<?xml version="1.0"?>







<feed xmlns="http://www.w3.org/2005/Atom">
    <id>https://www.runzero.com/blog/</id>
    <title>runZero Blog</title>
    <updated>2026-04-15T15:24:00-04:00</updated>
    <link rel="self" type="application/atom+xml" href="https://www.runzero.com/blog/index.xml" />
    <link rel="alternate" type="text/html" href="https://www.runzero.com/" />
    
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/fortinet-fortisandbox/</id>
            <title>Fortinet FortiSandbox vulnerabilities: Find impacted assets</title>
            <published>2026-04-15T15:24:00-04:00</published>
            <updated>2026-04-15T15:24:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/fortinet-fortisandbox/" />
            <summary type="html">Fortinet disclosed in two advisories that multiple vulnerabilities have been identified in versions of FortiSandbox.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Fortinet FortiSandbox&nbsp;vulnerabilities: CVE-2026-39808, and CVE-2026-39813</h2>
<p>Fortinet <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-100" target="_blank">disclosed</a>&nbsp;in <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-112" target="_blank">two</a>&nbsp;advisories that multiple vulnerabilities&nbsp;have been identified in versions of&nbsp;FortiSandbox.<br></p><ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-39808" target="_blank">CVE-2026-39808</a>: An OS command injection vulnerability exists within an API endpoint due to the improper neutralization of special elements. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted HTTP requests, potentially allowing for the execution of unauthorized code or commands.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20093" target="_blank"></a><a href="https://www.cve.org/CVERecord?id=CVE-2026-39808" target="_blank">CVE-2026-39808</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.1</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-39813" target="_blank">CVE-2026-39813</a>: An API privilege escalation vulnerability exists due to a path traversal flaw. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted HTTP requests to the JRPC API. Successful exploitation may allow an attacker to bypass authentication and escalate privileges on the system.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20093" target="_blank"></a><a href="https://www.cve.org/CVERecord?id=CVE-2026-39813" target="_blank">CVE-2026-39813</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.1</strong>.</li></ul>
<p><strong>The following versions are affected:</strong></p>
<ul><li>FortiSandbox 4.4: Versions 4.4.0 through 4.4.8 (affected by both CVEs)</li><li>FortiSandbox 5.0: Versions 5.0.0 through 5.0.5 (affected by CVE-2026-39813 only)</li></ul>
<ul></ul>
<h2>What is Fortinet FortiSandbox?</h2>
<p>Fortinet FortiSandbox is a security appliance that identifies unknown threats by executing suspicious files in isolated virtual environments to monitor their behavior and then automates a response by sharing that intelligence across the network to block the detected threat.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an attacker to gain unauthorized API access, enabling them to escalate privileges and execute code or commands on the vulnerable host.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged upgrade affected systems to the following versions:</p>
<ul><li>FortiSandbox 4.4: Upgrade to 4.4.9 or later</li><li>FortiSandbox 5.0: Upgrade to 5.0.6 or later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a><a href="https://console.runzero.com/inventory/services" target="_blank"></a>, use the following query to locate potentially impacted assets:</p>
<pre><code>os:="Fortinet FortiSandbox%"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/ot-connectivity-principles-part-3/</id>
            <title>Securing OT connectivity: The final four</title>
            <published>2026-04-13T08:30:00-04:00</published>
            <updated>2026-04-13T08:30:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/ot-connectivity-principles-part-3/" />
            <summary type="html">We walk through the final four Secure Connectivity Principles for Operational Technology (OT) that are pivotal for system owners to get right.</summary>
                            <author>
                    <name>Colin Dupreay</name>
                </author>
                        <content type="html">
                <![CDATA[<p>Welcome to our third and final blog post on the <a href="https://www.ncsc.gov.uk/files/ncsc-secure-connectivity-for-operational-technology.pdf" target="_blank">Secure Connectivity Principles for Operational Technology (OT)</a> guidance. If you haven’t already, make sure to get up to speed on parts <a href="https://www.runzero.com/blog/ot-connectivity-principles/">one</a> and <a href="https://www.runzero.com/blog/ot-connectivity-principles-part-2/">two</a>. In today's blog, we’re going to look at the remaining four principles from the guidance, what they mean for OT system owners, and how runZero can help.</p>
<p>The remaining principles (numbers five through eight) in <a href="https://www.ncsc.gov.uk/files/ncsc-secure-connectivity-for-operational-technology.pdf" target="_blank">the  guidance</a> detail how OT system owners can set themselves up for success against adversaries, including recommendations for preventing breaches and detecting them if they occur. The final four principles are pivotal for system owners to get right.</p>
<h2>Principle 5: Harden your OT boundary</h2>
<p>Many OT systems are difficult to update or replace, increasing the prevalence of obsolete assets and weak security controls. Because of this inability to modernize, oftentimes the primary defense against external threats to OT systems is their <strong>network boundary</strong>. As such, organizations should invest in modern, modular, and easily replaceable boundary protections. Additionally, the guidance suggests a <strong>robust checklist of actions </strong>to help harden your OT boundary: </p>
<ul><li><strong>Change default passwords</strong><ul><li><p>Default credentials provide an easy-to-fix and <a href="https://thehackernews.com/2025/07/manufacturing-security-why-default.html" target="_blank">easy-to-exploit</a> avenue for attackers to gain initial access. </p></li></ul></li><li><strong>Enforce the principle of least privilege</strong><ul><li><p>Human-to-machine and machine-to-machine connectivity should follow the concept of least privilege, following <a href="https://medium.com/@tsampatht1/identity-access-management-jml-process-navigating-the-joiner-mover-and-leaver-lifecycle-7e11aa811872" target="_blank">joiners, movers, leavers</a> (JML) processes to ensure proper access rights throughout user lifecycles.</p></li></ul></li><li><strong>Restrict unused services and ports</strong><ul><li><p>Only required ports and protocols should be exposed on assets.</p></li></ul></li><li><strong>Implement phishing-resistant multi-factor authentication (MFA) for external services</strong><ul><li><p><a href="https://www.ncsc.gov.uk/blog-post/not-all-types-mfa-created-equal" target="_blank">Phish-resistant MFA</a> should be implemented where possible for human-to-machine connectivity.</p></li></ul></li><li><strong>Use context-aware access</strong><ul><li><p>Where possible, controls should be enabled that enforce connectivity based on attributes of the connection, like device location, time of access, or OS version.  </p></li></ul></li><li><strong>Enforce security requirements on third parties</strong><ul><li><p>Controls should be applied to third-party connections into the OT environment. NCSC’s previous guidance provides more details about this in <a href="https://www.ncsc.gov.uk/collection/operational-technology/definitive-architecture-view/principle-5" target="_blank">principle five</a>.</p></li></ul></li><li><p><strong>Enforce unidirectional traffic flows</strong></p></li>
<ul><li><p>Where possible, organizations should use <a href="https://owlcyberdefense.com/learn-about-cross-domain-solutions/" target="_blank"><strong>Cross Domain Solutions</strong></a> and <a href="https://owlcyberdefense.com/wp-content/uploads/2026/03/OWL_PFD_UseCase_v3.pdf" target="_blank"><strong>Data Diodes </strong></a>to help facilitate secure data transfers between untrusted and trusted domains.</p></li></ul></ul>
<p>As the convergence between OT and IT progresses, implementing principle five is critical for OT system owners in order to define and harden the boundary between OT and IT in their environments.</p>
<h2>Principle 6: Limit the impact of compromise</h2>
<p>There is a saying that goes, “You should be prepared for WHEN you get breached, not IF.” Organizations should take steps to limit the impact of a breach before it happens. OT systems owners need to focus on <strong>two risks</strong>:</p>
<ul><li><strong>Contamination</strong><ul><li><p>Contamination refers to malicious or insecure code that makes its way into a trusted environment, often through the abuse of weak configurations, bad implementation, or vulnerable products. </p></li></ul></li><li><strong>Lateral movement</strong><ul><li><p><a href="https://www.ncsc.gov.uk/guidance/preventing-lateral-movement">Lateral movement</a> describes how attackers expand their reach to neighboring nodes after initial access. Lateral movement can involve scanning, compromising hosts with stolen credentials, escalating privileges to gain access to systems, and <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques">more</a>. <em>Lateral movement should be seen as a threat both from external attackers and from insider and third-party threats. </em></p></li></ul></li></ul>
<p>Strategies for OT (and all) system owners to protect their environments include: </p>
<ul><li><strong>Segmentation</strong><ul><li><p>Organizations should segment their networks behind firewalls or network architecture, dividing the network into smaller, functionally isolated networks, to reduce risk. </p></li><li><p>Microsegmentation: Microsegmentation applies controls on a much more granular level, usually at the host level, to restrict services, protocols, or specific clients from communicating. </p></li><li><p>Separation of duties: Separation of duties ensures that no one person has the ‘keys to the kingdom’. If you divide the responsibilities of individuals or systems within the environment, it limits exposure in the event of a breach or an insider threat.</p></li></ul></li><li><strong>The browse down principle</strong><ul><li><p>The browse down principle states that you should trust the device on which administrative work is done as much as, or more than, the system you are managing. In essence, you don't want to manage a trusted system with an untrusted device.</p></li></ul></li><li><strong>Boundary controls</strong><ul><li>Principle five discusses ways for organizations to harden their boundary, and principle six provides additional <a href="https://www.ncsc.gov.uk/collection/operational-technology/secure-connectivity/principle-6">recommendations</a>: <ul><li><p>Host-based Controls</p></li><li><p>Static network controls</p></li><li><p>Dynamic network controls </p></li><li><p>Threat detection and response.</p></li></ul></li></ul></li></ul>
<p>The best time for OT system owners to plan for a breach was yesterday, and the second-best time is today. OT system owners need to take proper precautions now to ensure that when, not if, a breach occurs, they are ready.</p>
<h2>Principle 7: Ensure all connectivity is logged and monitored</h2>
<p>While it's important to take all possible steps to prevent a breach, the last line of defense organizations have is their alerting and logging implementation. The ideal implementation of a good collection and alerting system is to empower system owners to expediently detect, contain, or prevent a breach, rather than simply collect logs. </p>
<p>There are at least four  considerations OT system owners should look to address when a log collection and analysis program is implemented:</p>
<ul><li><strong>Unauthorized activity</strong><ul><li><p>Any change in an OT (or IT) environment should come through strict change management procedures. Having a strong change management program, along with the ability to monitor for and alert on unauthorized changes, should be a major consideration.</p></li></ul></li><li><strong>Anomaly detection</strong><ul><li><p>There should be detection of traffic patterns that deviate from the norm, or baseline, of known-good network traffic. Anomaly-based detection should <strong>not </strong>replace actual controls designed to prevent undesired traffic.</p></li></ul></li><li><strong>Break-glass</strong><ul><li><p>Break-glass or use only in case of emergency access should be used only in emergency situations. Any use thereof should trigger an alarm of the highest criticality to the Security Operations Center (SOC). Break-glass account abuse is often how bad actors try to gain access to an environment through legitimate means. </p></li></ul></li><li><strong>Data flow monitoring</strong><ul><li><p>Continuously monitoring data both within and across network segments and the OT boundary enables early detection of compromise.</p></li></ul></li></ul>
<p>NCSC has <a href="https://www.ncsc.gov.uk/blog-post/what-exactly-should-we-be-logging">extensive guidance </a>on proper log implementation, but principle seven serves as a brief reminder that logging for the sake of logging is not enough. Logs should be actionable within an organization to detect a breach and, if possible, prevent it from spreading. </p>
<h2>Principle 8: Establish an isolation plan</h2>
<p>There may be times when it's necessary to isolate OT environments from external influences, for example, if there is a compromise in connected IT systems or an increased threat from adversaries. OT systems should be designed, where possible, to still provide critical functions while isolated. It's essential that an isolation plan is designed and tested to ensure that critical functions remain operational while preventing unforeseen or unintended consequences during isolation.</p>
<p>There are <strong>three primary isolation strategies</strong> that an organization could consider: </p>
<ul><li><strong>Site isolation</strong><ul><li><p>Site isolation works well in flat networks or networks without sophisticated security measures. Site isolation primarily involves removing or terminating external connections, either physically (e.g., cable disconnect) or via software (e.g., firewall configuration) </p></li></ul></li><li><strong>Application or service-specific isolation</strong><ul><li><p>If an organization has successfully implemented the secure connectivity controls outlined in the guidance, application isolation might be more effective than site isolation. Application isolation enables an organization to isolate affected services or assets using the controls outlined in the guidance, such as microsegmentation. </p></li></ul></li><li><strong>Site isolation with hardware-enforced trusted communications</strong><ul><li><p>This isolation plan allows organizations that have used either data diodes, a CDS, or other hardware-based traffic enforcement to isolate their network while keeping the hardware enforced data flows open. This allows isolating the trusted network from the untrusted network while still enabling secure data transfer.</p></li></ul></li></ul>
<p>Isolation plans, just like breach contingency plans, should be built and tested before they are needed. Ideally, isolation plans will never be needed, but with the evolving threat landscape, organizations should take action now to be prepared in the event isolation is needed.</p>
<h2>How runZero can help</h2>
<p>In our previous blog on this guidance, we mentioned <a href="https://www.runzero.com/blog/ot-connectivity-principles-part-2/">five ways</a> we help organizations protect and secure their OT systems. Those features of runZero also apply to principles five through eight, but there are more ways that runZero can help secure OT environments:</p>
<ol><li><strong>Default password checks</strong><ul><li><p>runZero can run <a href="https://help.runzero.com/docs/em-templates/">default password checks</a> to discover assets and software that have not changed their default settings. </p></li></ul></li><li><strong>Discover gaps in coverage</strong><ul><li><p>runZero can surface hidden assets, assets missing security controls, and assets that are <a href="https://www.runzero.com/blog/using-runzero-to-verify-network-segmentation/">bridging networks</a> they shouldn't.</p></li></ul></li><li><strong>Alerting on unauthorized changes</strong><ul><li><p>runZero provides a comprehensive asset inventory and can detect and alert when assets are added or removed from a network, or when asset changes occur.</p></li></ul></li><li><strong>Edge device detection</strong><ul><li><p>Many organizations think they know where their edge lies, but runZero can expose assets with network connections you didn’t know existed.</p></li></ul></li></ol>
<p>If you stuck with us through all three blog posts, thanks for being here! These weren’t short posts, but neither was the guidance. If you need help protecting your OT assets, runZero is here to help. Try us out for <a href="https://www.runzero.com/try/">free</a>, or <a href="https://www.runzero.com/contact-sales/">get in touch with us today</a>.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/runzero-day/</id>
            <title>Inside runZero Day: RSAC 2026 livestream</title>
            <published>2026-04-10T12:00:00-04:00</published>
            <updated>2026-04-10T12:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/runzero-day/" />
            <summary type="html">Go behind the scenes of our inaugural runZero Day livestream, hosted by runZero’s own Tod Beardsley and Rob King.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<p>At RSAC 2026, we wanted to do something new. Rather than just hanging around a booth and talking to people who could physically make it to San Francisco, we launched <a href="https://www.runzero.com/rsac-live-2026/">runZero Day</a>, a live, multi-hour broadcast that brought the best of the conference experience to the global security community. No travel needed! We brought together founders, journalists, and security leaders to unpack the trends shaping and defining cybersecurity in real time.</p>
<p>If you missed the livestream, here’s a quick look at the themes and sessions from the day hosted by runZero’s&nbsp;<a href="https://www.runzero.com/authors/tod-beardsley/">Tod Beardsley</a> and <a href="https://www.runzero.com/authors/rob-king/">Rob King</a>.</p>
<figure><img src="/uploads/blog/runzero-day/rz-day-bts-3.webp" data-image="324446" width="100%"></figure>
<h2>The vulnerability crisis: Quality, prediction, and noise</h2>
<p>Right now, the industry is overwhelmed by a flood of CVEs, and we’re pretty sure this is just the beginning of a pretty steep slope. With vulnerability disclosures at an all-time high, the debate over quality versus quantity is more important than ever. In the ‘<a href="https://www.runzero.com/resources/cve-quality-vs-quantity/">CVE quagmire</a>’ segment, <a href="https://www.linkedin.com/in/jgamblin/">Jerry Gamblin</a> (RogoLabs) told Tod that we’re facing an average of more than 160 new CVEs per day. He highlighted that while we’re hearing a lot about the potential for an artificial intelligence (AI) tsunami of bugs, we still haven’t addressed people-generated bugs and the inconsistent metadata that have hindered security teams for decades. On a positive note, they discussed how projects like RogoLabs’ <a href="https://cve.icu/">CVE.ICU</a> is making the CVE program more transparent, and how the upcoming <a href="https://cwe.mitre.org/documents/schema/schema_v6.0.html">Schema 6.0</a> could also help by requiring better, machine-readable data for automated discovery and fixes.</p>
<p>Next, we had the perfect follow-up session, ‘<a href="https://www.runzero.com/resources/predicting-exploitation/">Predicting exploitation</a>’with <a href="https://www.linkedin.com/in/jayjacobs1/">Jay Jacobs</a>&nbsp;(Empirical Security), exploring the practice of predicting vulnerability exploitation. Jacobs detailed the evolution of the <a href="https://www.first.org/epss/">Exploit Prediction Scoring System (EPSS)</a> from a research initiative into a vital, daily-published API that provides probability scores and percentile rankings for hundreds of thousands of CVEs. </p>
<p>They discussed how EPSS differs from other scoring systems and frameworks, specifically explaining the relationship between a probability score and the percentile rank. Jacobs also addressed common misconceptions about low-probability scores, noting that even a small percentage can be highly significant when measured across a massive population of vulnerabilities. </p>
<p>Rounding out our discussions on CVEs was the '<a href="https://www.runzero.com/resources/prioritizing-vulnerability-noise/">Mute the sirens</a>' session with <a href="https://www.linkedin.com/in/marklambertlinkedin/">Mark Lambert</a>&nbsp;(ArmorCode). Given the increasing volume and velocity of vulnerabilities, Lambert explains how an important step in reducing the noise includes determining what actually needs to be fixed, and it’s not just about picking the critical ones. He noted that they leverage threat intelligence from CISA’s KEV and EPSS to determine what’s being actively exploited, which is particularly important given that nearly all  CVEs are never actually exploited in the real world. </p>
<p>Then, they further analyze this vulnerability intelligence by using integrations with other solutions to get an inventory of assets, determine what’s externally facing, and understand if a fix is urgently needed from a business-priority perspective. Using this unified exposure management approach goes beyond focusing only on traditional CVEs to include issues found through penetration testing and static analysis, providing a comprehensive picture of an organization’s security posture.</p>
<h2>Research-driven reporting in cybersecurity journalism</h2>
<p>With more AI-generated content and smaller newsrooms, cybersecurity journalism faces new challenges. In the '<a href="https://www.runzero.com/resources/signal-vs-slop/">Signal vs. slop</a>' session, current and former reporters discussed how research-driven reporting is changing. Our panel of experts included <a href="https://www.linkedin.com/in/billbrenner/">Bill Brenner</a> (CYBR.SEC.Media), <a href="https://www.linkedin.com/in/dennis-fisher-b027621/">Dennis Fisher</a> (Decipher), and <a href="https://www.linkedin.com/in/steved3/">Steve Ragan</a> (1Password). </p>
<p>The group discussed how reduced funding for traditional media has pushed many journalists to work for and with  vendors directly, where brand journalism now fills the gap left by shrinking newsrooms, creating challenges for editorial independence amid the pressures of advertising and sponsored content. They also reflected on how large language models (LLMs) are affecting the quality of security reporting and how the rise of automated content lacks the human insight needed for good communication. </p>
<p>Expanding on the cybersecurity journalist’s perspective, the '<a href="https://www.runzero.com/resources/frontlines-cybersecurity-journalism/">On the frontlines of investigative journalism</a>' session with investigative journalist and author <a href="https://www.linkedin.com/in/josephmenn/">Joseph Menn</a> examined the intersection of technology, crime, geopolitics, and hacktivism. </p>
<p>Menn shared with Tod that today’s most interesting stories aren’t just about business deals or stock prices; they focus on the complex areas where organized crime groups and state-sponsored intelligence operations overlap, especially in places like Russia and China. </p>
<p>They also discussed Menn’s  book, <a href="https://cyberscoop.com/cult-of-the-dead-cow-joseph-menn-book-review/">Cult of the Dead Cow</a>. They talked about the group's role in pressuring tech giants like Microsoft to take security seriously, effectively shifting the industry from a culture of hobbyist tinkering to one of professionalized defense and public policy influence.</p>
