can be tricked into removing a too-large authentication request and passing a zero-length request to the authentication handler.

In both cases, the authentication system may not properly handle the malformed request and allow creation of docker images with access to stored credentials and secrets.

Bugs like these are increasing in visibility because AI agents running in Docker, like OpenClaw, may be tricked via prompt injection into leveraging the vulnerability.

Windows CPU Tools Compromised


videocardz.com notes that the popular Windows monitoring software Cpu-Z and HWMonitor appear to have been compromised. Reports indicate that the download site was compromised, not the actual packages, but that it was redirecting update requests to packages including malware. While the site has been repaired, unfortunately it looks like there is no warning to users that the downloads were compromised for a period of time.

Anecdotally, there has been a rash of Discord account takeovers in the past week, where long-standing accounts in multiple servers have been compromised and turned into spambots. While there is no evidence these events are linked, clearly a new credential or authentication stealing malware is in play, which involves stealing credentials from Discord.

X.Org and XWayland Updated


The X.Org and XWayland servers saw security updates this week, fixing a handful of vulnerabilities involving uninitialized memory use, use-after-free, and reading beyond the end of a buffer.

The vulnerabilities are generally classified as “moderate”, but of course, don’t leave known vulnerabilities when you can avoid it! Fixed releases should find their way into distributions soon.

OpenSSL 4.0 Released


OpenSSL released version 4.0 this week, adding support for Encrypted Client Hello / ECH / RFC9849 as well as deprecating some older SSL 2.0 behavior.

Encrypted Client Hello is a new enhancement to TLS (nee SSL) client handshake. When a client connects to a TLS server like a website, one of the first packets sent is the Client Hello which contains the TLS version, supported algorithms, and importantly, the server name the client is connecting to. Including the server name in the hello message allows modern multi-homed and cloud-based websites to function, because it indicates which web server and SSL certificate should be used to handle the request, but exposes the hostname the user is connecting to.

With ECH, the hello message is split into multiple messages, with the true hostname encrypted inside the second, inner message. The outer message allows routing the request to a server responsible for decrypting the inner communication and dispatching the request to the proper server. It is possible, for instance, for an ISP to see that a user has connected to a website on the Cloudflare infrastructure, but not which website hosted on Cloudflare.

For individual sites, the value of ECH is debatable – without a central server to dispatch to the specific hosts, the outer hostname is still readable – but for sites hosted behind load balancers, there is additional protection for users against identification of browsing habits. Although it brings extra complexity, adding new standards like ECH at least moves the needle towards better user privacy and protection by default.

Rockstar games breached (again)


Rockstar Games (of Grand Theft Auto and Red Dead Redemption fame) has been breached by a ransomware/extortion group. If this sounds familiar, in 2022 the company was breached and early GTA 6 gameplay was stolen.

This go around, the breach was actually of the data warehousing company Snowflake, via another service, Anodot. Used for cloud monitoring and analytics, Bleeping Computer reports that an Anodot breach was used to access Snowflake data, which is now used to extort Rockstar.

Rockstar says the data stolen does not impact players or the functioning of the company, and they will not be paying the ransom.

Linux Kernel Certificate OOB


Linux Kernel 7.0 releases this week, and includes a fix to out-of-bounds memory access in certificate handling. The fix is also being back-ported to stable and LTS kernel versions (Linux 6.4, 6.6 LTS, 6.12 LTS, 6.18 LTS, and 6.19) so be on the lookout for updates!

The out-of-bounds bug lies in the kernel keyring API; any user on the system can submit an invalid certificate to the kernel keyring. In this specific case the impact seems limited to a kernel crash instead of arbitrary privilege escalation.

NIST no Longer Enriching CVE


The NIST organization is no longer enriching CVE entries in the National Vulnerability Database, except for those in the Known Exploited Vulnerabilities catalog, used in federal government, or those in designated critical software. Previously, the NIST NVD provided additional information and severity rankings for reported vulnerabilities. Citing a lack of funding and an overwhelming number of reported vulnerabilities, they will no longer provide updated severity scores or details.

It’s understandable, but a net loss to the security community, and the Internet at large, when we lose analysis and commentary on risks. CVE details and risks are often self-assigned by the vendor, which can lead in some cases to a culture of “malicious compliance” where the released information is technically correct and complete, but contains little or no actual detail and assumes the least impactful interpretations. Third-party evaluation and classification by organizations like NIST offered additional context and analysis to identify the truly critical reports.

Patch Tuesday, Everybody Panic!


OK – don’t actually panic, but if you’re a Microsoft user, you already know. This month’s Patch Tuesday — the scheduled day for Microsoft updates, for anyone lucky enough not to have to observe — includes over 160 security updates. This makes it the second largest Patch Tuesday ever. It includes a fix to the publicly available Bluehammer exploit for bypassing Windows Defender, and over 60 patches for browser vulnerabilities.

Additionally, Chrome published fixes for 20 vulnerabilities, and Adobe published fixes for Reader, with evidence on both that the bugs are already being publicly exploited.