<h2>Bridging the physical and digital divide</h2>
<figure><img src="/uploads/blog/runzero-day/rz-day-bts-1.webp" data-image="324428" width="100%"></figure>
<p>In the '<a href="https://www.runzero.com/resources/from-risk-to-resilience/">From risk to resilience</a>' session, <a href="https://www.linkedin.com/in/lnkdn-mary-g/">Mary Gannon</a> (GuidePoint Security) and <a href="https://www.linkedin.com/in/cpgillespie/">Patrick Gillespie</a> (GuidePoint Security) talked with Rob about how IT and Operational Technology (OT) are converging. They discussed the unique challenges of securing industrial systems in sectors such as manufacturing and mining, where older software like Windows 98 and even Windows 3.1 is still in use. They pointed out that while bringing IT and OT together offers benefits such as real-time data and remote work, it also poses serious safety risks.</p>
<p>One key takeaway is the importance of knowing what assets are on your network. Many OT organizations don’t have a clear picture of what’s connected, often because the security teams don’t actually own the physical equipment. They explained that in OT, the priorities are different: IT cares most about keeping data private, while OT focuses on safety and keeping systems running. That’s why things like immediate patching aren’t always possible — shutting down a system could put people’s lives at risk.</p>
<p>This shift from physical assets to decentralized systems is also redefining the very concept of a network perimeter. In the ‘<a href="https://www.runzero.com/resources/perimeters-and-pathways/">Perimeters and pathways</a>’ session with <a href="https://www.linkedin.com/in/jaredcatkinson/">Jared Atkinson</a> (SpecterOps), <a href="https://www.linkedin.com/in/zakird/">Zakir Durumeric</a> (Censys), and <a href="https://www.linkedin.com/in/hdmoore/">HD Moore</a> (runZero), our experts stressed that the idea of a single, clear network perimeter is outdated, replaced by a satellite model of thousands of cloud accounts, remote control systems, and data-sovereignty-compliant providers. They also pointed out that network infrastructure, like firewalls, VPNs, and LTE modems, is now a top target for initial access, blurring the line between internal and external assets.</p>
<p>They discussed the pathways attackers take once they gain initial access, and how defenders can use solutions to map identity-based attack paths through systems. The conversation also noted that fingerprinting internal TLS services and searching for matching hashes on the public internet reveals hidden connections and misconfigurations, such as management ports exposed to guest wireless networks that completely bypass intended segmentation.</p>
<p>And this is especially risky at ‘<a href="https://www.runzero.com/resources/eol-and-exploitation/">The network edge</a>,’ where old hardware like routers that no longer get updates are easy targets for attackers. During this session, <a href="https://www.linkedin.com/in/kimberduke/">Kimber Duke</a> (VulnCheck) and <a href="https://www.linkedin.com/in/patrickmgarrity/">Patrick Garrity</a> (VulnCheck) discussed the critical intersection of end-of-life (EOL) hardware and this notion of a porous network edge with Tod. </p>
<p>Our experts revealed that edge devices, such as consumer routers and firewalls, are some of the most targeted assets for exploitation. They also talked about the zombie cycle of the internet, where unpatched, unsupported devices remain online indefinitely, creating a massive, static attack surface. Unfortunately, this problem is exacerbated by Internet Service Providers (ISPs) that continue to issue EOL hardware to new customers as well as the lack of consumer awareness regarding router updates. </p>
<p>As the conversation shifted to AI, our experts noted that they’re seeing a mix of valid bugs and ‘AI slop,’ and they anticipate the volume of valid vulnerabilities to increase geometrically over time. </p>
<h2>The AI frontier: Bounties and asymmetric defense</h2>
<p>And speaking of AI (which is nearly impossible to avoid in San Francisco, it turns out), it was also a focus in several sessions, including the discussion Tod had with <a href="https://www.linkedin.com/in/caseyjohnellis/">Casey Ellis</a>&nbsp;(Bugcrowd) about ‘<a href="https://www.runzero.com/resources/bug-bounties-ai/">Bug bounties in the age of AI</a>.’ They talked about how AI is making it easier for both attackers and defenders, but that the primary drivers of security research still depend on human intent and quick decision-making. They also discussed the challenge of the 'defender's dilemma,' where attackers can try new things quickly and with little risk, while defenders must secure entire environments and face severe operational consequences if their automated 'agents' cause a production outage.</p>
<p>As the session continued, Ellis stressed the importance of vulnerability research and the need to standardize disclosure practices, which is why he’s focusing on <a href="http://disclose.io">disclose.io</a> to make vulnerability disclosure and vulnerability report acceptance easier through standardized legal templates and a vendor-neutral database of disclosure policies.</p>
<figure><img src="/uploads/blog/runzero-day/rz-day-bts-5.webp" data-image="324460" width="100%"></figure>
<p>As noted earlier, we weren’t done with AI yet. '<a href="https://www.runzero.com/resources/ai-threat-intelligence/">The infinite eye</a>' segment with <a href="https://www.linkedin.com/in/jcran/">Jonathan Cran</a> (Mallory) and <a href="https://www.linkedin.com/in/hdmoore/">HD Moore</a> (runZero) talked with Tod about how AI-powered threat intelligence is giving defenders a real edge in a noisy security landscape. The conversation highlights a major shift in vulnerability management; defenders are transitioning away from waiting for official CVE numbers to tracking emerging threats through GitHub issues, mailing lists, and security advisories. By being more intentional about embracing the strengths of LLMs to filter out slop and fake exploits, defenders can answer critical questions much faster about their exposure in minutes, often beating CVE assignment and official vulnerability databases to the punch.</p>
<h2>Strengthening the shield: Community and visibility</h2>
<figure><img src="/uploads/blog/runzero-day/rz-day-bts-4.webp" data-image="324453" width="100%"></figure>
<p> In the '<a href="https://www.runzero.com/resources/community-powered-vuln-detection/">Force multiplied</a>' session, <a href="https://www.linkedin.com/in/ehrishirajsharma/">Rishiraj Sharma</a> (ProjectDiscovery) and Tod discussed how the open-source framework <a href="https://projectdiscovery.io/nuclei">Nuclei</a> has revolutionized how security teams validate vulnerabilities. Sharma explained that Nuclei was created to cut through the noise from traditional scanners, which often flag thousands of potentially vulnerable instances based solely on version detection. Instead, Nuclei lets security pros outline the exact steps a person would take to verify  an exploit, making it clear which assets are really at risk and need immediate attention.</p>
<p>Thanks to input from pentesters, bug bounty hunters, and researchers worldwide, Nuclei can now create verified exploit templates in just hours instead of days. Sharma also noted  that ProjectDiscovery’s bug bounty program incentivizes researchers to write new templates and validate existing ones to ensure high quality and reduce false positives.</p>
<h2>A new kind of RSAC experience</h2>
<p>At the end of the day, the best part of runZero Day wasn’t just one session — it was the insights shared and the format. By moving the conversation beyond the Moscone Center, we were able to broaden the audience for the major themes of the cybersecurity industry and RSAC to the world beyond Silicon Valley. </p>
<p>In the end, we hope you dip into the recorded stream, and if you just can’t get enough, you should definitely  join the next runZero Hour, where Tod and Rob will chat it up with Caroline Wong, author of The AI Cybersecurity Handbook. They’ll talk more about the ups and downs of our machine-brained tooling in our day-to-day practice of cybersecurity.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/security-update-april-2026/</id>
            <title>runZero security update and new CVE releases</title>
            <published>2026-04-07T09:00:00-04:00</published>
            <updated>2026-04-07T09:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/security-update-april-2026/" />
            <summary type="html">Security update for the runZero Platform, including CVEs and CVSS scores. No action is required for SaaS or version 4.0.26021.0+ (Feb 10, 2026) users.</summary>
                            <author>
                    <name>todb</name>
                </author>
                        <content type="html">
                <![CDATA[<p dir="ltr">Today, we're happy to announce that we've started to allocate CVEs for runZero security updates. If you've applied any update since February 10, 2026 (<a href="https://help.runzero.com/docs/release-notes/#402602100">version 4.0.26021.0</a>), or are using our SaaS (which is most of our customers) there's no action for you to take. runZero consistently publishes security updates as they are fixed, and notes these fixes in the release notes, and we’re now allocating CVEs, starting with a recent batch that came from our last external audit. If you’re interested in the whys and wherefores of CVE allocations, read on!</p>
<p dir="ltr">First off, I’m glad to get these CVE out the door, which may sound a little strange. After all, nobody’s happy when their product ships with vulnerabilities. But, this does give me, incorrigible vulnerability-gazer <a href="https://www.runzero.com/authors/tod-beardsley/">todb</a>, a reason to tout runZero’s overarching commitment to transparently communicate with our customers, users, and fans about the occasional bug that we happen to write, then find, and then fix. Best of all, there’s no reason to believe any of these were exploited in the wild (and we did check; if we ever find indicators of compromise, the affected customers would be the first to know). </p>
<p dir="ltr">In our role as a designated CVE Numbering Authority (or <a href="https://www.cve.org/PartnerInformation/ListofPartners/partner/runZero">CNA</a>), we are now expected to voluntarily (and, dare I say, enthusiastically), publish CVE records noting vulnerabilities that affect our own software. This first batch covers several months of bug-writing, concluding with CVE identifiers for an even dozen vulnerabilities. While most of them are pretty boring (everything in the set requires you to already be at least an authorized runZero user, and most are in the CVSS 5.8 Medium range) we’re committed to showing some uncomfortable proof that we actually do practice what we preach when it comes to security audits. We take our compliance requirements quite seriously, and we are going beyond an auditor’s checkbox when it comes to rolling out fixes before anything actually bad happens.</p>
<p dir="ltr">Going forward, we’re targeting the first Tuesday of every month for these CVE rollups, in order to give our customers and users a chance to apply fixes as we release them. To be clear, I expect there will be first-Tuesdays that go by with nary a bug to document. You'll notice that our most recent security issue was back in February, and I'm writing this in April, so you can expect to see a monthly report when there's something to share.</p>
<p dir="ltr">I’d also like to note that runZero has spent its entire corporate life offering security fixes as regular point releases, and we don’t expect to change that cadence now we’re a CNA. Instead, we’re offering our customers the best of both worlds: rapid fixes for security issues (no matter how minor they seem), and follow up documentation for the folks who continue to rely on the CVE ecosystem for alerting. This works for us because the runZero Platform is, at heart, a SaaS offering, which means that most of our users get these fixes without any heavy lifting or other action on their part. However, we’re also used in high security environments that require an on-prem, air-gapped installation. Ironically, this means that those high-security customers may miss out on security fixes for a while, so we’re hopeful that publishing these CVEs might nudge them along to getting not just security fixes, but all of our sweet new features and refinements that they miss out on with a slower-than-instant update cycle.</p>
<p dir="ltr">Of course, in the unlikely event that things go really off the rails and someone else discovers and publishes a vulnerability of ours before we do ourselves, we’ll be first on the scene with a fix and a CVE in hand.</p>
<p dir="ltr">So, nobody likes shipping vulns, but the least we can do is be clear about our vulnerabilities when we find and fix them, both practically in release notes, and logistically for the global CVE community. Everybody writes bugs, but not everyone is on board with owning them, and that’s why I’m (weirdly) pleased to announce our twelve newly minted CVEs. For more details, swing by <a href="https://www.runzero.com/advisories/" target="_blank">runZero’s Security Advisories page</a>, or just look these up directly with your favorite CVE client.</p>
<h2 dir="ltr">CVEs for April, 2026</h2>
<p dir="ltr">The below are ordered by CVSS general ratings (High to Low, there were no Criticals). All runZero Platform hosted customers have already been fixed, while on-prem customers will need to update to the latest version.</p>
<h3>High</h3>
<ul><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5373" target="_blank">CVE-2026-5373</a>: runZero Platform superuser privilege escalation, CVSS 8.1 (High)</li></ul>
<h3>Medium</h3>
<ul><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5372" target="_blank">CVE-2026-5372</a>: runZero Platform SQL injection in saved queries, CVSS 6.4 (Medium)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5376" target="_blank">CVE-2026-5376</a>: runZero Platform session timeout failure, CVSS 5.9 (Medium)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5374" target="_blank">CVE-2026-5374</a>: runZero Platform MCP information leak, CVSS 5.8 (Medium)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5378" target="_blank">CVE-2026-5378</a>: runZero Platform user creation leak, CVSS 5.8 (Medium)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5384" target="_blank">CVE-2026-5384</a>: runZero Platform incorrect credential scope, CVSS 5.8 (Medium)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5380" target="_blank">CVE-2026-5380</a>: runZero Platform clear-text secret exposure, CVSS 5.3 (Medium)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5383" target="_blank">CVE-2026-5383</a>: runZero Explorer missing authorization check (CVSS 4.4 (Medium)</li></ul>
<h3>Low</h3>
<ul><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5379" target="_blank">CVE-2026-5379</a>: runZero Platform MCP certification information leak, CVSS 3.0 (Low)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5382" target="_blank">CVE-2026-5382</a>: runZero Platform MCP endpoint information leak, CVSS 3.0 (Low)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5375" target="_blank">CVE-2026-5375</a>: runZero Platform API credential information leak, CVSS 2.7 (Low)</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-5381" target="_blank">CVE-2026-5381</a>: runZero Platform task information leak, CVSS 2.2 (Low)</li></ul>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/fortinet-forticlient-ems/</id>
            <title>Fortinet FortiClient EMS vulnerability: CVE-2026-35616</title>
            <published>2026-04-04T02:37:00-04:00</published>
            <updated>2026-04-06T13:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/fortinet-forticlient-ems/" />
            <summary type="html">Certain versions of FortiClient EMS are susceptible to an API auth and authorization bypass vulnerability. Here&#039;s how to find impacted assets.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Fortinet FortiClient Endpoint Management Server&nbsp;vulnerability: CVE-2026-35616</h2>
<p>Fortinet&nbsp;<a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099" target="_blank">disclosed</a>&nbsp;certain versions of the&nbsp;FortiClient Endpoint Management Server (EMS)&nbsp;are susceptible to an API authentication and authorization bypass vulnerability caused by improper access control. A remote, unauthenticated attacker could exploit this flaw by sending specially crafted requests to the server. A successful exploit may allow the attacker to execute unauthorized code or commands.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20093" target="_blank"></a><a href="https://www.cve.org/CVERecord?id=CVE-2026-35616" target="_blank">CVE-2026-35616</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.1</strong>.<br></p>
<p>Both Fortinet and <a href="https://www.cisa.gov/news-events/alerts/2026/04/06/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank">CISA</a> have now confirmed that this vulnerability <strong>is being actively exploited in the wild.</strong></p>
<p><strong>The following versions are affected:</strong></p>
<ul><li>FortiClientEMS 7.4: Versions 7.4.5 through 7.4.6</li></ul>
<ul></ul>
<h2>What is Fortinet FortiClient Endpoint Management Server?</h2>
<p>Fortinet FortiClient Endpoint Management Server (EMS) is a centralized application used to deploy, configure, and monitor security settings on devices running the FortiClient agent.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute unauthorized code or commands on the vulnerable host.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged upgrade affected systems to the following versions or apply the relevant hotfixes immediately:</p>
<ul><li>FortiClientEMS 7.4: Upgrade to 7.4.7 or later.</li><li>FortiClientEMS 7.4.5: Apply hotfix 7.4.5.2111.</li><li>FortiClientEMS 7.4.6: Apply hotfix 7.4.6.2170.</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>_asset.protocol:http AND protocol:http AND favicon.ico.image.mmh3:=-800551065</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/cisco-ssm-on-prem/</id>
            <title>Cisco SSM On-Prem vulnerabilities: Find impacted assets</title>
            <published>2026-04-03T17:01:00-04:00</published>
            <updated>2026-04-03T17:01:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/cisco-ssm-on-prem/" />
            <summary type="html">Cisco disclosed in two advisories that multiple vulnerabilities have been identified in versions of their Smart Software Manager On-Prem (SSM On-Prem).</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest&nbsp;Cisco Smart Software Manager On-Prem&nbsp;vulnerabilities: CVE-2026-20160, and CVE-2026-20151</h2>
<p>Cisco <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-cli-execution-cHUcWuNr" target="_blank">disclosed</a> in <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-xRAnOuO8" target="_blank">two</a> advisories that multiple vulnerabilities have been identified in versions of their&nbsp;Smart Software Manager On-Prem (SSM On-Prem).<br></p>
<ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20160" target="_blank">CVE-2026-20160</a>: A vulnerability that could allow a remote, unauthenticated attacker to execute arbitrary commands on the underlying operating system of an affected host. This issue stems from the unintentional exposure of an internal service. An attacker could exploit this by sending a crafted request to the exposed service's API. A successful exploit could grant the attacker <em>root</em> level privileges on the underlying operating system.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20093" target="_blank"></a><a href="https://www.cve.org/CVERecord?id=CVE-2026-20160" target="_blank">CVE-2026-20160</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20151" target="_blank">CVE-2026-20151</a>: A vulnerability in the web interface that could allow a remote, low-privileged attacker (System User role) to elevate their privileges. This flaw exists due to the improper transmission of sensitive user information. An attacker could exploit this by sending a crafted message to the host and retrieving session credentials from subsequent status messages. This would allow an attacker to elevate their role from System User to administrative. Note: This vulnerability only exposes information regarding users currently logged into the web interface; SSH sessions are not affected.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20094" target="_blank"></a><a href="https://www.cve.org/CVERecord?id=CVE-2026-20151" target="_blank">CVE-2026-20151</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>7.3</strong>.</li></ul>
<p><strong>The following versions are affected by one or both vulnerabilities:</strong></p>
<ul><li>CVE-2026-20151: Cisco SSM On-Prem versions 9-202510 and earlier.</li><li>CVE-2026-20160: Cisco SSM On-Prem versions 9-202502 through 9-202510.</li></ul>
<ul></ul>
<h2>What is Cisco Smart Software Manager On-Prem?</h2>
<p>Cisco Smart Software Manager On-Prem is a local virtual appliance that enables organizations to manage and track Cisco software licenses within a private network, eliminating the need to connect individual devices directly to Cisco's cloud-based licensing portal.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:</p>
<ul><li>Cisco SSM On-Prem: Upgrade to 9-202601 or later.</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>_asset.protocol:http AND protocol:http AND html.title:="On-Prem License Workspace"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/rsac-bsidessf-2026/</id>
            <title>Working in concert: A week of community and conversation</title>
            <published>2026-04-03T12:59:00-04:00</published>
            <updated>2026-04-03T12:59:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/rsac-bsidessf-2026/" />
            <summary type="html">This year runZero helped shape the experience at both BSidesSF &amp; RSAC with a packed lineup of technical sessions, community events and connections.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<p>Every year, our community buys tickets to get lost in the security music of BSidesSF and RSAC. This year (we hope), runZero helped shape the experience at both BSidesSF and RSAC with a packed lineup of technical sessions, community events, unforgettable moments, and connections.</p>
<p>Our presence had front-row feels with back-row vibes — spanning demos, meetings, social events, and our first-ever day-long livestream — all focused on building community, learning from industry experts, and pushing the boundaries to ensure defenders win by default.</p>
<h2>BSidesSF: The deep cuts</h2>
<p>Our week began at BSidesSF, the ultimate opening act of deep dive tech talks and backstage conversations with the expert practitioners who drive innovation and aren’t afraid to get their hands on a keyboard. We love to get social, so it’s only appropriate that we were the daytime social sponsor posted up between the bar and the outdoor lounge. We loved reconnecting with old friends and making lots of new ones.</p>
<p>We also have to give a special shoutout to the entire BSidesSF crew for the warm welcome they gave Zeti the Yeti. Our beloved 6.5’ furry mascot was presented with his own special <a href="https://www.linkedin.com/posts/klobucar_bsidessf-is-a-lot-of-fun-for-everyone-not-activity-7443342341203136513-pMY7/">BSides badge</a>, which literally brought a tear or two to our eyes. We are thankful that the BSides community gets us! (And we had a lot of fun going all in with the musical theme, including cipher puzzles that matched up our favorite Broadway shows with cybersecurity trivia.)  </p>
<figure><img src="/uploads/blog/rsac-2026/runzero-booth.webp" data-image="321921" width="100%"></figure>
<p>After our crew packed up our BSidesSF booth, we headed off to the iconic Tongacon, which made a victorious return to the Tonga Room this year, complete with indoor rain and plenty of tiki drinks. We were proud to sponsor this year, and we enjoyed catching up with longtime friends and forging new connections before shifting our focus to the hustle and bustle of RSAC.</p>
<h2>RSAC: Headliners and headlines</h2>
<p>On Monday, the marquee acts took to the stage to deliver industry news, influential conversations, and thought leadership!</p>
<p>We started our RSA tour with two speaking sessions, media interviews, and social gatherings. </p>
<p>First, our CEO, HD Moore, <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1756084038274001H91n">examined how AI is changing vulnerability discovery and how to prepare for it</a>. Followed by our VP of Security Research, Tod Beardsley, who <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755470003779001WEMM">explored the CVE program, its fragility, and its possible  future</a>.</p>
<p>Then, we focused on our community-centered gigs.</p>
<figure><img src="/uploads/blog/rsac-2026/authors-signing.webp" data-image="321901" width="100%"></figure>
<p>We hosted incredible book signings with two influential voices in our industry, <a href="https://www.linkedin.com/in/carolinewmwong/">Caroline Wong</a> and <a href="https://www.linkedin.com/in/josephmenn/">Joseph Menn</a>. Caroline Wong drew a packed room as we celebrated her new book, <strong><em>The</em></strong> <strong><em>AI Cybersecurity Handbook.</em></strong> We had a fascinating discussion about how AI is transforming cybersecurity, and everyone wanted a signed copy. Next, Joseph Menn, investigative journalist and author of <strong><em>Cult of the Dead Cow</em></strong>, captivated the audience by sharing his journey as a journalist and the inspiration behind  his latest book. Attendees were thrilled  to get their hands on a  personalized, signed copy.</p>
<p>And the hits kept rolling, with pop-up moments throughout the conference featuring the runZero team (and Zeti the Yeti sightings powered by iconic SF pedicabs!).</p>
<p>But we didn’t just rock in person!</p>
<h2>Livestream: Our debut tracks</h2>
<figure><img src="/uploads/blog/rsac-2026/runzero-day-bts.webp" data-image="321908" width="100%"></figure>
<p>It was a lights, sound, magic moment for the runZero team as we launched the inaugural <a href="https://www.runzero.com/rsac-live-2026/">runZero Day</a>, a live-streamed event held alongside RSAC, bringing insights to everyone who wanted to experience the magic of the week virtually.</p>
<p>On March 25, we broadcast live for <a href="https://www.youtube.com/watch?v=o0nn6uaL2CE">almost six amazing hours</a>!  runZero Day brought together more than a dozen unique voices to explore the issues shaping cybersecurity today and what’s coming next. We were beyond honored to host an incredible lineup of industry trailblazers, innovators, founders, journalists, and subject matter experts.</p>
<p>The program covered a wide range of topics, including:</p>
<ul><li><p>The evolving role of the CVE program in modern defense</p></li><li><p>The realities of reporting on cybersecurity in a high-pressure, high-stakes environment</p></li><li><p>Challenges in securing OT, applications, and increasingly complex attack surfaces</p></li><li><p>Perspectives from startup founders working to rethink the future of security</p></li><li><p>Impacts of AI on our rapidly morphing industry</p></li></ul>
<p>Merging technical perspectives with  industry insights, our big, crazy,  audacious goal was to make RSAC-related content accessible to a global audience, giving more people the opportunity to interact, learn, and contribute regardless of their location — no badge required!</p>
<h2>Liner notes</h2>
<p>It was music to our ears when BSidesSF and RSAC 2026 once again proved that the most valuable part of the week isn’t just what you learn or what happens on stage — it’s who you meet (or reconnect with)  and how you apply the knowledge you gained moving forward.</p>
<h2><strong>Join the fan club</strong></h2>
<p>If you missed us in San Francisco, there are still plenty of ways to connect with the runZero band and learn how we provide unrivaled exposure detection and insights  across your entire internal and external attack surface:</p>
<ul><li><p><strong>Try the Platform:</strong> Interested in seeing runZero in action? You can explore the platform for <a href="https://www.runzero.com/try/">free for 21 days</a>, and following your trial, you can transition to our free&nbsp;<a href="https://www.runzero.com/platform/community-edition/">Community Edition</a> (for environments with fewer than 100 assets).</p></li><li><p><strong>Learn More:</strong> Explore our <a href="https://www.runzero.com/platform/">Platform features</a> and&nbsp;<a href="https://www.runzero.com/resources/">Resources</a>&nbsp;for more information about runZero.</p></li></ul>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/cisco-imc/</id>
            <title>Latest Cisco IMC vulnerabilities: How to find impacted assets</title>
            <published>2026-04-02T18:01:00-04:00</published>
            <updated>2026-04-02T18:01:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/cisco-imc/" />
            <summary type="html">Cisco disclosed in two advisories that multiple vulnerabilities have been identified in versions of their Integrated Management Controller (IMC).</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Cisco Integrated Management Controller vulnerabilities: CVE-2026-20093, CVE-2026-20094, CVE-2026-20095, CVE-2026-20096, and CVE-2026-20097</h2>
<p>Cisco&nbsp;<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn" target="_blank">disclosed</a>&nbsp;in <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt" target="_blank">two</a>&nbsp;advisories&nbsp;that multiple vulnerabilities have been identified&nbsp;in versions of their&nbsp;Integrated Management Controller (IMC).<br></p>
<ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20093" target="_blank">CVE-2026-20093</a>: A vulnerability in the password change functionality could allow a remote, unauthenticated attacker to bypass authentication. Due to incorrect handling of password requests, an attacker could send a crafted HTTP request to alter any user's password, including an <em>Admin</em> account, to gain full system access.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20093" target="_blank">CVE-2026-20093</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20094" target="_blank">CVE-2026-20094</a>: A vulnerability in the web-based management interface could allow a remote, low-privileged (read-only) attacker to perform command injection. By sending crafted commands to the interface, an attacker could exploit improper input validation to execute arbitrary commands as the <em>root</em> user.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20094" target="_blank">CVE-2026-20094</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>8.8</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20095" target="_blank">CVE-2026-20095</a> and <a href="https://www.cve.org/CVERecord?id=CVE-2026-20096" target="_blank">CVE-2026-20096</a>: Two vulnerabilities in the web-based management interface could allow a remote, high-privileged (admin-level) attacker to perform command injection. Due to improper input validation, an attacker could execute arbitrary commands on the underlying operating system as the <em>root</em> user.&nbsp;The vulnerabilities designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2026-20095" target="_blank">CVE-2026-20095</a> and <a href="https://www.cve.org/CVERecord?id=CVE-2026-20096" target="_blank">CVE-2026-20096</a>&nbsp;have been rated <em><em>medium</em></em> with a CVSS score of <strong>6.5</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-20097" target="_blank">CVE-2026-20097</a>: A vulnerability in the web-based management interface could allow a remote, high-privileged (admin-level) attacker to execute arbitrary code. By sending crafted HTTP requests to an affected device, an attacker could exploit improper input validation to execute arbitrary code on the underlying operating system as the <em>root</em> user.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20097" target="_blank">CVE-2026-20097</a> and has been rated <em><em>medium</em></em> with a CVSS score of <strong>6.5</strong>.</li></ul>
<p><strong>The following Cisco products are affected if they are running a vulnerable release of Cisco IMC, regardless of device configuration:</strong><br></p>
<p><strong>5000 Series Enterprise Network Compute Systems (ENCS):</strong><em><br>(Affected by CVE-2026-20093, CVE-2026-20095, and CVE-2026-20096)</em><strong><br></strong></p>
<ul><li>Cisco NFV Infrastructure Software (NFVIS) versions 4.15 and earlier</li></ul>
<p><strong>Catalyst 8300 Series Edge uCPE:</strong><em><br></em>(Affected by CVE-2026-20093, CVE-2026-20094, CVE-2026-20095, and CVE-2026-20096)<br></p>
<ul><li>Cisco NFVIS versions 4.16 and earlier</li><li>Cisco NFVIS version 4.18</li></ul>
<p><strong>UCS C-Series M5 & M6 Rack Servers (Standalone Mode):</strong><em><br></em>(Affected by all CVEs: CVE-2026-20093, CVE-2026-20094, CVE-2026-20095, CVE-2026-20096, and CVE-2026-20097)<br></p>
<ul><li>Cisco IMC versions 4.2 and earlier</li><li>Cisco IMC version 4.3</li><li>Cisco IMC version 6.0 (M6 only)</li></ul>
<p><strong>UCS E-Series M3 & M6:</strong><em><br></em>(Affected by CVE-2026-20093, CVE-2026-20094 (M6 only), CVE-2026-20095, and CVE-2026-20096)<br></p>
<ul><li>Cisco IMC versions 3.2 and earlier (M3)</li><li>Cisco IMC versions 4.15 and earlier (M6)</li></ul>
<p><strong>UCS S-Series Storage Servers (Standalone Mode):</strong><em><br></em>(Affected by CVE-2026-20094, CVE-2026-20095, and CVE-2026-20096)<br></p>
<ul><li>Cisco IMC versions 4.2 and earlier</li><li>Cisco IMC version 4.3</li></ul>
<p><strong>Cisco Appliances:</strong><em><br></em>The following appliances are affected if the Cisco IMC user interface (UI) is exposed, as these platforms are built upon preconfigured versions of the UCS C-Series Servers listed above:<br></p>
<ul><li>Application Policy Infrastructure Controller (APIC) Servers</li><li>Business Edition 6000 and 7000 Appliances</li><li>Catalyst Center Appliances, formerly DNA Center</li><li>Cisco Telemetry Broker Appliances</li><li>Cloud Services Platform (CSP) 5000 Series</li><li>Common Services Platform Collector (CSPC) Appliances</li><li>Connected Mobile Experiences (CMX) Appliances</li><li>Connected Safety and Security UCS Platform Series Servers</li><li>Cyber Vision Center Appliances</li><li>Expressway Series Appliances</li><li>HyperFlex Edge Nodes</li><li>HyperFlex Nodes in HyperFlex Datacenter without Fabric Interconnect (DC-No-FI) deployment mode</li><li>IEC6400 Edge Compute Appliances</li><li>IOS XRv 9000 Appliances</li><li>Meeting Server 1000 Appliances</li><li>Nexus Dashboard Appliances</li><li>Prime Infrastructure Appliances</li><li>Prime Network Registrar Jumpstart Appliances</li><li>Secure Endpoint Private Cloud Appliances</li><li>Secure Firewall Management Center Appliances</li><li>Secure Malware Analytics Appliances</li><li>Secure Network Analytics Appliances</li><li>Secure Network Server Appliances</li><li>Secure Workload Servers</li></ul>
<h2>What is Cisco Integrated Management Controller?</h2>
<p>The Cisco Integrated Management Controller is a dedicated baseboard management controller that provides out-of-band hardware configuration, monitoring, and remote control for Cisco UCS C-Series and S-Series servers via a web interface, CLI, or API, independent of the host operating system.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<p><strong>5000 Series ENCS:</strong><br></p>
<ul><li>Cisco NFVIS versions 4.15 and earlier: Upgrade to 4.15.5 or later.</li></ul>
<p><strong>Catalyst 8300 Series Edge uCPE:</strong><br></p>
<ul><li>Cisco NFVIS versions 4.16 and earlier: Migrate to a fixed release.</li><li>Cisco NFVIS version 4.18: Upgrade to 4.18.3 (Apr 2026) or later.</li></ul>
<p><strong>UCS C-Series M5 Rack Server:</strong><br></p>
<ul><li>Cisco IMC versions 4.2 and earlier: Migrate to a fixed release.</li><li>Cisco IMC version 4.3: Upgrade to 4.3(2.260007) or later.</li></ul>
<p><strong>UCS C-Series M6 Rack Server:</strong><br></p>
<ul><li>Cisco IMC versions 4.2 and earlier: Migrate to a fixed release.</li><li>Cisco IMC version 4.3: Upgrade to 4.3(6.260017) or later.</li><li>Cisco IMC version 6.0: Upgrade to 6.0(2.260044) or later.</li></ul>
<p><strong>UCS E-Series M3:</strong><br></p>
<ul><li>Cisco IMC versions 3.2 and earlier: Upgrade to 3.2.17 or later.</li></ul>
<p><strong>UCS E-Series M6:</strong><br></p>
<ul><li>Cisco IMC versions 4.15 and earlier: Upgrade to 4.15.3 or later.</li></ul>
<p><strong>UCS S-Series Storage Server:</strong><br></p>
<ul><li>Cisco IMC versions 4.2 and earlier: Migrate to a fixed release.</li><li>Cisco IMC version 4.3: Upgrade to 4.3(6.260017) or later.</li></ul>
<p>Notes:</p>
<ul><li>NFVIS Platforms: Upgrading Cisco IMC on 5000 Series ENCS and Catalyst 8300 Series Edge uCPE requires an upgrade of the Cisco Enterprise NFVIS. The IMC is updated automatically during the firmware auto-upgrade process.</li><li>Cisco Appliances: Administrators can typically perform a direct upgrade of the Cisco IMC using the <a href="https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/lomug/4-2/b_cisco-host-upgrade-utility-user-guide-4-2/m_upgrading-the-firmware.html" target="_blank">Cisco Host Upgrade Utility (HUU)</a>. For specific exceptions, please refer to the detailed instructions in the official Cisco Security Advisory.</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Cisco AND product:="Integrated Management Controller"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/progress-sharefile/</id>
            <title>Progress ShareFile RCE vulnerabilities: Find impacted assets</title>
            <published>2026-04-02T11:54:00-04:00</published>
            <updated>2026-04-02T11:54:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/progress-sharefile/" />
            <summary type="html">Progress Software disclosed two vulnerabilities in 5.x versions of customer-managed ShareFile Storage Zones Controller (SZC) - CVE-2026-2699 &amp; CVE-2026-2701.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Progress ShareFile&nbsp;vulnerabilities: CVE-2026-2699, and&nbsp;CVE-2026-2701</h2>
<p>Progress Software <a href="https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26" target="_blank">disclosed</a> two vulnerabilities in 5.x&nbsp;versions of customer-managed ShareFile Storage Zones Controller (SZC).<br></p>

<ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-2699" target="_blank">CVE-2026-2699</a>: Allows a remote, unauthenticated adversary to access restricted configuration pages. This could lead to unauthorized system configuration changes and potential Remote Code Execution (RCE) resulting from an Execution After Redirect (EAR) vulnerability.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-2699" target="_blank">CVE-2026-2699</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-2701" target="_blank">CVE-2026-2701</a>: Allows a remote, high-privileged user to upload a malicious file to the server and execute it to achieve RCE.&nbsp;This vulnerability has been designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2026-2699" target="_blank"></a><a href="https://www.cve.org/CVERecord?id=CVE-2026-2701" target="_blank">CVE-2026-2701</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.1</strong>.</li></ul>
<p><strong>The following versions are affected:</strong><br></p>
<ul><li>ShareFile Storage Zones Controller 5.x versions prior to 5.12.4</li></ul>
<h2>What is Progress ShareFile Storage Zones Controller?</h2>
<p>Progress ShareFile Storage Zones Controller is a software application that enables organizations to store their ShareFile data on-premises or in a private cloud infrastructure, rather than using the default ShareFile cloud storage.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>ShareFile Storage Zones Controller 5.x: Upgrade to version 5.12.4 or later.</li><li>Alternative: Users on version 5.x may also upgrade to any v6 version, as all v6 versions are unaffected by these<br>  vulnerabilities.</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>(vendor:="Progress Software" OR vendor:=Citrix OR vendor:=ShareFile) AND
  (product:="ShareFile Storage Zones Controller" OR product:="ShareFile StorageZones Controller")</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/ot-connectivity-principles-part-2/</id>
            <title>Securing OT connectivity: The foundational four</title>
            <published>2026-04-02T08:30:00-04:00</published>
            <updated>2026-04-02T08:30:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/ot-connectivity-principles-part-2/" />
            <summary type="html">Take a closer look at the first four principles that lay the foundation for a robust OT security posture and see how runZero empowers OT network defenders.</summary>
                            <author>
                    <name>Colin Dupreay</name>
                </author>
                        <content type="html">
                <![CDATA[<p>Experts from national cybersecurity agencies in seven countries released guidance earlier this year titled “<a href="https://www.ncsc.gov.uk/files/ncsc-secure-connectivity-for-operational-technology.pdf">Secure Connectivity Principles for Operational Technology (OT)</a>” to help organizations strengthen their defenses as IT and OT continue to converge. </p>
<p>We are continuing our <a href="https://www.runzero.com/blog/ot-connectivity-principles/">blog series</a> on this guidance by taking a closer look at the first four principles that lay the foundation for a robust OT security posture and how runZero can help empower OT network defenders.</p>
<p>Let’s dive in.</p>
<h2>Principle 1: Balance the risks and opportunities</h2>
<p>At the heart of the first principle is the idea that connectivity decisions should be risk‑informed and auditable. Before adding or modifying any connection into or out of an OT system, organizations must create and document business use cases for all permitted connectivity within OT systems. These must clearly document why the connection is needed, the benefits it provides, and what risk it introduces. Specifically, when documenting the justification and use case of connections, organizations should consider, at a minimum, the following: </p>
<ul><li><p>Why the connection is required and what operational function it enables</p></li><li><p>What benefits are expected, like improved monitoring or predictive maintenance</p></li><li><p>What risks are acceptable based on organisational threat context</p></li><li><p>Potential impacts if the connection is misused or compromised</p></li><li><p>How new dependencies might affect isolation or resilience</p></li><li><p>Who is accountable at a senior level for the decision</p></li></ul>
<p>This principle also deliberately  highlights <strong>two major considerations </strong>for organizations to weigh that greatly increase risk when expanding OT connectivity: <strong>obsolete products</strong> (both software and hardware) and <strong>operational risks</strong> that ensure the safety, reliability, and availability of OT systems. </p>
<p>Organizations need to understand, evaluate, and address the risks associated with obsolete products. These risks may include the lack of security updates and the loss of institutional knowledge to help support older systems. </p>
<p>To reduce operational risk, organizations also need to consider loss of connectivity, single points of failure, and manual fallback capabilities. </p>
<p>This principle ensures OT system owners and operators carefully consider and document the impacts, effects, and ramifications of increasing the connectivity of their OT systems, especially when they are using old or obsolete products that could compromise the integrity of the OT system.  </p>
<h2>Principle 2: Limit the exposure of your connectivity</h2>
<p>Exposure refers to how accessible OT systems are to both internal networks and external systems. The more reachable an OT asset is, the broader the potential attack surface becomes. To protect against exploitation, organizations should adopt an exposure management approach to their environment. It’s important to note that exposure management is not the same as vulnerability management and should not be treated as such.</p>
<p>An exposure management approach considers factors such as internet, adjacent, or internal network accessibility, End of Life (EOL) devices, obsolete protocol usage, administrative service or interface accessibility, and the many non-CVE risks that often lead to exploitation. </p>
<p>The guidance provides suggestions for limiting the exposure of OT systems, including: </p>
<ul><li><strong>Reduce time of exposure</strong><ul><li><p>When possible, utilize just-in-time (JIT) access to reduce the time window for attacks to occur.</p></li></ul></li><li><strong>Remove inbound port exposure</strong><ul><li><p>Only brokered connections through a secure gateway should be allowed. All other connections should initiate outbound from the OT system.</p></li></ul></li><li><strong>Manage obsolescence risks</strong><ul><li><p>When  obsolete OT devices cannot be upgraded, system owners should implement network segmentation, boundary controls, access restrictions, and device monitoring and logging.</p></li></ul></li><li><strong>Manage unique connectivity risks </strong><ul><li><p>Even if <a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">encrypted</a>, wireless communications like WiFI or radio are not bound by the physical perimeter of your site and introduce risk. Compensating controls should be implemented to mitigate risk from wireless mediums.</p></li></ul></li></ul>
<p>The second principle highlights the necessity for organizations to understand what is on their networks and how those components  are connected to reduce their risk. </p>
<h2>Principle 3: Centralize and standardize network connections</h2>
<p>Principle three encourages organizations to standardize their network connections to combat the ever-present decentralized, inconsistent, and needlessly complex connections that introduce risk. The guidance recommends:</p>
<ul><li><strong>Flexibility</strong><ul><li><p>Maintain a robust change management process to protect against emerging threats by continuously evaluating and refining connectivity and controls. Organizations must select products with ongoing support to adapt to regulatory changes and newer threat models.</p></li></ul></li><li><strong>Repeatability</strong><ul><li><p>Connectivity models and plans should be standardized and reusable to reduce or  eliminate the need for bespoke solutions that can lead to unnecessary and unexpected exposures.</p></li></ul></li><li><strong>Categorized </strong><ul><li><p>While repeatability is necessary, distinctions in device and data types (across and within systems) allow selection of the most appropriate protections and controls for each system. </p></li></ul></li></ul>
<p>While more concise, the third principle should not be overlooked, given that complexity in systems can create unknown connections, leading to an increased attack surface.</p>
<h2>Principle 4: Use standardized and secure protocols</h2>
<p>OT system owners most often prioritize availability in the CIA (confidentiality, integrity, and availability) triad, especially in industrial or critical infrastructure environments. With that said, they should implement all components of the triad, including confidentiality and integrity, where possible. </p>
<p>The guidance suggests two main approaches:</p>
<p><strong>Protocol Validation:</strong></p>
<p>System owners should validate both the protocol and the data payloads within and between systems to ensure the traffic seen is expected and valid. The protocols in use and the payloads should be inspected at key trust boundaries, for example, the OT/IT boundary or between services, such as SCADA control software and a PLC. It is recommended that the validation of allowed traffic should be schema-based, that is, following a ‘known good’ model that only allows expected and desired traffic. </p>
<p><strong>Industrial Protocols:</strong></p>
<p>When evaluating what industrial protocols to use in your OT system, you should:</p>