This is your monthly reminder to stay on top of security updates whenever they are available, on whatever platform you use. Unknown zero-day exploits might get all the attention, but outdated software with known, patched bugs can be the biggest vector for exploits and malware. Once a bug is known and patched, there is no reason to save the exploit for targeted attacks; the days and weeks after a bug is publicly fixed can be a wave of automated exploits, and many of the largest attacks use vulnerabilities fixed weeks or months prior.

Botconf Talks Streaming


Finally, a quick aside for anyone interested in pursing more related content, the Botconf EU conference about fighting botnets and malware is streaming the conference content; by the time this post goes live the conference is likely to be concluded, but the talk streams are accessible!

hackaday.com/2026/04/17/this-w…

  • 0
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
📢 CVE-2026-33825 : Zero-day Windows Defender exploité par BlueHammer et RedSun pour élévation de privilèges 📝 ## 🗓️ Contexte Publ… https://cyberveille.ch/posts/2026-04-16-cve-2026-33825-zero-day-windows-defender-exploite-par-bluehammer-et-redsun-pour-elevation-de-privileges/ #BlueHammer #Cyberveille
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
"Two zero-days still waiting for a patch" CVE-2026-33825 is patched www.bleepingcomputer.com/news/securit... "On Thursday, Huntress Labs security researchers reported seeing all three zero-day exploits deployed in the wild, with the BlueHammer vulnerability being exploited since April 10." #cybersec
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Three Windows Zero-Days Unleashed: Nightmare-Eclipse’s BlueHammer, RedSun & UnDefend – Hackers Already Exploiting Defender’s Own Arsenal! + Video Introduction: Three in-the-wild Windows zero-day vulnerabilities—BlueHammer (CVE-2026-33825), RedSun, and UnDefend—have been discovered abusing…
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means.
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
BlueHammer, RedSun, and UnDefend: Weaponized Microsoft Defender Zero-Days Are Already in the Wild—Assume Compromise Now + Video Introduction: Three actively exploited zero-day vulnerabilities in Microsoft Defender—BlueHammer (CVE-2026-33825, patched), RedSun (unpatched), and UnDefend…
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • 0xJacky
  • nginx-ui

30 Mar 2026
Published
16 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
4.97%

KEV

Description

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware treats as "allow all". This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover. At time of publication, there are no publicly available patches.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 17 hours ago

Fediverse

Profile picture fallback

nginx-ui CVE-2026-33032: the /mcp endpoint had auth, /mcp_message didn't. One missing check = full server takeover. As tools rush to add MCP support, expect more of these gaps. - thehackernews.com/2026/04/crit

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
CVE-2026-33032 exposes nginx-ui to unauthenticated takeover via MCP endpoint, impacting 2,600+ instances with active exploitation.
  • 0
  • 1
  • 0
  • 19h ago
Profile picture fallback
📢 CVE-2026-33032 : Authentification manquante dans Nginx UI exploitée in the wild 📝 ## 🔍 Contexte Rapid7 a publié le 16 avril 2026 une alerte de sécur… https://cyberveille.ch/posts/2026-04-16-cve-2026-33032-authentification-manquante-dans-nginx-ui-exploitee-in-the-wild/ #CVE_2026_33032 #Cyberveille
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Update now: Active exploitation of Nginx UI vulnerability CVE-2026-33032 underway - Cyber Daily https://www.cyberdaily.au/security/13477-update-now-active-exploitation-of-nginx-ui-vulnerability-cve-2026-33032-underway
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
CVE-2026-33032: severe nginx-ui bug grants unauthenticated server access https://securityaffairs.com/190841/hacking/cve-2026-33032-severe-nginx-ui-bug-grants-unauthenticated-server-access.html
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Critical Unauthenticated RCE and Server Takeover (CVE-2026-33032, CVE-2026-27825) #appsec
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • marimo-team
  • marimo

09 Apr 2026
Published
09 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
3.20%

KEV

Description

marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification. This vulnerability is fixed in 0.23.0.

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

CVE-2026-39987: Marimo RCE Zero-Day Exploited Within 10 Hours of Disclosure — 662 Attacks Recorded
#CyberSecurity
securebulletin.com/cve-2026-39

  • 4
  • 0
  • 0
  • 16h ago
Profile picture fallback

Marimo is a Python notebook used in AI toolchains. It was exploited 9 hours 41 minutes after CVE-2026-39987 disclosure. Sysdig published the telemetry. Full remote takeover, no login required. The patch shipped with the advisory. Most shops do not have weekend on-call for a Python notebook. By Sunday morning the command-and-control traffic was already 14 hours deep. Patch window is shorter than one night of sleep. On-call SLA is the new budget line.