<ul><li><p>Use modern, secure versions of protocols (CIP Security vs CIP or DNP2-SAv5 vs DNP3) that support cryptographic protections for integrity.</p></li><li><p>Implement protocols that use open standards to allow for vendor-agnostic solutions to avoid vendor lock in and bespoke implementations.</p></li><li><p>If utilized, require a business use case for the use of insecure protocols and implement compensating controls to manage the risk.</p></li><li><p>Restrict OT protocols to isolated OT network segments, blocking, or when necessary, brokering external connections.</p></li></ul>
<p>OT system owners need to implement modern and secure OT protocols to reduce the attack surface of their environments. </p>
<h2>How runZero helps</h2>
<p>When implemented correctly, these first four principles create a structured, repeatable approach to designing OT connectivity that simultaneously supports operational goals and strengthens cybersecurity posture.</p>
<p>runZero helps OT system owners implement these principles by:</p>
<ol><li><strong>Providing an asset inventory of OT, IoT, and IT assets</strong><ul><li><p>You can’t protect what you can’t see. runZero’s <a href="https://www.runzero.com/blog/cisa-ot-asset-inventory-guidance/">asset inventory</a> enables system owners to see everything on the network. </p></li></ul></li><li><strong>Obsolete device detection</strong><ul><li><p>runZero natively provides EOL information for devices. In cases where EOL information is unavailable, runZero provides <a href="https://www.runzero.com/blog/fingerprinting-caasm/">deep asset-level insight</a>, including software and hardware version information. This allows system owners to know exactly what is on the network.</p></li></ul></li><li><strong>Detection of protocols and ports</strong><ul><li><p>With<a href="https://www.runzero.com/blog/find-unmanaged-devices/"> safe active scanning</a>, runZero enables system owners to find the open ports and protocols on devices that may have been missed by other methods.</p></li></ul></li><li><strong>Segmentation validation</strong><ul><li><p>runZero can empower OT system owners to <a href="https://www.runzero.com/blog/using-runzero-to-verify-network-segmentation/">validate their network segmentation</a>, ensuring their OT systems are not erroneously or incorrectly connected to the IT network.</p></li></ul></li><li><strong>Exposure management </strong><ul><li><p>runZero’s unauthenticated scanning provides a unique opportunity for system owners to <a href="https://www.runzero.com/blog/new-era-exposure-management/">uncover risks and exposures that matter</a>. Instead of focusing on vulnerabilities that will never be exploited, runZero surfaces the problems that plague OT systems: obsolete protocols, misconfigurations, exposed admin interfaces, and more. </p></li></ul></li></ol>
<p>In OT environments — where uptime, safety, and reliability are paramount — these four foundational principles, along with runZero, empower OT systems owners to reduce their attack surface  and keep their critical infrastructure secure. </p>
<p>Stay tuned for our third and final blog in this series as we discuss the final four principles from the guidance.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/f5-bigip-instances/</id>
            <title>F5 BIG-IP RCE exploit CVE-2025-53521: Find impacted assets</title>
            <published>2022-05-05T03:00:00-04:00</published>
            <updated>2026-03-27T19:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/f5-bigip-instances/" />
            <summary type="html">On Friday, March 27, 2026, F5 updated CVE-2025-53521 to indicate that the vulnerability is now known to be a remote code execution vulnerability (RCE) with a CVSS score of 9.8.</summary>
                            <author>
                    <name>Tom Sellers</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest F5 BIG-IP vulnerability:&nbsp;CVE-2025-53521</h2>
<p>On October 15, 2025, F5 <a href="https://my.f5.com/manage/s/article/K000156741" target="_blank">disclosed</a> a denial of service vulnerability, designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-53521" target="_blank">CVE-2025-53521</a>, in F5 BIG-IP Access Policy Manager (APM).<br><br>  On Friday, March 27, 2026, F5 updated the CVE entry to indicate that the&nbsp;vulnerability is now known to be a remote code execution vulnerability (RCE)&nbsp;with a CVSS score of 9.8. This vulnerability is now known to&nbsp;allow a remote, unauthenticated&nbsp;attacker to perform remote code execution. <br><br>  This vulnerability is known to be exploited in the wild and was <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521" target="_blank">added</a> to the&nbsp;CISA.gov Known Exploited Vulnerabilities (KEV) list on March 27, 2026.<br><br>The following versions are affected:<br></p>
<ul><li>F5 BIG-IP Access Policy Manager versions 17.5.0 - 17.5.1 (inclusive)</li><li>F5 BIG-IP Access Policy Manager versions 17.1.0 - 17.1.2 (inclusive)</li><li>F5 BIG-IP Access Policy Manager versions 16.1.0 - 16.1.6 (inclusive)</li><li>F5 BIG-IP Access Policy Manager versions 15.1.0 - 15.1.10 (inclusive)</li></ul>
<h2>What is F5 BIG-IP Access Policy Manager (APM)?</h2>
<p>F5 BIG-IP Access Policy Manager (APM) is a software module on F5 BIG-IP appliances&nbsp;that acts as an identity-aware proxy and VPN.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow a remote, unauthenticated attacker to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2>Are any updates or workarounds available?</h2>
<p>Upgrade affected versions of F5 BIG-IP Access Policy Manager&nbsp;to the latest patched version.</p>
<ul><li>17.5.x upgrade to 17.5.1.3 or later</li><li>17.1.x upgrade to 17.1.3 or later</li><li>16.1.x upgrade to 16.1.6.1 or later</li><li>15.1.x upgrade to 15.1.10.8 or later</li></ul>
<ul></ul>
<ul></ul>
<h2>How do I find F5 Big-IP assets with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/software" rel="noopener" target="_blank">Software Inventory</a>,&nbsp;use the following query to locate potentially affected&nbsp;systems:</p>
<pre><code>vendor:=F5 AND product:="BIG-IP Access Policy Manager"</code></pre>
<hr>
<h2>October 2025: CISA Emergency Directive</h2>
<p>On October 15, 2025, CISA <a href="https://www.cisa.gov/news-events/alerts/2025/10/15/cisa-directs-federal-agencies-mitigate-vulnerabilities-f5-devices" target="_blank">issued</a> an emergency directive to mitigate vulnerabilities on F5 Big-IP appliances.&nbsp;According to the directive, the general guidance is to "inventory F5 BIG-IP products, evaluate if the networked management interfaces are accessible from the public internet, and apply newly released updates from F5."<br></p>
<h2>What is F5 Big-IP?</h2>
<p>F5 Big-IP appliances provide application delivery and security services to enhance security and improve performance of&nbsp;network applications.</p>
<h2>What is the impact?</h2>
<p>According to the directive, "a nation-state affiliated actor compromised F5 systems and exfiltrated data, including portions of the Big-IP proprietary source code and vulnerability information". The emergency directive specifically calls out&nbsp;"all instances of F5 BIG-IP hardware devices and F5OS, BIG-IP TMOS, Virtual Edition, BIG-IP Next, BIG-IP IQ software, and BNK / CNF". Organizations should apply the&nbsp;<a href="https://my.f5.com/manage/s/article/K000156572" title="latest vendor updates" data-entity-type="external" rel="noopener" target="_blank">latest vendor updates</a>&nbsp;and disconnect any affected publicly-connected&nbsp;devices that have reached their end-of-support date.</p>
<p>For more information, refer directly to the <a href="https://www.cisa.gov/news-events/alerts/2025/10/15/cisa-directs-federal-agencies-mitigate-vulnerabilities-f5-devices" target="_blank">CISA emergency directive</a>.&nbsp;<br></p>
<ul></ul>
<h2>How do I find&nbsp;F5 Big-IP assets with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>,&nbsp;use the following query to locate potentially affected&nbsp;systems:</p>
<pre><code>os:="F5%"</code></pre>
<hr>
<h2>May 2022:&nbsp;CVE-2022-1388</h2>
<p>In May 2022, technology vendor F5 published information on <a href="https://support.f5.com/csp/article/K55879220" rel="noopener" target="_blank">over 40 vulnerabilities</a>, mostly affecting their BIG-IP line of products. While these vulnerabilities included a mix of types and severities, a particular authentication bypass vulnerability that affected all BIG-IP modules was concerning enough that CISA specifically <a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/04/f5-releases-security-advisories-addressing-multiple" rel="noopener" target="_blank">called it out</a>.</p>
<h3>What was the impact?</h3>
<p>Known as <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1388" rel="noopener" target="_blank">CVE-2022-1388</a> (CVSS “critical” score of 9.8), a vulnerable BIG-IP target could allow for <a href="https://support.f5.com/csp/article/K55879220" rel="noopener" target="_blank">takeover by an unauthenticated attacker</a> via network connection or management port. Once connected to a vulnerable target, successful exploitation was achieved via a crafted HTTP request sent by the attacker, bypassing iControl REST authentication and providing the attacker full access and control. F5 did add that <a href="https://support.f5.com/csp/article/K23605346" rel="noopener" target="_blank">there was no data plane exposure</a> via exploitation of this vulnerability, rather "this being a control plane issue only".</p>
<h3>Were updates available?</h3>
<p>Patches were made available by F5 for <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1388" rel="noopener" target="_blank">CVE-2022-1388</a>, as well for many of the other vulnerabilities included in their <a href="https://support.f5.com/csp/article/K55879220" rel="noopener" target="_blank">security advisory overview</a>. Guidance also included mitigation steps if immediate or near-term patching was not an option.<br></p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/sharepoint/</id>
            <title>SharePoint Server RCE vulnerability: Find impacted assets</title>
            <published>2025-07-20T20:12:00-04:00</published>
            <updated>2026-03-26T13:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/sharepoint/" />
            <summary type="html">The SharePoint RCE (CVE-2026-20963) now has a critical 9.8 CVSS and is being exploited in the wild. Here’s how to find affected assets on your network.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Microsoft SharePoint Server vulnerability:&nbsp;CVE-2026-20963</h2>
<p>On January 13, 2026, Microsoft <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20963" target="_blank">disclosed</a> a remote code execution vulnerability,  designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20963" target="_blank">CVE-2026-20963</a>, in Microsoft SharePoint. The vulnerability is due to  deserialization of untrusted data in Microsoft SharePoint which allows a remote, unauthenticated attacker attacker to execute code over a network.</p>
<p>  While initially released with a CVSS score of 8.8, the score was updated to 9.8  on March 17, 2026.<br><br>  This vulnerability is known to be exploited in the wild and was <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20963" target="_blank">added</a> to the  CISA.gov Known Exploited Vulnerabilities (KEV) list on March 18, 2026.</p><ul></ul>
<p>The following versions are affected:</p>
<ul><li>SharePoint Enterprise Server 2016 before version 16.0.5535.1001</li><li>SharePoint Server 2019 before version 16.0.10417.20083</li><li>SharePoint Server Subscription Edition before version 16.0.19127.20442</li></ul>
<ul></ul>
<ul></ul>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow a remote, unauthenticated attacker&nbsp;to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2>Are any updates or workarounds available?</h2>
<p>Upgrade affected versions of SharePoint Server to the latest patched version.</p>
<ul><li><p>SharePoint Enterprise Server 2016 version 16.0.5535.1001 or later</p></li><li><p>SharePoint Server 2019 version 16.0.10417.20083 or later</p></li><li><p>SharePoint Server Subscription Edition version 16.0.19127.20442 or later</p></li></ul>
<ul></ul>
<h2>How do I find Microsoft SharePoint Server installations with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Microsoft AND (
  (product:="SharePoint Server 2016" AND (version:&gt;=16.0 AND version:&lt;16.0.5535.1001)) OR
  (product:="SharePoint Server 2019" AND (version:&gt;=16.0 AND version:&lt;16.0.10417.20083)) OR
  (product:="SharePoint Server Subscription Edition" AND (version:&gt;=16.0 AND version:&lt;16.0.19127.20442))
  ) AND NOT version:=""</code></pre>
<hr>
<h2>July 2025 (Multiple CVEs)</h2>
<p>Microsoft has <a href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/" rel="noopener" target="_blank">disclosed two vulnerabilities</a> in certain versions of&nbsp;on-premises Microsoft SharePoint Server:</p>
<ul><li>SharePoint Server deserializes untrusted data without sufficiently ensuring that the resulting data will be valid resulting in a remote code execution (RCE) vulnerability. The vulnerability allows an unauthenticated adversary to remotely execute code on the vulnerable server.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-53770" target="_blank">CVE-2025-53770</a> and has been rated <em>critical</em> with a CVSS score of <strong>9.8</strong>.&nbsp;This vulnerability is a variant of a remote code execution vulnerability designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-49704" target="_blank">CVE-2025-49704</a> that was patched earlier this month.&nbsp;There is evidence that this vulnerability <strong>is being actively exploited in the wild</strong>.</li><li>SharePoint Server improperly limits a pathname to a restricted directory allowing path traversal in Microsoft Office SharePoint resulting in a spoofing vulnerability. The vulnerability allows an authorized adversary to perform spoofing over a network.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-53771" target="_blank">CVE-2025-53771</a> and has been rated <em>medium</em>&nbsp;with a CVSS score of <strong>6.3</strong>.&nbsp;This vulnerability is a variant of a spoofing vulnerability designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-49706" target="_blank">CVE-2025-49706</a> that was patched earlier this month.</li></ul>
<p>The following versions are affected</p>
<ul><li>Microsoft SharePoint Enterprise Server 2016 versions currently unknown</li><li>Microsoft SharePoint Server 2019 versions currently unknown</li><li>Microsoft SharePoint Server Subscription Edition versions 16.0.0 prior to 16.0.18526.20508</li></ul>
<ul></ul>
<ul></ul>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2>Are any updates or workarounds available?</h2>
<p>As of 7/20/2025 security updates are available for Microsoft SharePoint Server Subscription Edition. A patch is&nbsp;currently unavailable for other affected versions, but Microsoft is actively working on a security update.<br></p>
<ul><li>Mitigate attacks against on-premises SharePoint Server environments by configuring the Windows <a href="https://learn.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal" target="_blank">Antimalware Scan Interface</a> (AMSI) integration in SharePoint and deploying Defender AV on all SharePoint servers. This should stop an unauthenticated adversary from successfully exploiting the vulnerability.</li><li>Rotate SharePoint Server ASP.NET machine keys.</li><li><p>Upgrade affected systems to the new versions when a patch is available.</p></li></ul>
<ul></ul>
<h2>How do I find Microsoft SharePoint Server installations with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:="Microsoft" AND product:="SharePoint Server%"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/apple-devices/</id>
            <title>Apple iOS vulnerabilities (DarkSword exploit): Find impacted</title>
            <published>2026-03-24T00:00:00-04:00</published>
            <updated>2026-03-24T00:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/apple-devices/" />
            <summary type="html">Several vulnerabilities affecting Apple&#039;s device ecosystem have been weaponized into an exploit chain known as DarkSword. These vulnerabilities enable remote code execution and payload deployment when a user visits a malicious website.﻿﻿﻿</summary>
                            <author>
                    <name>Tom Sellers</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Apple device exploitation</h2>
<p>Several vulnerabilities affecting Apple's device ecosystem have been weaponized into an exploit chain known as <a href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain" target="_blank">DarkSword</a>. These vulnerabilities enable remote code execution and payload deployment when a user visits a malicious website.</p>
<p>This exploit chain is known to have been used by multiple commercial surveillance vendors and suspected state-sponsored actors. In March 2026, the chain and related exploit kit tooling was leaked publicly and is now available for use by a wider range of malicious actors.<br><br>While the exploit kit was used to attack iOS, the vulnerabilities are known to have existed in iPadOS, macOS, tvOS, watchOS, and visionOS.<br><br>There are 6 vulnerabilities known to be part of the DarkSword exploit chain:<br></p>
<ul><li><a href="https://www.cve.org/cverecord?id=CVE-2025-14174" target="_blank">CVE-2025-14174</a> - Memory corruption vulnerability in ANGLE, patched in 18.7.3 and 26.2<a href="https://www.cve.org/cverecord?id=CVE-2025-31277" target="_blank"><br></a></li><li><a href="https://www.cve.org/cverecord?id=CVE-2025-31277" target="_blank">CVE-2025-31277</a> - Memory corruption vulnerability in JavaScriptCore, patched in 18.6</li><li><a href="https://www.cve.org/cverecord?id=CVE-2025-43510" target="_blank">CVE-2025-43510</a> - Memory management vulnerability in the iOS kernel, patched in 18.7.2 and 26.1</li><li><a href="https://www.cve.org/cverecord?id=CVE-2025-43520" target="_blank">CVE-2025-43520</a> - Memory corruption vulnerability in the iOS kernel, patched in 18.7.2 and 26.1</li><li><a href="https://www.cve.org/cverecord?id=CVE-2025-43529" target="_blank">CVE-2025-43529</a> - Memory corruption vulnerability in JavaScriptCore, patched in 18.7.3 and 26.2</li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-20700" target="_blank">CVE-2026-20700</a> - User-mode Pointer Authentication Code (PAC) bypass in dyld, patched in 26.3</li></ul>
<h2>What is the impact?</h2>
<p>Upon successful exploitation of the exploits above the attacker is able to compromise the target device and install backdoor software.</p>
<h2>Are updates or workarounds available?</h2>
<p>Vulnerable devices should be upgraded 26.3 or later. If the device cannot be updated to 26.3, update to 18.7.3 or later. Both of these updates were released in Feb 2026.<br><br>If the device cannot be updated then Lockdown mode can be enabled to mitigate the risk of these vulnerabilities. Lockdown mode is a highly restrictive security mode that may cause some functionality to be limited.</p>
<h2>How do I find potentially vulnerable Apple devices with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate assets running potentially vulnerable versions of the affected products:</p>
<pre><code>(os:="apple ios" OR os:="apple ipados" OR os:="apple tvos" OR os:="apple macos" OR os:="apple watchos" OR os:="apple visionos") AND osversion:&gt;0 AND ((osversion:&gt;="26.0" AND osversion:&lt;"26.3") OR (osversion:&gt;="18.0" AND osversion:&lt;"18.7.3"))</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/citrix-netscaler/</id>
            <title>NetScaler ADC &amp; Gateway vulnerabilities: Find impacted systems</title>
            <published>2023-07-21T12:30:00-04:00</published>
            <updated>2026-03-23T12:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/citrix-netscaler/" />
            <summary type="html">Citrix has published a security bulletin documenting multiple vulnerabilities impacting customer-managed installs of NetScaler ADC and NetScaler Gateway.</summary>
                            <author>
                    <name>Tom Sellers</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Citrix NetScaler vulnerabilities:&nbsp;CVE-2026-3055,&nbsp;CVE-2026-4368</h2>
<p>Citrix has published <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300" target="_blank">Security Bulletin CTX696300</a>, documenting multiple vulnerabilities that impact customer-managed installations of NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). In certain gateway and load-balancing configurations, these devices are vulnerable to multiple vulnerabilities:</p>
<ul><li><a href="https://www.cve.org/cverecord?id=CVE-2026-3055" rel="noopener" target="_blank">CVE-2026-3055</a> -&nbsp;Insufficient input validation leading to memory overread. This vulnerability is considered <em>critical</em> with a CVSS score of <strong>9.3</strong>.<br></li><li><a href="https://www.cve.org/cverecord?id=CVE-2026-4368" rel="noopener" target="_blank">CVE-2026-4368</a> - A race condition could lead to user session mixup. This vulnerability is considered severe, with a CVSS score of<strong> 7.7</strong>.</li></ul>
<ul></ul>
<p>The following versions are affected:</p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-66.59</li><li>NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-62.23</li><li>NetScaler ADC FIPS and NDcPP BEFORE 13.1-37.262</li></ul>
<p><em>Note</em>: Citrix ADC / NetScaler 13.0 and prior have reached end of life. Citrix  has made no statements regarding the vulnerabilities in these versions, but  they are possibly affected as well.</p>
<ul></ul>
<ul></ul>
<h2>What is the impact?</h2>
<p>Citrix has not published guidance on the impact of these vulnerabilities. Given the values that they have provided for the CVSS score it likely that successful exploitation of these vulnerabilities could result in full system compromise.<br></p>
<h2>Are updates or workarounds available?</h2>
<p>Citrix recommends upgrading affected systems to one of the following versions as soon as possible:<br></p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1-66.59 and later releases</li><li>NetScaler ADC and NetScaler Gateway 13.1-62.23 and later releases of 13.1</li><li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1.37.262 and later releases of 13.1-FIPS and 13.1-NDcPP</li></ul>
<ul></ul>
<h2>How do I find potentially vulnerable systems with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:="Citrix NetScaler%" OR hw:="Citrix ADC%" OR os:="Citrix NetScaler%" OR os:="Citrix ADC"</code></pre>
<hr>
<h2>September 2025 (CVE-2025-7775,&nbsp;CVE-2025-7776,&nbsp;CVE-2025-8424)</h2>
<p>Citrix has published <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938" target="_blank">Security Bulletin CTX694938</a>, documenting multiple vulnerabilities that impact customer-managed installations of NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). In certain gateway and load-balancing configurations, these devices are vulnerable to multiple vulnerabilities:</p>
<ul><li><a href="https://www.cve.org/cverecord?id=CVE-2025-7775" rel="noopener" target="_blank">CVE-2025-7775</a>&nbsp;- A memory corruption vulnerability that could allow a remote attacker to execute arbitrary code on the system. This vulnerability is considered&nbsp;<em>critical</em> with a CVSS score of&nbsp;<strong>9.2</strong>.<br></li><li><a href="https://www.cve.org/cverecord?id=CVE-2025-7776" rel="noopener" target="_blank">CVE-2025-7776</a>&nbsp;- A memory corruption vulnerability that could allow a remote attacker to create a denial-of-service condition. This vulnerability is considered severe, with a CVSS score of<strong> 8.8</strong>.</li><li><a href="https://www.cve.org/cverecord?id=CVE-2025-8424" rel="noopener" target="_blank">CVE-2025-8424</a>&nbsp;- An improper authentication vulnerability that could allow a remote attacker to gain access to sensitive system resources without proper authorization. This vulnerability is considered severe, with a CVSS score of&nbsp;<strong>8.7</strong>.</li></ul>
<p>There is evidence that CVE-2025-775&nbsp;<strong>is being actively exploited in the wild</strong>.</p>
<ul></ul>
<p>The following versions are affected:</p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1  before&nbsp;14.1-47.48</li><li>NetScaler ADC and NetScaler Gateway 13.1  before 13.1-59.22</li><li>NetScaler ADC 13.1-FIPS and NDcPP before 13.1-37.241-FIPS and NDcPP</li><li>NetScaler ADC 12.1-FIPS and NDcPP before 12.1-55.330-FIPS and NDcPP</li></ul>
<ul></ul>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability could allow an adversary to execute arbitrary code on the vulnerable system, potentially leading to total system compromise or a denial-of-service condition.<br></p>
<h2>Are updates or workarounds available?</h2>
<p>Citrix recommends upgrading affected systems to one of the following versions as soon as possible:<br></p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1-47.48 and later releases</li><li>NetScaler ADC and NetScaler Gateway 13.1-59.22 and later releases of 13.1</li><li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.241 and later releases of 13.1-FIPS and 13.1-NDcPP</li><li>NetScaler ADC 12.1-FIPS and 12.1-NDcPP 12.1-55.330 and later releases of 12.1-FIPS and 12.1-NDcPP</li></ul>
<ul></ul>
<h2>How do I find potentially vulnerable systems with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:="Citrix NetScaler%" OR hw:="Citrix ADC%" OR os:="Citrix NetScaler%" OR os:="Citrix ADC"</code></pre>
<hr>
<h2>June 2025 (CVE-2025-6543)</h2>
<p>Citrix published <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788" target="_blank">Security Bulletin CTX694788</a> that documented&nbsp;a vulnerability that impacts customer-managed installations of NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)&nbsp;configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or Authentication, Authorization&nbsp;and Auditing (AAA) virtual server are affected by a memory overflow vulnerability. This vulnerability has been designated <a href="https://www.cve.org/cverecord?id=CVE-2025-6543" target="_blank">CVE-2025-6543</a> and has been rated <em>critical</em> with a CVSS score of <strong>9.2</strong>.</p>
<p>There is evidence that this vulnerability <strong>is being actively exploited in the wild</strong>.<br></p>
<ul></ul>
<p>The following versions are affected</p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1 prior to 14.1-47.46</li><li>NetScaler ADC and NetScaler Gateway 13.1 prior to 13.1-59.19</li><li>NetScaler ADC 13.1-FIPS and NDcPP prior to 13.1-37.236-FIPS and NDcPP</li></ul>
<h3>What is the impact?</h3>
<p>Successful exploitation of this&nbsp;vulnerability&nbsp;could allow an adversary to make unintended changes to control flow, potentially allowing remote code execution (RCE) or causing denial-of-service (DoS).<br></p>
<h3>Are updates or workarounds available?</h3>
<p>Citrix recommends upgrading affected systems to one of the following versions as soon as possible:<br></p>
<ul><li>NetScaler ADC and NetScaler Gateway to version 14.1-47.46 and later releases</li><li>NetScaler ADC and NetScaler Gateway to version 13.1-59.19 and later releases of 13.1</li><li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP to version 13.1-37.236 and later releases of 13.1-FIPS and 13.1-NDcPP</li></ul>
<p>NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are end-of-life (EOL) and no longer supported. It is recommended to upgrade to one of the currently supported versions that address the vulnerabilities.<br></p>
<ul></ul>
<h3>How do I find potentially vulnerable systems with runZero?</h3>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:="Citrix NetScaler%" OR hw:="Citrix ADC%" OR os:="Citrix NetScaler%" OR os:="Citrix ADC"</code></pre>
<hr>
<h2>June 2025 (CVE-2025-5777, CVE-2025-5349)</h2>
<p>Citrix published <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420" target="_blank">Security Bulletin CTX693420</a> that documented two vulnerabilities that impact customer-managed installations of&nbsp;NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix&nbsp;Gateway).&nbsp;There is evidence that one of the vulnerabilities, designated by <a href="https://www.cve.org/CVERecord?id=CVE-2025-47812" target="_blank"></a><a href="https://www.cve.org/cverecord?id=CVE-2025-5777" target="_blank">CVE-2025-5777</a>, <strong>is being actively exploited in the wild</strong>.</p>
<ul><li>NetScaler configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or Authentication, Authorization and Auditing (AAA) virtual server are at risk of an insufficient input validation vulnerability leading to memory out-of-bounds read in the NetScaler Management Interface which could allow access to secret values, bypass of protection mechanism, DoS or other unexpected results. This vulnerability has been designated&nbsp;<a href="https://www.cve.org/cverecord?id=CVE-2025-5777" target="_blank">CVE-2025-5777</a> and has been rated <em>critical</em><strong>&nbsp;</strong>with a CVSS score of <strong>9.3</strong>.</li><li>An attacker with access to the NetScaler appliance IP (NSIP) address, Cluster Management IP (CLIP) address or local Global Server Load Balancing (GSLB) Site IP (GSLBIP) address could utilize an improper access control vulnerability to gain access the the NetScaler Management Interface and its management functions. This vulnerability has been designated&nbsp;<a href="https://www.cve.org/cverecord?id=CVE-2025-5349" target="_blank">CVE-2025-5349</a>&nbsp;and has been rated  <em>high</em> with a CVSS score of <strong>8.7</strong>.</li></ul>
<p>The following versions are affected</p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1 prior to 14.1-43.56</li><li>NetScaler ADC and NetScaler Gateway 13.1 prior to 13.1-58.32</li><li>NetScaler ADC 13.1-FIPS and NDcPP prior to 13.1-37.235-FIPS and NDcPP</li><li>NetScaler ADC 12.1-FIPS prior to 12.1-55.328-FIPS</li></ul>
<h3>What is the impact?</h3>
<p>Successful exploitation of these vulnerabilities could&nbsp;allow an attacker to&nbsp;obtain sensitive information,&nbsp;potentially disrupt system operations and cause a denial-of-service, or gain&nbsp;control over the NetScaler Management Interface and its&nbsp;management functions&nbsp;potentially leading to system compromise.</p>
<h3>Are updates or workarounds available?</h3>
<p>Citrix recommends upgrading affected systems&nbsp;to one of the following versions as soon as possible:<br></p>
<ul><li>NetScaler ADC and NetScaler Gateway to version 14.1-43.56 and later releases</li><li>NetScaler ADC and NetScaler Gateway to version 13.1-58.32 and later releases of 13.1</li><li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP to version 13.1-37.235 and later releases of 13.1-FIPS and 13.1-NDcPP</li><li>NetScaler ADC 12.1-FIPS to version 12.1-55.328 and later releases of 12.1-FIPS</li></ul>
<p>NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 are end-of-life (EOL) and no longer supported.&nbsp;It is recommended to upgrade to one of the currently supported versions that address the vulnerabilities.<br></p>
<ul></ul>
<h3>How do I find potentially vulnerable systems with runZero?</h3>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:="Citrix NetScaler%" OR hw:="Citrix ADC%" OR os:="Citrix NetScaler%" OR os:="Citrix ADC"</code></pre>
<hr>
<h2>February 2025 (CVE-2024-12284)</h2>
<p>Citrix issued a <a href="https://support.citrix.com/s/article/CTX692579-netscaler-console-and-netscaler-agent-security-bulletin-for-cve202412284?language=en_US" target="_blank">security bulletin&nbsp;</a>for the on-premise NetScaler Console (formerly NetScaler ADM)&nbsp;and NetScaler Agent products. <a href="https://www.cve.org/cverecord?id=CVE-2024-12284" target="_blank">CVE-2024-12284</a> is rated <strong>high</strong> with a CVSS score of 8.8, which could lead to privilege escalation.<br></p>
<h3>What is the impact?</h3>
<p>For customers running an on-premise installation of NetScaler Console with NetScaler Console Agents deployed, an authenticated remote attacker could "execute commands without additional authorization". NetScaler <a href="https://www.netscaler.com/blog/news/cve-2024-12284-high-severity-security-update-for-netscaler-console/" target="_blank">emphasized</a> that an attacker must be authenticated, which limits the potential impact.&nbsp;</p>
<h3>Are updates or workarounds available?</h3>
<p>Citrix recommends upgrading to one of the following versions as soon as possible:<br></p>
<ul><li>NetScaler Console 14.1-38.53 and later releases</li><li>NetScaler Console 13.1-56.18 and later releases of 13.1</li><li>NetScaler Agent 14.1-38.53 and later releases</li><li>NetScaler Agent 13.1-56.18 and later releases of 13.1</li></ul>
<h3>How do I find potentially vulnerable systems with runZero?</h3>
<p>From the <a href="https://console.runzero.com/inventory" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>_asset.protocol:http AND protocol:http AND html.title:="NetScaler Console"</code></pre>
<hr>
<h2>June 2024: (CVE-2023-6548, CVE-2023-6549)</h2>
<p>In January Citrix published <a href="https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" target="_blank">Security Bulletin&nbsp;CTX584986</a> that documented two vulnerabilities that impact NetScaler ADCs and Gateways. The most severe of these, <a href="https://www.cve.org/cverecord?id=CVE-2023-6549" target="_blank">CVE-2023-6549</a>, was discovered and documented by <a href="https://bishopfox.com/blog/netscaler-adc-and-gateway-advisory" target="_blank">BishopFox</a>.</p>
<p><a href="https://www.cve.org/cverecord?id=CVE-2023-6549" target="_blank">CVE-2023-6549</a> is rated&nbsp;<strong>high</strong> with a CVSS score of 8.2. This vulnerability is&nbsp;an unauthenticated out-of-bounds memory read which could be exploited to collect information from the appliance’s process memory, including HTTP request bodies. While serious, this is not thought to be a bad as the <a href="https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed" target="_blank">Citrix Bleed</a> vulnerability due to the new vulnerability being less likely to leak high risk data.</p>
<p><a href="https://www.cve.org/cverecord?id=CVE-2023-6548" target="_blank">CVE-2023-6548</a> is rated&nbsp;<strong>medium</strong> with a CVSS score of 5.5. This vulnerability is a code injection flaw that allows remote code injection by&nbsp;an authenticated attacker (with low privileged) with access to a management interface on one of the&nbsp;NSIP, CLIP or SNIP interfaces.<br></p>
<h3>What is the impact?</h3>
<p>The vulnerability would enable an attacker to remotely obtain sensitive information from a NetScaler appliance configured as a Gateway or AAA virtual server via a very commonly connected Web interface, and without requiring authentication.  <a href="https://www.cve.org/cverecord?id=CVE-2023-6549" target="_blank">CVE-2023-6549</a> is nearly identical to the Citrix Bleed vulnerability (CVE-2023-4966), except it is less likely to return highly sensitive information to an attacker.&nbsp;<a href="https://www.cve.org/cverecord?id=CVE-2023-6548" target="_blank">CVE-2023-6548</a> could be used by an attacker with credentials to execute code.</p>
<h3>Are updates or workarounds available?</h3>
<p>Citrix recommends limiting access to management interfaces as well as upgrading to one of the following versions:<br></p>
<ul><li>NetScaler ADC and NetScaler Gateway 14.1-12.35 and later releases</li><li>NetScaler ADC and NetScaler Gateway  13.1-51.15 and later releases of 13.1</li><li>NetScaler ADC and NetScaler Gateway 13.0-92.21 and later releases of 13.0</li><li>NetScaler ADC 13.1-FIPS 13.1-37.176 and later releases of 13.1-FIPS </li><li>NetScaler ADC 12.1-FIPS 12.1-55.302 and later releases of 12.1-FIPS </li><li>NetScaler ADC 12.1-NDcPP 12.1-55.302 and later releases of 12.1-NDcPP</li></ul>
<p><strong>Warning:&nbsp;</strong>NetScaler ADC and NetScaler Gateway version 12.1 is now End Of Life (EOL). Citrix advises&nbsp;customers to upgrade their appliances to one supported version that addresses the vulnerabilities.</p>
<h3>How do I find potentially vulnerable systems with runZero?</h3>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>product:netscaler OR product:"citrix adc"</code></pre>
<hr>
<h2>July 2023 (CVE-2023-3519)</h2>
<p>In July, 2023,&nbsp;Citrix alerted customers to <a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467" rel="noopener" target="_blank">three vulnerabilities</a> in its NetScaler ADC and NetScaler Gateway products. Surfaced by <a href="https://www.resillion.com/wp-content/uploads/2023/07/Resillion-Citrix-Vulnerability-Report-1.pdf" rel="noopener" target="_blank">researchers at Resillion</a>, these vulnerabilities included a critical flaw currently being exploited in the wild to give attackers unauthenticated remote code execution on vulnerable NetScaler targets (CVE-2023-3519). Compromised organizations included a <a href="https://www.bleepingcomputer.com/news/security/netscaler-adc-bug-exploited-to-breach-us-critical-infrastructure-org/" rel="noopener" target="_blank">critical infrastructure entity in the U.S.</a>, where attackers gained access the previous month and successfully exfiltrated Active Directory data. And at the time of publication, there appear to be <a href="https://dashboard.shadowserver.org/statistics/combined/tree/?day=2023-07-20&source=http_vulnerable&source=http_vulnerable6&tag=cve-2023-3519%2B&geo=all&data_set=count&scale=log" rel="noopener" target="_blank">over 5,000 public-facing vulnerable NetScaler targets</a>.</p>
<h3>What was the impact?</h3>
<p>The three reported vulnerabilities affecting NetScaler ADC and Gateway products were of various types, and each include different preconditions required for exploitation:</p>
<ul><li>Unauthenticated remote code execution (<a href="https://www.cve.org/cverecord?id=CVE-2023-3519" rel="noopener" target="_blank">CVE-2023-3519</a>; CVSS score 9.8 - "critical")<ul><li>Successful exploitation required the NetScaler target be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, or RDP Proxy) or "authentication, authorization, and auditing" (AAA) virtual server.</li></ul></li><li>Reflected cross-site scripting (XSS) (<a href="https://www.cve.org/cverecord?id=CVE-2023-3466" target="_blank">CVE-2023-3466</a>; CVSS score 8.3 - "high")<ul><li>Successful exploitation required the victim to be on the same network as the vulnerable NetScaler target when the victim loaded a malicious link (planted by the attacker) in their web browser.</li></ul></li><li>Privilege escalation to root administrator (nsroot) (<a href="https://www.cve.org/cverecord?id=CVE-2023-3467" target="_blank">CVE-2023-3467</a>; CVSS score 8.0 - "high")<ul><li>Successful exploitation required an attacker having achieved command-line access on a vulnerable NetScaler target.</li></ul></li></ul>
<p>U.S.-based <a href="https://www.cisa.gov/" rel="noopener" target="_blank">CISA</a>&nbsp;reported attackers exploiting CVE-2023-3519 to <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a" rel="noopener" target="_blank">install webshells used in further network exploration and data exfiltration</a>, causing CVE-2023-3519 to be added to CISA's <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank">Known Exploited Vulnerabilities Catalog</a>. Other common attacker goals, like establishing persistence, lateral movement, and malware deployment, were all potential outcomes following successful exploitation.<br></p>
<p>Citrix made <a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467" rel="noopener" target="_blank">patched firmware updates</a> available. Admins were advised to update older firmware on vulnerable NetScaler devices as soon as possible.</p>
<p>CISA also made additional information available around <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a" rel="noopener" target="_blank">indicators of compromise and mitigations</a>.</p>
<h3>How to find&nbsp;potentially vulnerable NetScaler instances with runZero</h3>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset inventory</a>, they used&nbsp;the following <a href="https://console.runzero.com/inventory?search=hw%3Anetscaler%20or%20os%3Anetscaler" rel="noopener" target="_blank">prebuilt query</a> to locate NetScaler instances on their&nbsp;network:</p>
<pre><code>hw:="Citrix NetScaler%" OR hw:="Citrix ADC%" OR os:="Citrix NetScaler%" OR os:="Citrix ADC"</code></pre>
<figure><img src="https://www.runzero.com/img/posts/netscaler-inventory-1.png" alt="NetScaler asset query" title="NetScaler asset query" data-image="h6re70fumq7m"></figure>
<p>Results from the above query should be triaged to verify they are affected ADC or Gateway products and if they are running updated firmware versions.</p>
<p>The following query could also be used&nbsp;in on the&nbsp;<a href="https://console.runzero.com/inventory/software?search=product%3Anetscaler" rel="noopener" target="_blank">Software</a> and <a href="https://console.runzero.com/inventory/services?search=product%3Anetscaler" rel="noopener" target="_blank">Services</a> inventory pages to locate NetScaler software:</p>
<pre><code>product:netscaler</code></pre>
<figure><img src="https://www.runzero.com/img/posts/netscaler-inventory-2.png" alt="NetScaler software query" title="NetScaler software query" data-image="k3zgfbklw4yg"></figure>
<p>Results from the above query should be triaged to verify they are affected ADC or Gateway products and if they are updated versions.</p>
<p>As always, any prebuilt queries are available from your <a href="https://console.runzero.com/queries" rel="noopener" target="_blank">runZero console</a>. Check out the documentation for other useful inventory <a href="https://help.runzero.com/docs/search-query-syntax/" rel="noopener" target="_blank">queries</a>.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/oracle-identity-manager/</id>
            <title>Oracle Identity Manager vulnerability: CVE-2026-21992</title>
            <published>2025-11-20T12:00:00-05:00</published>
            <updated>2026-03-20T18:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/oracle-identity-manager/" />
            <summary type="html">Oracle discloses a critical Fusion Middleware vulnerability allowing remote, unauthenticated takeover of Identity and Web Services Manager installations.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Oracle Identity Manager vulnerability: CVE-2026-21992</h2>
<p>Oracle has <a href="https://www.oracle.com/security-alerts/alert-cve-2026-21992.html" target="_blank">disclosed</a> a vulnerability in specific versions of its Identify Manager and&nbsp;Web Services Manager products,&nbsp;contained within the Oracle Fusion Middleware suite that, when exploited, may allow a remote, unauthenticated adversary to takeover vulnerable Oracle Identity Manager and Web Services Manager installations. This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21992" target="_blank">CVE-2026-21992</a> and has been rated <em>critical</em> with a CVSS score of <strong>9.8</strong>.<br></p>
<p><strong>The following versions are affected</strong></p>
<ul><li>Oracle Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0</li></ul>
<h2>What is Oracle Identity Manager?</h2>
<p>Oracle Identity Manager is a complete security platform that manages user lifecycles and provides secure access to enterprise resources. It automates user management across cloud and on-premises systems, enables secure sign-on with features like multi-factor authentication.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability can result in takeover of Oracle Identity Manager&nbsp;and Oracle Web Services Manager.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to upgrade affected versions of Oracle Identity Manager and Oracle Web Services Manager&nbsp;to the latest patched version as quickly as possible. Oracle has included&nbsp;<a href="https://support.oracle.com/support/?documentId=KB878741" target="_blank">patching instructions</a>&nbsp;on their website.</p>
<ul></ul>
<ul></ul>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Oracle AND (product:"Identity Manager" OR product:"Web Services Manager")</code></pre>
<hr>
<h2>November 2025:&nbsp;Oracle Identity Manager vulnerability: CVE-2025-61757</h2>
<p>Oracle has <a href="https://www.oracle.com/security-alerts/cpuoct2025.html" target="_blank">disclosed</a> a vulnerability in certain versions of its Identify Manager contained within the Oracle Fusion Middleware suite that, when exploited, may allow a remote, unauthenticated adversary to achieve arbitrary remote code execution (RCE). This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-61757" target="_blank">CVE-2025-61757</a> and has been rated <em>critical</em> with a CVSS score of <strong>9.8</strong>.</p>
<p>There is evidence that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<p><strong>The following versions are affected</strong></p>
<ul><li>Oracle Identity Manager versions 12.2.1.4.0 and 14.1.2.1.0</li></ul>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary commands on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to upgrade affected versions of Oracle Identity Manager to the latest patched version as quickly as possible.</p>
<ul></ul>
<ul></ul>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:="Oracle" product:="Identity Manager"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/langflow/</id>
            <title>Langflow Flodrix vulnerability CVE-2026–33017: Find impacted assets</title>
            <published>2025-05-06T18:14:00-04:00</published>
            <updated>2026-03-20T13:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/langflow/" />
            <summary type="html">A critical vulnerability found in Langflow is actively being exploited. Here&#039;s how to find potentially vulnerable installs.</summary>
                            <author>
                    <name>Tom Sellers</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Langflow vulnerability:&nbsp;CVE-2026–33017</h2>
<p>A vulnerability has been discovered in <a href="https://www.langflow.org/" rel="noopener" target="_blank">Langflow</a>.&nbsp;</p>
<p>This vulnerability, designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2026-33017" target="_blank">CVE-2026-33017</a>&nbsp;has a CVSS score of <strong>9.3</strong>&nbsp;(<strong>critical</strong>). Exploiting this vulnerability allows a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.</p>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<p><strong>The following versions are affected</strong></p>
<ul><li>All versions prior to 1.8.2</li></ul>
<h2>What is Langflow?</h2>
<p>Langflow is a popular,&nbsp;open-source&nbsp;tool for building and deploying AI-powered agents and workflows.<br></p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system with the privileges of the Langflow process. This vulnerability is remotely exploitable&nbsp;without authentication.</p>
<h2>Are updates available?</h2>
<p>The Langflow project has <a href="https://github.com/langflow-ai/langflow/releases/tag/1.8.2" rel="noopener" target="_blank">released version 1.8.2</a> to address this vulnerability and urges all users to upgrade to that or a later version as quickly as possible.</p>
<h2>How do I find potentially vulnerable Langflow installations with runZero?</h2>
<p>Vulnerable devices can be found by navigating to the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software Inventory</a> and using the following query:</p>
<pre><code>vendor:=Langflow AND product:=Langflow AND (version:&gt;0 AND version:&lt;1.8.2)</code></pre>
<hr>
<h2>June 2025: Langflow vulnerability (CVE-2025-3248)</h2>
<p>A vulnerability has been discovered in&nbsp;<a href="https://www.langflow.org/" rel="noopener" target="_blank">Langflow</a>, a popular framework for building AI workflows. This vulnerability, designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-3248" rel="noopener" target="_blank">CVE-2025-3248</a>&nbsp;has a CVSS score of <strong>9.8</strong> (<strong>critical</strong>). Successfully exploiting this vulnerability would allow a remote, unauthenticated attacker to execute arbitrary code on the vulnerable system.<br></p>
<p>Note that CISA has indicated that there is evidence this vulnerability is being&nbsp;<em>exploited in the wild</em>.<br></p>