#CyberSecurity #DevOps #Python #InfoSec

  • 1
  • 1
  • 0
  • 14h ago

Overview

  • Pending

07 Jun 2023
Published
20 Dec 2025
Updated

CVSS
Pending
EPSS
91.13%

Description

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🚨 Cyber Dreigingsradar 17 april 2026

Dreigingsniveau VERHOOGD (72/100)
• 35 nieuwe incidenten in NL/BE (24u)
• CVE-2025-43300 (CVSS 10.0) actief misbruikt
• CVE-2023-33538 aanvallen op TP-Link routers

Vandaag in het nieuws:
• EU leeftijdsverificatie app binnen 2 min gehackt
• Gelekte Windows zero days actief misbruikt
• Kritieke RCE in Cisco ISE

Actie: patch netwerkapparatuur + test backup-herstel.

Bekijk de volledige Dreigingsradar:
digiweerbaar.nl/cyber-dreiging

#dreigingsradar #cybersecurity

  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
~Paloalto~ Active Mirai-like botnets are exploiting CVE-2023-33538 in EOL TP-Link routers via command injection. - IOCs: 51. 38. 137. 113, cnc. vietdediserver. shop, bot. ddosvps. cc - #CVE202333538 #IoT #Mirai #ThreatIntel
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
🚨 Cyber Dreigingsradar 17 april 2026 Dreigingsniveau VERHOOGD (72/100) • 35 nieuwe incidenten in NL/BE (24u) • CVE-2025-43300 (CVSS 10.0) actief misbruikt • CVE-2023-33538 aanvallen op TP-Link routers Bekijk de volledige Dreigingsradar: www.digiweerbaar.nl/cyber-dreigi...
  • 1
  • 1
  • 0
  • 15h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
0.06%

KEV

Description

Exposure of sensitive information to an unauthorized actor in Windows Snipping Tool allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Bluesky

Profile picture fallback
CVE-2026-33829: Snipping Tool NTLM Leak
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
HACKER’S DELIGHT: WINDOWS SNIPPING TOOL FLAW LEAKS YOUR PASSWORD HASH—HERE’S HOW TO STOP IT Introduction: A newly uncovered vulnerability in the Windows Snipping Tool (CVE-2026-33829) allows an attacker to capture a user’s NTLMv2 hash over a network through a simple spoofing attack. The flaw…
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Fortinet
  • FortiSandbox

14 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.29%

KEV

Description

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Statistics

  • 2 Posts

Last activity: 11 hours ago

Bluesky

Profile picture fallback
CVE-2026-39808 PoC Exploit Released: Unauthenticated Root RCE in FortiSandbox Threatens Enterprise Security Fabric + Video Introduction: A critical OS command injection vulnerability, tracked as CVE-2026-39808 (CVSS 9.8), has been publicly disclosed in Fortinet FortiSandbox versions 4.4.0 through…
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
FortinetがFortiSandboxの重大な脆弱性(CVE-2026-39813、CVE-2026-39808)を修正 Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808) #HelpNetSecurity (Apr 16) www.helpnetsecurity.com/2026/04/16/f...
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Microsoft
  • PowerShell 7.4

14 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.11%

KEV

Description

Improper input validation in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

I just published a post on the new PowerShell CVE (CVE-2026-26143) with tips and guidance to ensure you are protected.

I breakdown, who’s affected, how to check, and what to do next.

dowst.dev/powershell-vulnerabi

#PowerShell #CyberSecurity #DevOps #Automation

  • 3
  • 1
  • 0
  • 7h ago

Overview

  • Apple
  • iOS and iPadOS

21 Aug 2025
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
2.41%

Description

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🚨 Cyber Dreigingsradar 17 april 2026

Dreigingsniveau VERHOOGD (72/100)
• 35 nieuwe incidenten in NL/BE (24u)
• CVE-2025-43300 (CVSS 10.0) actief misbruikt
• CVE-2023-33538 aanvallen op TP-Link routers

Vandaag in het nieuws:
• EU leeftijdsverificatie app binnen 2 min gehackt
• Gelekte Windows zero days actief misbruikt
• Kritieke RCE in Cisco ISE

Actie: patch netwerkapparatuur + test backup-herstel.

Bekijk de volledige Dreigingsradar:
digiweerbaar.nl/cyber-dreiging

#dreigingsradar #cybersecurity

  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
🚨 Cyber Dreigingsradar 17 april 2026 Dreigingsniveau VERHOOGD (72/100) • 35 nieuwe incidenten in NL/BE (24u) • CVE-2025-43300 (CVSS 10.0) actief misbruikt • CVE-2023-33538 aanvallen op TP-Link routers Bekijk de volledige Dreigingsradar: www.digiweerbaar.nl/cyber-dreigi...
  • 1
  • 1
  • 0
  • 15h ago

Overview

  • wolfSSL
  • wolfSSL

09 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.03%

KEV

Description

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 7 hours ago

Bluesky

Profile picture fallback
🧵CVE-2026-5194: vulnerabilitat crítica a wolfSSL, la biblioteca TLS present en 5.000 milions de dispositius, principalment IoT, electrònica de xarxa, automoció, PLCs industrials i equipament mèdic. La vulnerabilitat permet als atacants fer acceptar certificats falsificats com a
  • 0
  • 2
  • 0
  • 7h ago
Showing 1 to 10 of 43 CVEs