<p><strong>Update</strong>: As of June 17th, 2025, there is evidence that this vulnerability is actively being exploited as part of the&nbsp;Flodrix botnet.&nbsp;Trend Micro has <a href="https://www.trendmicro.com/en_us/research/25/f/langflow-vulnerability-flodric-botnet.html" target="_blank">published a report</a>&nbsp;detailing an&nbsp;active campaign that utilizes an open-source proof of concept (PoC)&nbsp;exploit for&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-3248" rel="noopener" target="_blank">CVE-2025-3248</a>&nbsp;to initially compromise the system. The attacker then downloads and executes the Flodrix malware to establish&nbsp;communication with&nbsp;the command and control (C&C) server for the&nbsp;Flodrix botnet.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system with the privileges of the Langflow process. This vulnerability is exploitable remotely and without authentication.</p>
<h2>Are updates available?</h2>
<p>The Langflow project has&nbsp;<a href="https://github.com/langflow-ai/langflow/releases/tag/1.3.0" rel="noopener" target="_blank">released version 1.3.0</a>&nbsp;to address this vulnerability&nbsp;and urges all users to upgrade to that or a later version as quickly as possible.</p>
<h2>How do I find potentially vulnerable Langflow installations with runZero?</h2>
<p>Vulnerable devices can be found by navigating to the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software Inventory</a> and using the following query:</p>
<pre><code>_asset.protocol:http AND product:Langflow AND (version:&gt;0 AND version:&lt;1.3.0)</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/k8s-ingress-nginx-controller/</id>
            <title>Kubernetes Ingress-NGINX Controller vulnerabilities: find affected</title>
            <published>2026-02-03T12:01:00-05:00</published>
            <updated>2026-03-19T17:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/k8s-ingress-nginx-controller/" />
            <summary type="html">A configuration injection vulnerability was fixed in the Kubernetes Ingress-NGINX controller software. Here&#039;s how to find impacted assets.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Kubernetes Ingress-NGINX Controller vulnerabilities</h2>
<p>A configuration injection&nbsp;vulnerability was discovered and&nbsp;<a href="https://github.com/kubernetes/kubernetes/issues/137893" target="_blank">fixed</a> in the Kubernetes Ingress-NGINX controller software.</p>
<ul><li>The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-4342" target="_blank">CVE-2026-4342</a> and has been rated <em><em>high</em></em> with a CVSS score of<strong> 8.8</strong>.</li></ul>
<p><strong>The following versions are affected</strong></p>
<ul><li>Ingress-NGINX controller versions through v1.13.9 (exclusive)</li><li>Ingress-NGINX controller versions through v1.14.5 (exclusive)</li><li>Ingress-NGINX controller versions through v1.15.1 (exclusive)</li></ul>
<h2>What is&nbsp;Kubernetes Ingress-NGINX?</h2>
<p>Kubernetes Ingress-NGINX controller provides reverse proxy and load balancing to Kubernetes services, providing an&nbsp;HTTP/HTTPS gateway to cluster resources.</p>
<h2>What's the impact?</h2>
<p dir="ltr">Successful exploitation could&nbsp;lead to arbitrary code execution in the context of the Ingress-NGINX controller,&nbsp;as well as&nbsp;disclosure of secrets accessible to the controller. The Ingress-NGINX controller can access all cluster-wide&nbsp;secrets in its default configuration.</p>
<h2>Are updates or workarounds available?</h2>
<p dir="ltr">Users are encouraged to update to versions 1.13.9, 1.14.5, 1.15.1 or a later version.</p>
<h2>How to find potentially vulnerable Ingress-Nginx services with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/services" rel="noopener" target="_blank">Services Inventory</a>, use the following query to locate potentially vulnerable systems:</p>
<pre>(_asset.protocols:tls AND protocol:tls AND tls.issuer:="O=nil1" AND tls.subject:="O=nil2" AND tls.names:"%nginx%")</pre>
<hr>
<h2>February 2026: Kubernetes Ingress-NGINX Controller&nbsp;(CVE-2026-1580,&nbsp;CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514)</h2>
<p dir="ltr">Today, in a message from the Kubernetes Security Response Committee (SRC), users were notified of four vulnerabilities, which, if left exposed and unpatched, could be exploited to achieve remote code execution by unauthenticated attackers.</p>
<h2>What's the impact?</h2>
<p dir="ltr">Three of the vulnerabilities relate to validation and sanitation of user-controlled fields (<a href="https://www.cve.org/cverecord?id=CVE-2026-24512" rel="noopener" target="_blank">CVE-2026-24512</a>, <a href="https://www.cve.org/cverecord?id=CVE-2026-24513" target="_blank">CVE-2026-24513</a>, and <a href="https://www.cve.org/cverecord?id=CVE-2026-24514" rel="noopener" target="_blank">CVE-2026-24514</a>). Out of the three, CVE-2026-24513 is the most concerning, which potentially allows for an attacker to bypass the<em> auth-url </em>annotation if the backend service fails to honor the <em>X-Code </em>HTTP header. In addition, <a href="https://www.cve.org/cverecord?id=CVE-2026-1580" target="_blank">CVE-2026-1580</a> potentially allows for attackers to inject configuration into NGINX, leading to arbitrary code execution in the context of the Ingress-NGINX controller. Notably, the attack does appear to depend on a clear shot to the admission controller for the Ingress-NGINX controller, which itself is an optional component that allows for Kubernetes-homed services to be reached from the wider network.</p>
<p dir="ltr">Finally, it’s important to note that the very similarly-named <a href="https://github.com/nginx/kubernetes-ingress/" rel="noopener" target="_blank">NGINX Ingress controller</a> is <strong>not</strong> affected by these <a href="https://github.com/kubernetes/ingress-nginx" rel="noopener" target="_blank">Ingress-NGINX controller</a> vulnerabilities.</p>
<h2>Are updates or workarounds available?</h2>
<p dir="ltr">Users are advised to update to version 1.13.7, 1.14.3, or any later version as quickly as possible.</p>
<h2>How to find potentially vulnerable Ingress-Nginx services with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/services" rel="noopener" target="_blank">Services Inventory</a>, use the following query to locate potentially vulnerable systems:</p>
<pre>(_asset.protocols:tls AND protocol:tls AND tls.issuer:="O=nil1" AND tls.subject:="O=nil2" AND tls.names:"%nginx%")</pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/screenconnect/</id>
            <title>ScreenConnect vulnerability CVE-2026-3564: Find affected assets</title>
            <published>2024-02-21T11:13:00-05:00</published>
            <updated>2026-03-19T15:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/screenconnect/" />
            <summary type="html">ConnectWise released a security bulletin for an improper verification of cryptographic signature vulnerability found in the ScreenConnect software.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest ScreenConnect vulnerability:&nbsp;CVE-2026-3564</h2>
<p>ConnectWise released a<a href="https://www.connectwise.com/company/trust/security-bulletins/2026-03-17-screenconnect-bulletin" target="_blank"> security bulletin</a> for an improper verification of cryptographic signature vulnerability found in the ScreenConnect software.</p>
<p>The following versions are affected:</p>
<ul><li>ConnectWise ScreenConnect versions prior to 26.1</li></ul>
<p>This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-3564" rel="noopener" target="_blank">CVE-2026-3564</a> and has a CVSS score of <strong>9&nbsp;</strong>(<strong>critical</strong>).</p>
<h2>What is ConnectWise&nbsp;ScreenConnect?</h2>
<p>ConnectWise ScreenConnect provides remote desktop access for end-users and IT professionals for support, maintenance, <br>  or collaboration.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation can allow unauthorized access to ScreenConnect and unauthorized actions within the application, including privilege escalation in certain scenarios.&nbsp;Cloud installations are already patched.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible (within days). The latest available release for on-premise installations is 26.1.</p>
<h2>How do I find vulnerable ScreenConnect installations with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software Inventory</a>, use the following query to locate potentially vulnerable ConnectWise ScreenConnect installations:</p>
<pre><code>vendor:ConnectWise AND product:ScreenConnect AND (version:&gt;0 AND version:&lt;26.1)</code></pre>
<hr>
<h2>June 2025,&nbsp;ScreenConnect vulnerability&nbsp;(CVE-2025-3935)</h2>
<p>Certain versions of ConnectWise ScreenConnect may be susceptible to ViewState code injection attacks in ASP.NET Web&nbsp;Forms. The ViewState is used by ASP.NET to preserve page state across multiple requests.&nbsp;The data is encoded using Base64 and protected by cryptographic keys referred to as&nbsp;<em>machine keys</em>. It is important to note that it typically requires privileged system level access&nbsp;to obtain these machine keys.&nbsp;This issue could potentially impact any product utilizing ASP.NET framework ViewStates.&nbsp;There is evidence that this&nbsp;vulnerability is being actively exploited in the wild.</p>
<p>The following versions are affected:</p>
<ul><li>ConnectWise ScreenConnect versions prior to 25.2.4</li></ul>
<p>This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-3935" rel="noopener" target="_blank">CVE-2025-3935</a> and has a CVSS score of <strong>8.1</strong>&nbsp;(<strong>high</strong>).</p>
<h2>What is the impact?</h2>
<p>If machine keys are compromised, successful exploitation of the vulnerability could allow&nbsp;attackers to create and send a malicious ViewState to the website, potentially leading to remote code execution on the server.</p>
<h2>Are updates or workarounds available?</h2>
<p>ConnectWise has <a href="https://www.connectwise.com/company/trust/security-bulletins/screenconnect-security-patch-2025.4" target="_blank">released</a> an update, 25.2.4, that fixes these issues by&nbsp;disabling the&nbsp;ViewState and removing any dependency on it.&nbsp;ConnectWise recommends that all users upgrade to this version immediately.</p>
<h2>How do I find vulnerable&nbsp;ScreenConnect installations with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software Inventory</a>, use the following query to locate potentially vulnerable ConnectWise ScreenConnect installations:</p>
<pre><code>vendor:ConnectWise AND product:ScreenConnect AND (version:&gt;0 AND version:&lt;25.2.4)
</code></pre>
<hr>
<h2>Previous ScreenConnect vulnerabilities (CVE-2024-1708,&nbsp;CVE-2024-1709)</h2>
<p>On February 19, 2024, ConnectWise <a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8" target="_blank">disclosed</a> two serious vulnerabilities in their ScreenConnect (formerly Control) remote-access product.</p>
<p>The first vulnerability is an authentication bypass vulnerability. Successful exploitation of this vulnerability would allow attackers to execute arbitrary commands with full privileges on the target system. This vulnerability has been assigned a CVSS score of 10, indicating a <em>highly critical</em> vulnerability.</p>
<p>The second issue is a path-traversal vulnerability. Successful exploitation of this vulnerability would allow attackers to access restricted resources on vulnerable systems. The vendor has not disclosed what resources may be accessed when exploiting this vulnerability. This vulnerability has been assigned a CVSS score of 8.4, indicating a <em>high</em> severity.</p>
<p>Note that CVEs are not yet assigned for these vulnerabilities.</p>
<p>Note that there is evidence that these vulnerabilities are being actively exploited in the wild.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow attackers to execute arbitrary commands with full privileges on the target system, potentially leading to complete system compromise.</p>
<h2>Are updates or workarounds available?</h2>
<p>ConnectWise has <a href="https://screenconnect.connectwise.com/download" target="_blank">released</a> an update, version 23.9.8, that fixes these issues. ConnectWise recommends that all users upgrade to this version immediately.</p>
<h2>How do I find ScreenConnect installations with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Services Inventory</a>, use the following query to locate potentially vulnerable ConnectWise ScreenConnect systems:</p>
<pre><code>vendor:ConnectWise AND (product:Control OR product:ScreenConnect)
</code></pre>
<p>Note the check for the former product name (“Control”).</p>
<p>Additional fingerprinting research is ongoing, and additional queries will be published as soon as possible.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/unifi-network-application/</id>
            <title>UniFi Network Application vulnerabilities: Find affected assets</title>
            <published>2026-03-19T12:23:00-04:00</published>
            <updated>2026-03-19T12:23:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/unifi-network-application/" />
            <summary type="html">Ubiquiti disclosed multiple vulnerabilities affecting certain versions of the UniFi Network Application. Here&#039;s how to find affected assets.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Ubiquiti UniFi Network Application&nbsp;vulnerabilities</h2>
<p>Ubiquiti <a href="https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b" target="_blank">disclosed</a> multiple vulnerabilities affecting certain versions of the UniFi Network Application:</p>
<ul><li>A path traversal&nbsp;vulnerability. Successful exploitation allows a network, unauthenticated adversary to access files on the underlying system that could be manipulated to access an underlying account. The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-22557" target="_blank">CVE-2026-22557</a> and has been rated <em><em>critical</em></em> with a CVSS score of <b>10.0</b>.</li><li>A NoSQL injection&nbsp;vulnerability. Successful exploitation allows a network, authenticated adversary to escalate privileges. The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-22558" target="_blank">CVE-2026-22558</a> and has been rated <em><em>high</em></em> with a CVSS score of <b>7.7</b>.</li></ul>
<ul></ul>
<p><strong>The following versions are affected</strong></p><ul><li><strong></strong>UniFi Network Application versions 10.1.85 and earlier</li><li>UniFi Network Application versions 10.2.93 and earlier</li><li>UniFi Network Application versions 9.0.114 and earlier</li></ul><h2>What is Ubiquiti UniFi Network Application?</h2>
UniFi Network Application provides centralized management for scaling and optimizing network performance, security, <br>  and device configuration across enterprise, SOHO, or home networks.
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerabilities could allow an adversary to gain unauthorized access to the UniFi Network&nbsp;Application&nbsp;compromising the overall system integrity.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>UniFi Network Application versions 10.1.89 or later</li><li>UniFi Network Application versions 10.2.97 or later.</li><li>UniFi Express firmware to 4.0.13 or later, which updates the UniFi Network Application to version 9.0.118 or later.</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/software-groups/" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:Ubiquiti AND product:"UniFi Network"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/ot-connectivity-principles/</id>
            <title>Strengthening OT: The Secure Connectivity Principles for CI</title>
            <published>2026-03-19T08:00:00-04:00</published>
            <updated>2026-03-19T08:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/ot-connectivity-principles/" />
            <summary type="html"></summary>
                            <author>
                    <name>Colin Dupreay</name>
                </author>
                        <content type="html">
                <![CDATA[<p>In an ongoing effort to help system owners better protect Operational Technology (OT) environments, government cybersecurity agencies from several allied nations have recently released new guidance on securing OT connectivity. Contributors include the National Cyber Security Centre (NCSC) in the UK, the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) in the United States, alongside international partners from Australia, Canada, New Zealand, Netherlands, and Germany.</p>
<p>This guidance builds on the earlier publication <a href="https://www.runzero.com/blog/cisa-ot-asset-inventory-guidance/" rel="noopener" target="_blank">Foundations for OT Cybersecurity</a>, which focused on helping organizations establish a foundational OT asset inventory — because you can’t secure what you can’t see. The newly released <a href="https://www.ncsc.gov.uk/files/ncsc-secure-connectivity-for-operational-technology.pdf" rel="noopener" target="_blank">Secure Connectivity Principles for Operational Technology</a> expands on that work by providing system owners with a framework to design, implement, and manage secure connectivity across both new and existing OT environments.</p>
<h2>Why secure OT connectivity matters</h2>
<p>OT environments differ significantly from traditional IT systems because they directly interact with the physical world. As a result, cyber incidents affecting OT systems can have far more serious consequences than typical IT disruptions. Potential impacts include environmental damage, disruption of essential services, or even risks to human safety.</p>
<p>Historically, many OT environments <a href="https://www.runzero.com/blog/segmentation-illusion/" rel="noopener" target="_blank">were air-gapped or heavily segmented</a> from enterprise IT networks. However, modernization, remote management, and increasing integration with IT systems have made OT environments far more connected than they once were. While this connectivity enables greater efficiency and visibility, it also <a href="https://www.runzero.com/blog/attack-surface-challenges-ot-ics-cloud/" rel="noopener" target="_blank">expands the attack surface and increases the risk of compromise</a>.</p>
<p>The new guidance is intended to help organizations navigate this reality by providing practical principles for securing connectivity while still enabling the operational benefits that modern OT environments require.</p>
<h2>8 principles for a secure OT environment</h2>
<p>Threat actors are <a href="https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF" rel="noopener" target="_blank">consistently</a>, <a href="https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01" rel="noopener" target="_blank">effectively</a>, and <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-343a" rel="noopener" target="_blank">intentionally</a> targeting OT systems with the intent to steal, disrupt, or destroy critical infrastructure. As a result, organizations responsible for OT environments should treat this guidance as a desired end-state, even when it is not a regulatory requirement. Given the importance of these systems, the agencies responsible for this guidance believe all OT system owners should expediently operationalize the principles outlined to help secure critical infrastructure against adversarial action. </p>
<p>The <a href="https://www.ncsc.gov.uk/files/ncsc-secure-connectivity-for-operational-technology.pdf" rel="noopener" target="_blank">Secure Connectivity Principles for Operational Technology</a> guidance outlines eight core principles designed to help organizations reduce risk and strengthen their defensive posture:</p>
<ol><li><strong>Balance risks and opportunities</strong></li><li><strong>Limit the exposure of connectivity</strong></li><li><strong>Centralize and standardize network connections</strong></li><li><strong>Use standardized and secure protocols</strong></li><li><strong>Harden your OT boundary</strong></li><li><strong>Limit the impact of compromise</strong></li><li><strong>Ensure all connectivity is logged and monitored</strong></li><li><strong>Establish an isolation plan</strong></li></ol>
<p>Together, these principles provide a practical roadmap for designing and operating OT networks that are resilient to modern cyber threats while still supporting operational requirements.</p>
<h2>What’s next</h2>
<p>In the coming weeks, we’ll take a closer look at each of these principles — exploring why they matter, how organizations can implement them in real-world OT environments, and what challenges teams may encounter along the way.</p>
<p>Stay tuned for parts two and three. We’ll unpack these principles and discuss how runZero can help operators gain visibility and control to better protect critical infrastructure.<br></p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/cisco-secure-fmc/</id>
            <title>Cisco Secure FMC vulnerabilities: How to find impacted assets</title>
            <published>2026-03-05T15:01:00-05:00</published>
            <updated>2026-03-18T00:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/cisco-secure-fmc/" />
            <summary type="html">Cisco disclosed that certain versions of Cisco Secure Firewall Management Center are affected by critical vulnerabilities (CVE-2026-2007, CVE-2026-20131).</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Cisco Secure FMC vulnerabilities: CVE-2026-20079 and&nbsp;CVE-2026-20131</h2>
<p>Cisco <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-onprem-fmc-authbypass-5JPp45V2" target="_blank">disclosed</a> in <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh" target="_blank">two</a> advisories that certain versions of Cisco Secure Firewall Management Center (FMC) are affected by the following vulnerabilities:<br></p>
<ul><li>The Cisco FMC web interface contains an authentication bypass vulnerability stemming from an improper system process created at boot time. A remote, unauthenticated adversary could exploit this by sending crafted HTTP requests, allowing them to bypass authentication and execute script files or commands to obtain root access to the underlying operating system.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20079" target="_blank">CVE-2026-20079</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>10.0</strong>.</li><li>The Cisco FMC web-based management interface contains a remote code execution (RCE) vulnerability due to insecure deserialization of a user-supplied Java byte stream. A remote, unauthenticated adversary could exploit this by sending a crafted serialized Java object to the interface, allowing them to execute arbitrary code and elevate privileges to root. Note: Deployments where the management interface lacks public Internet access significantly reduce the associated attack surface. The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20131" target="_blank">CVE-2026-20131</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>10.0</strong>.</li></ul>
<p>There is <a href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/" target="_blank">evidence</a> that CVE-2026-20131 <strong>is being actively exploited in the wild</strong>.</p>
<ul></ul>
<p><strong>The following versions of Cisco FMC are affected by one or both vulnerabilities</strong><br></p>
<ul><li>Cisco FMC versions prior to 7.0.9</li><li>Cisco FMC versions prior to 7.2.11</li><li>Cisco FMC versions prior to 7.4.4 (<a href="https://www.cve.org/CVERecord?id=CVE-2026-20079" target="_blank">CVE-2026-20079</a>) and prior to 7.4.6 (<a href="https://www.cve.org/CVERecord?id=CVE-2026-20131" target="_blank">CVE-2026-20131</a>)</li><li>Cisco FMC versions prior to 7.6.4 (<a href="https://www.cve.org/CVERecord?id=CVE-2026-20079" target="_blank">CVE-2026-20079</a>) and prior to 7.6.5 (<a href="https://www.cve.org/CVERecord?id=CVE-2026-20131" target="_blank">CVE-2026-20131</a>)</li><li>Cisco FMC versions prior to 7.7.12</li><li>Cisco FMC versions prior to 10.0.1 (<a href="https://www.cve.org/CVERecord?id=CVE-2026-20131" target="_blank">CVE-2026-20131</a> only)</li></ul>
<h2>What is Cisco Secure Firewall Management Center?</h2>
<p>Cisco Secure Firewall Management Center (FMC) is a centralized administrative platform used to configure security policies, manage firmware updates, and aggregate threat telemetry across physical and virtual Cisco security appliances from a single interface.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Cisco FMC 6.4.0.13 through 6.4.0.18 upgrade to version 7.0.9 and later</li><li>Cisco FMC 7.0.x upgrade to version 7.0.9 and later</li><li>Cisco FMC 7.1.x through 7.2.x upgrade to version 7.2.11 and later</li><li>Cisco FMC 7.3.x through 7.4.x upgrade to version 7.4.6 and later</li><li>Cisco FMC 7.6.x upgrade to version 7.6.5 and later</li><li>Cisco FMC 7.7.x upgrade to version 7.7.12 and later</li><li>Cisco FMC 10.0.0 upgrade to version 10.0.1 and later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>os:="Cisco FMC%" AND os_version:&gt;0 AND
  ((os_version:&gt;="6.4.0.13" AND os_version:&lt;="6.4.0.18") OR
  (os_version:&gt;="7.0.0" AND os_version:&lt;"7.0.9") OR
  (os_version:&gt;="7.1.0" AND os_version:&lt;"7.2.11") OR
  (os_version:&gt;="7.3.0" AND os_version:&lt;"7.4.6") OR
  (os_version:&gt;="7.6.0" AND os_version:&lt;"7.6.5") OR
  (os_version:&gt;="7.7.0" AND os_version:&lt;"7.7.12") OR
  (os_version:="10.0.0"))</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/craft-cms/</id>
            <title>Craft CMS vulnerability CVE-2026-32267: find impacted versions</title>
            <published>2025-02-21T11:55:00-05:00</published>
            <updated>2026-03-17T14:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/craft-cms/" />
            <summary type="html">A privilege escalation vulnerability found within CraftCMS was published in a recent security advisory. Here&#039;s how to find affected versions.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Craft CMS vulnerability:&nbsp;CVE-2026-32267</h2>
<p>A vulnerability found within&nbsp;CraftCMS was published in a recent&nbsp;<a href="https://github.com/craftcms/cms/security/advisories/GHSA-cc7p-2j3x-x7xf" target="_blank">security advisory</a>.</p>
<ul><li>A privilege escalation vulnerability exists due to token mishandling.The vulnerability&nbsp;has been designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2026-32267" target="_blank">CVE-2026-32267</a> and rated <em>high</em> with a CVSS score of <b>7.7</b>.</li></ul>
<p><strong>The following versions are affected</strong></p>
<ul><li>CraftCMS versions 4.0.0-RC1 up to 4.17.6 (exclusive)</li><li>CraftCMS versions 5.0.0-RC1 up to 5.9.12 (exclusive)</li></ul>
<h2>What is Craft CMS?</h2>
<p>CraftCMS is a flexible content management system (CMS) used to build and manage websites.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability could allow a low-privilege user (or an unauthenticated user who has been sent a shared URL) to escalate their privileges to admin by abusing a vulnerability found in the user management </p>
<h2>Are updates available?</h2>
<p>Upgrade affected versions of CraftCMS to the latest patched version.</p>
<ul><li>CraftCMS 4.x upgrade to version 4.17.6 and later</li><li>CraftCMS 5.x upgrade to version 5.9.12 and later</li></ul>
<ul></ul>
<h2>How do I find potentially vulnerable instances with runZero?</h2>
<p>From the <a href="https://console.runzero.com/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>vendor:=CraftCMS AND product:="Craft CMS"</code></pre>
<hr>
<h2>April 2025:&nbsp;CVE-2025-32432&nbsp;and&nbsp;CVE-2024-58136 </h2>
<p>Two zero-day vulnerabilities impacting Craft CMS are being actively exploited by chaining the vulnerabilities together to compromise the affected systems.</p>
<ul><ul><li><a href="https://www.cve.org/cverecord?id=CVE-2025-32432" target="_blank">CVE-2025-32432</a> is rated <strong>critical</strong> with a CVSSv3 base score of <strong>10.0</strong>.</li><li><a href="https://www.cve.org/cverecord?id=CVE-2024-58136" target="_blank">CVE-2024-58136</a>&nbsp;is rated <strong>critical</strong> with a CVSSv3 base score of <strong>9.0</strong>. This vulnerability is found within the <a href="https://www.yiiframework.com/" target="_blank">Yii framework</a>, which is used by Craft CMS.</li></ul></ul>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability could allow a&nbsp;low-privilege user (or an unauthenticated user who has been sent a shared URL) to escalate&nbsp;their privileges to admin by abusing a vulnerability found in the user management&nbsp;</p>
<h2>Are updates available?</h2>
<p>Although the Yii framework update is not included in the latest Craft CMS&nbsp;patch, the primary vulnerability was patched within <strong>3.9.15</strong>, <strong>4.14.15</strong>, and <strong>5.6.17</strong>. Users are strongly encouraged to update their installation as soon as possible. In addition to applying a patch, users might want to rotate their security keys as a safety precaution. Additionally, a best practices write-up is <a href="https://craftcms.com/knowledge-base/securing-craft#keep-your-secrets-secret" target="_blank">available online</a> with steps on how to harden the security of the installation.</p>
<h2>How do I find potentially vulnerable instances with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>_asset.protocol:http AND protocol:http AND (has:http.head.xPoweredBy AND http.head.xPoweredBy:="Craft CMS")</code></pre>
<hr>
<h2>February 2025:&nbsp;CVE-2025-23209</h2>
<p>In late January,&nbsp;CraftCMS published a&nbsp;<a href="https://github.com/craftcms/cms/security/advisories/GHSA-x684-96hh-833x" target="_blank">security advisory</a>&nbsp;for a code injection vulnerability that can lead to&nbsp;remote code execution.&nbsp;On February 20, 2025 CISA added <a href="https://www.cve.org/CVERecord?id=CVE-2025-23209" target="_blank">CVE-2025-23209</a> to the known exploited vulnerabilities catalog (KEV).</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability requires that a remote attacker already has control of the&nbsp;installation's&nbsp;<a href="https://craftcms.com/docs/5.x/reference/config/general.html#securitykey" target="_blank">security key</a>. In this case, the attacker can then inject code using an specially crafted backup directory variable provided by the user.</p>
<p>The affected versions include:</p>
<ul><li>Versions greater than or equal to&nbsp;<strong>5.0.0-RC1 </strong>through<strong>&nbsp;5.5.5</strong> (exclusive)</li></ul>
<ul><li>Versions greater than or equal to<strong>&nbsp;4.0.0-RC1 </strong>through<strong> 4.13.8 </strong>(exclusive)</li></ul>
<h2>Are updates available?</h2>
<p>The vulnerability was patched in 5.5.8 and 4.13.8. Users are strongly encouraged to update their installation&nbsp;as soon as possible. In addition to applying a patch, users might want to&nbsp;rotate their security keys as a safety precaution. Additionally, a best practices&nbsp;write-up is <a href="https://craftcms.com/knowledge-base/securing-craft#keep-your-secrets-secret" target="_blank">available online</a> with steps on how to harden the security of the installation.</p>
<h2>How do I find potentially vulnerable instances with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>_asset.protocol:http AND protocol:http AND (has:http.head.xPoweredBy AND http.head.xPoweredBy:="Craft CMS")</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/telnetd-rootf/</id>
            <title>GNU Inetutils telnetd server vulnerability: find impacted assets</title>
            <published>2026-01-20T17:06:00-05:00</published>
            <updated>2026-03-16T10:55:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/telnetd-rootf/" />
            <summary type="html">Adiel Sol reported a GNU Inetutils telnetd buffer overflow vulnerability within its handling of the LINEMODE suboption SLC.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest GNU Inetutils&nbsp;telnetd server vulnerability:&nbsp;CVE-2026-32746</h2>
<p>Adiel Sol <a href="https://lists.gnu.org/archive/html/bug-inetutils/2026-03/msg00031.html" target="_blank">reported</a> a&nbsp;GNU Inetutils <em>telnetd</em>&nbsp;buffer overflow vulnerability within its handling of the LINEMODE suboption SLC (Set Local Characters). This flaw occurs during option negotiation, before a login prompt is even presented. A remote, unauthenticated adversary can achieve pre-authentication&nbsp;remote code execution (RCE) by sending a specially crafted SLC suboption containing an excessive number of triplets. Because the <em>telnetd</em> service frequently runs with <em>root</em> privileges, exploitation can lead to a full system compromise. No CVE has been assigned to this vulnerability at this time (March 13, 2026).</p>
<p><strong>Update</strong>: The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-32746" target="_blank">CVE-2026-32746</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.</p>
<p><strong>The following versions are affected:</strong><br></p>
<ul><li>GNU Inetutils <em>telnetd</em> all versions up to and including 2.7</li></ul>
<h2>What is GNU Inetutils telnetd?</h2>
<p>GNU Inetutils (inet-utils) is a collection of common network programs and servers, most frequently deployed on Linux-based systems. The GNU Inetutils <em>telnetd</em> daemon provides a server for the Telnet protocol. While Telnet is a legacy remote-access protocol that has been largely supplanted by SSH, it remains widely used in low-power and legacy environments.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>A patched version of <em>telnetd</em> has not yet been released. It is strongly recommended to disable the <em>telnetd</em>&nbsp;service on all potentially vulnerable systems.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>_asset.protocol:=telnet AND protocol:=telnet AND os:Linux AND banner:="%login:"
  AND NOT (type:device OR type:"ip camera" OR type:"ip phone" OR banner:busybox)
</code></pre>
<p>This query is focused on Linux devices utilizing GNU <em>telnetd</em>. However, please note that results may include other Linux-hosted Telnet services that are not necessarily vulnerable to this specific flaw.</p>
<hr>
<h2>January 2026:&nbsp;CVE-2026-24061</h2>
<p>Simon Josefsson&nbsp;has <a href="https://seclists.org/oss-sec/2026/q1/89" rel="noopener" target="_blank">reported a vulnerability</a> in the the GNU inet-utils telnetd server. GNU inet-utils (InetUtils) is a collection of Internet-related servers and utilities. It is most commonly deployed on Linux systems.</p>
<p>GNU telnetd contains an authentication bypass vulnerability in its handling of user-supplied environment variables. A specially crafted <em>$USER</em> environment variable can bypass authentication and allow a remote, unauthenticated attacker to access a vulnerable system with the privileges of any known user, including root.</p>
<p>This vulnerability has been assigned&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24061" target="_blank">CVE-2026-24061</a>&nbsp;and has a CVSS score of 9.8 (<strong><em>extremely critical</em></strong>).<strong><em><em></em></em></strong></p>
<p><strong>The following versions are affected</strong></p>
<ul><li>GNU inet-utils telnetd versions 1.9.3 and higher</li></ul>
<h2>What is telnetd?</h2>
<p>GNU inet-utils <em>telnetd</em> provides a server for the standard Telnet protocol. Telnet is a legacy remote-access protocol similar that has been largely supplanted by SSH and other, more secure, protocols. However, Telnet is still widely used in low-power or legacy devices.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an adversary to bypass authentication on a vulnerable host.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>There is currently no patched version available. Users are advised to disable telnet access if possible, and to ensure proper network access controls are in place.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory" target="_blank">Asset inventory</a>, use the following query to locate potentially vulnerable assets:</p>
<pre><code>_asset.protocol:=telnet AND protocol:=telnet AND os:Linux AND banner:="%login:" AND NOT banner:busybox</code></pre>
<p>Note that this query will locate many Telnet services running on Linux hosts; GNU inet-utils telnetd is one of the most common Telnet servers deployed on Linux systems, but this query may discover other Telnet servers as well.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/veeam-instances/</id>
            <title>Veeam RCE vulnerabilities: How to find impacted assets</title>
            <published>2022-03-15T03:00:00-04:00</published>
            <updated>2026-03-12T18:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/veeam-instances/" />
            <summary type="html">Veeam Software has disclosed two remote code execution (RCE) vulnerabilities affecting certain versions of Veeam Backup &amp; Replication.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Veeam Software vulnerabilities:&nbsp;CVE-2026-21666, CVE-2026-21667, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708</h2>
<p>Veeam Software&nbsp;<a href="https://www.veeam.com/kb4830" target="_blank">disclosed</a> in <a href="https://www.veeam.com/kb4831" target="_blank">two</a> advisories that multiple vulnerabilities have been identified in Veeam Backup & Replication which&nbsp;could allow for remote code execution (RCE), privilege escalation, and credential theft.<br></p>
<p><strong>Version 12.3.x Vulnerabilities</strong></p>
<ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21666" target="_blank">CVE-2026-21666</a> & <a href="https://www.cve.org/CVERecord?id=CVE-2026-21667" target="_blank">CVE-2026-21667</a>: Allows a remote, low-privileged authenticated domain user to perform RCE on the Backup Server. The vulnerabilities designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2026-21666" target="_blank">CVE-2026-21666</a>&nbsp;and&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2026-21667" target="_blank">CVE-2026-21667</a>&nbsp;have been rated <em><em>critical</em></em> with a CVSS score of <strong>9.9</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21668" target="_blank">CVE-2026-21668</a>: Allows a remote, low-privileged authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21668" target="_blank">CVE-2026-21668</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>8.8</strong>.</li></ul>
<p><strong>Version 13.0.x Vulnerabilities</strong></p>
<ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21669" target="_blank">CVE-2026-21669</a>: Allows a remote, low-privileged authenticated domain user to perform RCE on Windows-based Backup Servers.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21669" target="_blank">CVE-2026-21669</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.9</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21670" target="_blank">CVE-2026-21670</a>: Allows a remote, low-privileged user to extract saved SSH credentials from Windows-based servers or the Veeam Software Appliance. This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21670" target="_blank">CVE-2026-21670</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>7.7</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21671" target="_blank">CVE-2026-21671</a>: Allows a remote, high-privileged user with the "Backup Administrator" role to perform RCE in high availability (HA) deployments.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21671" target="_blank">CVE-2026-21671</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.1</strong>.</li></ul>
<p><strong>Vulnerabilities Affecting Both 12.3.x and 13.0.x</strong></p>
<ul><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21672" target="_blank">CVE-2026-21672</a>: A vulnerability allowing local privilege escalation on Windows-based Backup Servers.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21672" target="_blank">CVE-2026-21672</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>8.8</strong>.</li><li><a href="https://www.cve.org/CVERecord?id=CVE-2026-21708" target="_blank">CVE-2026-21708</a>: Allows a remote, low-privileged user with the "Backup Viewer" role to perform RCE as the <em>postgres</em> user.&nbsp;This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21708" target="_blank">CVE-2026-21708</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.9</strong>.</li></ul>
<p><strong>The following versions are affected:</strong><br></p>
<ul><li>Veeam Backup & Replication versions 12.3.x prior to 12.3.2.4465</li><li>Veeam Backup & Replication versions 13.0.x prior to 13.0.1.2067</li></ul>
<h2>What is Veeam Backup & Replication?</h2>
<p>Veeam Backup & Replication is data protection software that supports image-level backup, recovery, and replication for virtual, physical, and cloud machines.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Veeam Backup & Replication versions 12.3.x upgrade to version 12.3.2.4465 or later</li><li>Veeam Backup & Replication versions 13.0.x upgrade to version 13.0.1.2067 or later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Veeam AND (product:="Backup & Replication" OR product:="Veeam Backup & Replication")</code></pre>
<hr>
<h2>November 2025:&nbsp;CVE-2025-48983, and CVE-2025-48984</h2>
<p>Veeam Software has <a href="https://www.veeam.com/kb4771" target="_blank">disclosed</a> two remote code execution (RCE) vulnerabilities affecting certain versions of Veeam Backup & Replication. These flaws in different software components allow a remote, low-privileged adversary (authenticated domain user) to execute arbitrary code.</p>
<ul><li>The first method is via a vulnerability in the Mount service on domain-joined backup infrastructure servers. This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-48983" target="_blank">CVE-2025-48983</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.9</strong>.</li><li>The second method is via a vulnerability in domain-joined backup servers. This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-48984" target="_blank">CVE-2025-48984</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.9</strong>.</li></ul>
<p><strong>The following versions are affected:</strong><br></p>
<ul><li>Veeam Backup & Replication versions 12.x prior to 12.3.2.4165</li></ul>
<h2>What is Veeam Backup & Replication?</h2>
<p>Veeam Backup & Replication is data protection software that supports image-level backup, recovery, and replication for virtual, physical, and cloud machines.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Veeam Backup & Replication versions 12.x upgrade to version 12.3.2.4165 or later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Veeam AND product:="Veeam Backup & Replication" AND (version:&gt;0 AND version:&gt;=12 AND version:&lt;12.3.2.4165)</code></pre>
<p>Currently, runZero prebuilt integrations can identify these findings.</p>
<hr>
<h2>December 2024:</h2>
<p dir="ltr">Veeam has <a href="https://www.veeam.com/kb4679" target="_blank">disclosed</a>&nbsp;two&nbsp;vulnerabilities&nbsp;found internally within their Veeam Service Provider Console (VSPC).</p>
<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42448" target="_blank">CVE-2024-42448</a> is rated <strong><em>Critical</em></strong> with a CVSS score of<strong>&nbsp;9.9</strong>, which potentially allows remote code execution.</li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-42449" target="_blank">CVE-2024-42449</a> is rated <strong><em>High</em></strong> with a CVSS score of <strong>7</strong><strong>.1</strong>, which potentially leaks the&nbsp;NTLM hash of a service account and allows for the deletion of files on the server.</li></ul>
<h3>What is the impact?</h3>
<p>Although there an no known exploitations of the vulnerabilities in the wild,&nbsp;CVE-2024-42448 could allow remote code execution by an&nbsp;attacker on the server. An&nbsp;attacker would need to launch their attack from an authorized VSPC management agent server&nbsp;in order to exploit either of the disclosed vulnerabilities.</p>
<h3>Are updates or workarounds available?</h3>
<p>No mitigations are available for the disclosed vulnerabilities. Instead, the vendor is strongly encouraging customers to "update to the latest cumulative patch".</p>
<h3>How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>has:"html.title" html.title:"Veeam Service Provider Console"</code></pre>
<hr>
<h2>December 2022</h2>
<p>Veeam <a href="https://www.veeam.com/kb4288" target="_blank">published information</a> on two vulnerabilities in the Veeam Backup & Replication product, originally reported by Nikita Petrov of Positive Technologies.</p>
<p>As of December 16th, <a href="https://thehackernews.com/2022/12/cisa-alert-veeam-backup-and-replication.html" target="_blank">CISA had announced</a> the addition of two critical vulnerabilities (tracked as CVE-2022-26500 and CVE-2022-26501) to the KEV catalog. These CVEs were actively being exploited, putting systems at risk. It was critical that these systems were updated to patch these vulnerabilities as soon as possible.</p>
<h3>Which versions were affected?</h3>
<p>These vulnerabilities affected Backup & Replication versions 9.5, 10, and 11, allowing for exploitation by attackers to achieve unauthenticated remote code execution via the Veeam Distribution Service API. Details on the vulnerabilities (identified as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26500" rel="noopener" target="_blank">CVE-2022-26500</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26501" rel="noopener" target="_blank">CVE-2022-26501</a>) were not published at the time of writing, though Veeam had assigned a "critical" CVSS score of 9.8.</p>
<h3>Were updates made available?</h3>
<p>Patched releases of Veeam Backup & Replication were&nbsp;<a href="https://www.veeam.com/kb4288" rel="noopener" target="_blank">made available</a> (see the "Solution" section). Guidance from Veeam was for administrators to update to these newer versions as soon as possible. If near-term updating was not possible, Veeam offered a temporary mitigation strategy <a href="https://www.veeam.com/kb4288" rel="noopener" target="_blank">via stopping-and-disabling the Veeam Distribution Service</a> (see the "Solution-&gt;Notes" section).</p>
<h3>How runZero users found potentially vulnerable Veeam instances</h3>
<p>We added the default port (9380) for the Veeam Distribution Service API to our runZero Explorer and Scanner. If you were using Explorer or Scanner v2.11.5 or later, you just needed to ensure you had performed a recent scan of your assets prior to running the query below. If you were using an older Explorer or Scanner, users simply&nbsp;added port 9380 to the "Included TCP ports" (under the <a href="https://console.runzero.com/scan/" rel="noopener" target="_blank">Advanced tab</a>) and then ran a scan to gather the necessary data.</p>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, users ran&nbsp;the following <a href="https://console.runzero.com/inventory?search=tcp_port%3A9380" rel="noopener" target="_blank">pre-built query</a> to locate Veeam Distribution Service instances within their network that could have potentially ran vulnerable versions of Veeam Backup & Replication:</p>
<pre><code>tcp_port:9380</code></pre>
<figure><img src="/img/posts/veeam-asset-inventory.png" class="img-fluid" alt="Veeam prebuilt query is available in the Queries Library" title="The Queries Library" data-image="thigtekd8j7r"></figure>
<p>As always, any prebuilt queries we create are available from our <a href="https://console.runzero.com/queries" rel="noopener" target="_blank">Queries Library</a>. Check out the library for other useful inventory <a href="https://help.runzero.com/docs/search-query-syntax/" rel="noopener" target="_blank">queries</a>.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/cisco-catalyst-sd-wan/</id>
            <title>Cisco Catalyst SD-WAN vulnerability: CVE-2026-20127</title>
            <published>2026-02-25T15:57:00-05:00</published>
            <updated>2026-03-12T10:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/cisco-catalyst-sd-wan/" />
            <summary type="html">Cisco disclosed versions of Cisco Catalyst SD-WAN Controller &amp; Manager contain a vulnerability in the peering auth mechanism. How to find affected assets.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Cisco Catalyst SD-WAN&nbsp;vulnerability: CVE-2026-20127</h2>
<p>Cisco <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk" target="_blank">disclosed</a> certain&nbsp;versions of Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage) contain a vulnerability in the peering authentication mechanism. A remote, unauthenticated adversary could exploit this by sending crafted requests to an affected system to bypass authentication and obtain administrative privileges. By leveraging an internal, high-privileged, non-root user account, the adversary could access <em>NETCONF</em>, enabling them to manipulate the network configuration for the entire SD-WAN fabric.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-20127" target="_blank">CVE-2026-20127</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>10.0</strong>.<br></p>
<ul></ul>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/02/25/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.<br><br>On March 11, 2026, CISA published <a href="https://www.cisa.gov/news-events/directives/v1-ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems" target="_blank">V1: ED 26-03: Mitigate Vulnerabilities in Cisco SD-WAN Systems</a>. This version supersedes the actions outlined in the original February 25 directive, introducing updated remediation steps and new reporting requirements for affected organizations.</p>

<p><strong>The following deployment environments are affected</strong></p>
<ul><li>On-Premise deployments</li><li>Cisco Hosted SD-WAN Cloud (Standard, Cisco Managed, and FedRAMP)</li></ul>
<ul></ul>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>Catalyst SD-WAN releases prior to 20.9</li><li>Catalyst SD-WAN release 20.9 versions prior to 20.9.8.2</li><li>Catalyst SD-WAN release 20.11 versions prior to 20.12.6.1</li><li>Catalyst SD-WAN release 20.12.5 versions prior to 20.12.5.3</li><li>Catalyst SD-WAN release 20.12.6 versions prior to 20.12.6.1</li><li>Catalyst SD-WAN release 20.13 versions prior to 20.15.4.2</li><li>Catalyst SD-WAN release 20.14 versions prior to 20.15.4.2</li><li>Catalyst SD-WAN release 20.15 versions prior to 20.15.4.2</li><li>Catalyst SD-WAN release 20.16 versions prior to 20.18.2.1</li><li>Catalyst SD-WAN release 20.18 versions prior to 20.18.2.1</li></ul>
<h2>What is Cisco Catalyst SD-WAN Controller and Manager?</h2>
<p>The Cisco Catalyst SD-WAN Controller serves as the centralized control-plane element, utilizing the Overlay Management Protocol (OMP) to manage routing intelligence, distribute security keys, and enforce network-wide policies. In contrast, the Cisco Catalyst SD-WAN Manager acts as the centralized management system, providing the graphical interface necessary for the configuration, monitoring, and orchestration of all devices within the fabric.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability&nbsp;would allow an adversary to&nbsp;obtain administrative privileges manipulate the network configuration for the entire SD-WAN fabric.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Catalyst SD-WAN releases prior to 20.9 migrate to a fixed release</li><li>Catalyst SD-WAN release 20.9 upgrade to version 20.9.8.2 and later</li><li>Catalyst SD-WAN release 20.11 upgrade to version 20.12.6.1 and later</li><li>Catalyst SD-WAN release 20.12.5 upgrade to version 20.12.5.3 and later</li><li>Catalyst SD-WAN release 20.12.6 upgrade to version 20.12.6.1 and later</li><li>Catalyst SD-WAN release 20.13 upgrade to version 20.15.4.2 and later</li><li>Catalyst SD-WAN release 20.14 upgrade to version 20.15.4.2 and later</li><li>Catalyst SD-WAN release 20.14 upgrade to version 20.15.4.2 and later</li><li>Catalyst SD-WAN release 20.16 upgrade to version 20.18.2.1 and later</li><li>Catalyst SD-WAN release 20.18 upgrade to version 20.18.2.1 and later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>hw:="Cisco vManage" OR os:="Cisco Viptela OS"</code></pre>
<p>Note: The query locates Cisco Catalyst SD-WAN Manager installations.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/hpe-aruba-networking-cx/</id>
            <title>HPE Aruba Networking AOS-CX switch vulnerabilities</title>
            <published>2026-03-11T15:34:00-04:00</published>
            <updated>2026-03-11T15:34:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/hpe-aruba-networking-cx/" />
            <summary type="html">HPE disclosed multiple vulnerabilities in specific versions of AOS-CX software. Here&#039;s how to find affected assets on your network.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest HPE Aruba Networking AOS-CX&nbsp;vulnerabilities:&nbsp;CVE-2026-23813, CVE-2026-23814, CVE-2026-23815, CVE-2026-23816, and CVE-2026-23817</h2>
<p>HPE&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05027en_us&docLocale=en_US" target="_blank">disclosed</a>&nbsp;multiple vulnerabilities in specific versions of AOS-CX software:</p>
<ul><li>An authentication bypass in the web-based management interface allows unauthenticated admin password reset. Successful exploitation could allow a remote, unauthenticated adversary to circumvent existing authentication controls and, in some instances, reset the administrator password.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-23813" target="_blank">CVE-2026-23813</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.</li><li>An authenticated command injection vulnerability exists due to improper validation of parameters to a certain AOS-CX CLI command. Successful exploitation could allow a remote, low-privilege adversary to inject malicious commands resulting in unwanted behavior.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-23814" target="_blank">CVE-2026-23814</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>8.8</strong>.</li><li>An authenticated command injection vulnerability exists in a custom binary used in AOS-CX CLI for an administrative command. Successful exploitation could allow a remote, high-privilege adversary to perform command injection and execute unauthorized commands.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-23815" target="_blank">CVE-2026-23815</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>7.2</strong>.</li><li>An authenticated OS command injection vulnerability exists in an administrative AOS-CX CLI command. Successful exploitation could allow a remote, high-privilege adversary to execute arbitrary commands directly on the underlying operating system. The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-23816" target="_blank">CVE-2026-23816</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>7.2</strong>.</li><li>An unauthenticated open redirect vulnerability exists in the web-based management interface. Successful exploitation could allow a remote, unauthenticated adversary to redirect users to arbitrary, potentially malicious URLs.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-23817" target="_blank">CVE-2026-23817</a> and has been rated <em><em>medium</em></em> with a CVSS score of <strong>6.5</strong>.</li></ul>


<ul></ul>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>AOS-CX 10.10.xxxx versions prior to 10.10.1180</li><li>AOS-CX 10.13.xxxx versions prior to 10.13.1161</li><li>AOS-CX 10.16.xxxx versions prior to 10.16.1030</li><li>AOS-CX 10.17.xxxx versions prior to 10.17.1001</li></ul>
<h2>What is HPE Aruba Networking AOS-CX?</h2>
<p>HPE Aruba Networking AOS-CX is a network operating system built on a modular Linux architecture that utilizes a state-database design and REST APIs to enable automated configuration and embedded system-level visibility.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerabilities  allows an adversary to bypass authentication controls and potentially execute arbitrary&nbsp;commands on the underlying operating system of the vulnerable device.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>AOS-CX 10.10.xxxx upgrade to version 10.10.1180 and later</li><li>AOS-CX 10.13.xxxx upgrade to version 10.13.1161 and later</li><li>AOS-CX 10.16.xxxx upgrade to version 10.16.1030 and later</li><li>AOS-CX 10.17.xxxx upgrade to version 10.17.1001 and later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>hw:="HPE Aruba CX%" AND protocol:http</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/gogs/</id>
            <title>Gogs vulnerability CVE-2026-25921: how to find impacted assets</title>
            <published>2025-12-10T12:49:00-05:00</published>
            <updated>2026-03-10T16:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/gogs/" />
            <summary type="html">Certain Gog versions are affected by a cross-repository Large File Storage (LFS) object overwrite vulnerability due to missing content hash verification.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Gogs vulnerability: CVE-2026-25921</h2>
<p>Gogs has&nbsp;<a href="https://github.com/gogs/gogs/security/advisories/GHSA-cj4v-437j-jq4c" rel="noopener" target="_blank">disclosed</a>&nbsp;that&nbsp;certain versions are affected by a cross-repository Large File Storage (LFS) object overwrite vulnerability due to missing content hash verification. Git LFS is an open-source extension designed to manage large files, such as audio samples, videos, and datasets, more efficiently within Git repositories. Because Gogs stores all LFS objects in a single location without repository isolation, this flaw could allow a remote, unauthenticated adversary to overwrite existing objects.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-25921" target="_blank">CVE-2026-25921</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.3</strong>.<br></p>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>Gogs versions prior to 0.14.2</li></ul>
<h2>What is Gogs?<br></h2>
<p>Gogs is an open-source, self-hosted Git repository management system written in Go that provides a web-based interface for version control with minimal hardware resource requirements.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability&nbsp;enables an adversary to overwrite legitimate LFS objects with malicious content. This introduces a significant risk of a supply-chain attack; because the Gogs web interface does not present integrity warnings, users may unknowingly download and utilize&nbsp;compromised assets.</p>
<h2>Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Gogs upgrade to version 0.14.2 or later</li></ul>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Gogs AND product:=Gogs</code></pre>
<hr>
<h2>December 2025: CVE-2025-8110</h2>
<p>Security researchers at Wiz have&nbsp;<a href="https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit" rel="noopener" target="_blank">reported a 0-day vulnerability</a>&nbsp;in Gogs. This flaw allows remote, authenticated attackers to overwrite arbitrary files on the vulnerable system. Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system with the privileges of the Gogs server process.</p>
<p>This vulnerability has been assigned&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-8110" target="_blank">CVE-2025-8110</a>&nbsp;and has a CVSS score of&nbsp;<strong>7.8</strong>.</p>
<p>Note that there is <a href="https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit" target="_blank">evidence</a> that this vulnerability is being&nbsp;<em><strong><a href="https://www.cisa.gov/news-events/alerts/2026/01/12/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank">actively</a> exploited in the wild</strong></em>.</p>
<p><strong>The following versions are affected</strong></p>
<ul><li>Gogs versions 0.13.3 and prior<em><strong></strong></em></li></ul>
<h2>What is Gogs?</h2>
<p>Gogs is a self-hosted Git software forge, allowing users to collaborate on development using Git repositories.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of these vulnerabilities would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>There is currently no patched fixed version of Gogs available. Users are encouraged to disable auto-registration of users and avoid Internet exposure&nbsp;for any Gogs installations.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service inventory</a>, use the following query to locate potentially vulnerable assets:</p>
<pre><code>_asset.protocol:=http AND protocol:=http AND favicon.ico.image.md5:=5f5b7539f014b9996959f5dcd063d383</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/finding-cisa-bod-26-02/</id>
            <title>runZero Findings feature for CISA BOD 26-02</title>
            <published>2026-03-10T09:00:00-04:00</published>
            <updated>2026-03-10T09:00:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/finding-cisa-bod-26-02/" />
            <summary type="html">runZero users can now enjoy a consistent, clear way to track what CISA (and we) believe are some of the most critically exposed assets on your network.</summary>
                            <author>
                    <name>todb</name>
                </author>
                        <content type="html">
                <![CDATA[<p>Heya! Remember when we first talked about CISA’s new <a href="https://www.runzero.com/blog/bod-26-02-compliance/" rel="noopener" target="_blank">BOD 26-02</a> on End-of-Service (EOS) edge devices back in early February, then provided a <a href="https://www.runzero.com/blog/cisa-bod-26-02-eos-and-runzero/" rel="noopener" target="_blank">handy query</a> to find such internet-exposed EOS devices on your own network?&nbsp;</p>
<p>Well, we’ve gone and made it even easier with a new Findings tab, right in the console. Down with typey-typing, and up with clicky-clicking!&nbsp;</p>
<p><strong>Check it out:</strong></p>
<figure><img src="/uploads/blog/bod-26-02/cisa-bod-26-02-eos-edge-devices.webp" data-image="311572" width="100%"></figure>
<figure><img src="/uploads/blog/bod-26-02/cisa-bod-26-02-risk-level.webp" data-image="311571" width="100%"></figure>
<p>For those who missed the earlier posts, BOD 26-02 is CISA’s two-year program requiring federal civilian agencies to identify and address unsupported edge devices like firewalls, VPNs, routers, proxies, etc. The clock started ticking on February 5th which means the first milestone of having a mechanism in place to identify all edge devices (supported and unsupported) in production begins on May 5, 2026. </p>
<p>One wrinkle worth noting is that unlike BOD 22-01 and the KEV, CISA decided to keep their official EOL edge device list private. This Finding maps directly to <a href="https://www.runzero.com/blog/cisa-bod-26-02-eos-and-runzero/" rel="noopener" target="_blank">the query we shared last time</a>, surfacing devices in “EOL Extended” state that are exposed to the public internet and aren’t normal servers, desktops, or laptops.<br></p>
<p>With this update — free to all customers, even the <a href="https://www.runzero.com/try/" rel="noopener" target="_blank">free-trial</a> folks — runZero users can enjoy a consistent, obvious way to track against what CISA (and we) believe are some of the most critically exposed assets on your network. Going forward, we’ll continue to make things easy and clear for you with this Findings tab as we integrate more fingerprints and profiles of commonly-attacked endpoints, so you can get down to the business of upgrading, retiring, or segmenting off these attractive-to-attackers assets.<br></p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/nginx-ui/</id>
            <title>Nginx UI vulnerability CVE-2026-27944: how to find affected assets</title>
            <published>2026-03-09T01:54:00-04:00</published>
            <updated>2026-03-09T01:54:00-04:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/nginx-ui/" />
            <summary type="html">Versions of Nginx UI are affected by a vulnerability that allows for unauthenticated backup data downloads and disclosure of associated encryption keys.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Nginx UI vulnerability:&nbsp;CVE-2026-27944</h2>
<p>Nginx UI <a href="https://github.com/0xJacky/nginx-ui/security/advisories/GHSA-g9w5-qffc-6762" target="_blank">disclosed</a> that certain versions of Nginx UI are affected by a vulnerability that allows for unauthenticated backup data downloads and the disclosure of associated encryption keys. This flaw stems from missing authentication on the <em>/api/backup</em> endpoint. Additionally, the AES-256 encryption key and IV (Initialization Vector) required to decrypt the backup are transmitted in plaintext within the <em>X-Backup-Security</em> response header.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-27944" target="_blank">CVE-2026-27944</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.<br></p>
<ul></ul>
<ul></ul>
<p><strong><strong>The following versions are affected</strong></strong><br></p>
<ul><li>Nginx UI all versions prior to 2.3.3</li></ul>
<h2>What is Nginx UI?</h2>
<p>Nginx UI is a web-based graphical interface used to manage Nginx server configurations, SSL certificates, and system logs without manual command-line editing.</p><h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability&nbsp;enables a remote, unauthenticated adversary to download and decrypt a full system backup containing sensitive information, such as user credentials, session tokens, SSL private keys, and Nginx configurations.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Nginx UI upgrade to version 2.3.3 and later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the&nbsp;<a href="https://console.runzero.com/inventory/services" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>_asset.protocol:=http AND protocol:=http AND favicon.ico.image.mmh3:="-1565173320"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/junos-os-evo/</id>
            <title>Juniper Networks Junos OS Evolved: CVE-2026-21902</title>
            <published>2026-02-27T16:54:00-05:00</published>
            <updated>2026-03-06T14:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/junos-os-evo/" />
            <summary type="html">Juniper Networks disclosed versions of Junos OS Evolved running on PTX Series routers contain a critical vulnerability. How to find affected assets.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest&nbsp;Junos OS Evolved&nbsp;vulnerability: CVE-2026-21902</h2>
<p>Juniper Networks&nbsp;<a href="https://supportportal.juniper.net/s/article/2026-02-Out-of-Cycle-Security-Bulletin-Junos-OS-Evolved-PTX-Series-A-vulnerability-allows-a-unauthenticated-network-based-attacker-to-execute-code-as-root-CVE-2026-21902" target="_blank">disclosed</a> certain versions of Junos OS Evolved&nbsp;on PTX series routers contain a vulnerability in the On-Box Anomaly Detection framework. A remote, unauthenticated adversary could exploit this by sending crafted requests to an affected system to bypass authentication and execute code with root access.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-21902" target="_blank">CVE-2026-21902</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.<br></p>
<ul></ul>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>Junos OS Evolved on PTX Series versions 25.4 through 25.4R1-S1-EVO</li><li>Junos OS Evolved on PTX Series versions prior to&nbsp;25.4R2-EVO</li></ul>
<h2>What is Junos OS Evolved?</h2>
<p>Junos OS Evolved is a next generation network operating system made by Juniper Networks that power many of their&nbsp;high-end routing and data center platforms.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability could allow an adversary the ability to remotely execute code as the root user. This would allow them to&nbsp;take complete control of the device.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Administrators are encouraged to update to the latest version as soon as possible. Additionally, administrators can disable the affected service on vulnerable devices using the following:<br>  </p>
<pre><code>request pfe anomalies disable</code></pre>
<ul></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>os:="Juniper Junos OS Evolved" AND   
  ((os_version:&gt;="25.4R1-EVO" AND os_version:&lt;"25.4R1-S1-EVO") OR   
  (os_version:&gt;"25.4R1-S1-EVO" AND os_version:&lt;"25.4R2-EVO"))</code></pre>
<p>Note: The query locates all potentially vulnerable&nbsp;Junos OS Evolved installations. However, it&nbsp;does not specifically identify PTX Series routers.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/segmentation-illusion/</id>
            <title>The network you think you have isn&#039;t the one you actually have</title>
            <published>2026-03-03T08:00:00-05:00</published>
            <updated>2026-03-03T08:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/segmentation-illusion/" />
            <summary type="html">The air gap is dead, and the illusion of segmentation is very much alive. Learn why segmentation fails, and how to actually secure your network.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<p dir="ltr">At the SANS Winter Cyber Solutions Fest 2026: Utilities and Critical Infrastructure event, runZero CEO HD Moore’s presentation proposed a simple but uncomfortable premise: the air gap is dead, and the illusion of segmentation is very much alive. </p>
<p dir="ltr">Attackers exploit edge device zero-days, abuse forgotten cellular backup links, and pivot through multi-homed systems that quietly route around every control you've deployed. The tools most teams rely on, including passive monitoring, vulnerability scanners, and OEM software, consistently miss the exposure paths that matter most.</p>
<p dir="ltr">In his presentation,&nbsp;<a href="https://www.runzero.com/resources/segmentation-theater-sans-2026/" rel="noopener" target="_blank">Segmentation Theater</a>, HD breaks down how to address these gaps. Below, we’ve highlighted several key failure modes and what you can do about them.&nbsp;</p>
<h2>The thing protecting your OT environment is also the thing attackers walk through first</h2>
<p dir="ltr">Firewalls are the load-bearing wall of OT segmentation. They show up at every Purdue level, and they work…right up until they don't. Mandiant looked back at a full year of OT incident response and found that roughly 30% of those incidents started with initial access through a perimeter security device. Palo Alto, Ivanti, Fortinet, the products we've spent years deploying to protect these environments, were the top three compromised entry points. The attackers aren't looking for some exotic OT-specific exploit. They're using a Fortinet zero-day and walking right in.</p>
<p dir="ltr">The structural problem here is that when you deploy a single firewall vendor from your enterprise zone all the way down to Level 2, you haven't built defense in depth, you've built a single control that spans everything. An authentication bypass at the top collapses the whole stack. Layering vendors helps, but it doesn't solve the underlying issue, which is that firewalls have become both the most critical and the most attacked component in OT networks simultaneously. They need to be treated like assets you actively monitor, not infrastructure you set and forget.</p>
<h2>Your devices are routing between zones you're trying to keep separate</h2>
<p dir="ltr">A device that has two network connections, a  wired OT segment and guest Wi-Fi for example, can route traffic between them without a single packet ever touching your firewall. No alert. No log entry. Just quiet, invisible bridging.</p>
<p dir="ltr">We did research on how many devices have IP forwarding enabled by default and the honest answer is: most of them, including  printers, smart TVs, and ESP32-based IoT hardware. We had a harder time finding devices that didn't have it on than ones that did. The situation gets worse when developers install tools like Docker on workstations that sit on OT-adjacent segments. Docker enables IP forwarding across all interfaces as a side effect of its virtual networking. The developer doesn't know they've just turned their workstation into a multi-interface router. Nobody told them that was a firewall configuration problem they now own.</p>
<p dir="ltr">At scale, these unintended connections compound fast. In a network of 30 devices the path graph is already messy. In an enterprise with thousands of employees and dozens of OT sites, you've effectively got one big hairball where any point can reach any other in a hop or two.</p>
<h2>The least-secure thing on your network is often the thing managing everything else</h2>
<p dir="ltr">Serial console servers, KVM-over-IP switches, and IPMI interfaces are everywhere in OT environments. They exist because you need a way to get remote access to hardware that can't otherwise be managed remotely. They're also consistently the worst-secured devices in the building. Across MOXA, Digi, Pi KVM, SuperMicro IPMI, runZero has  found unauthenticated session access, insecure proprietary protocols, and hardcoded credentials. These are consumer-grade bugs sitting directly in front of hardened industrial equipment.</p>
<p dir="ltr">SuperMicro IPMI is a good example of how slowly this problem moves. California passed a law requiring device manufacturers to ship with unique passwords instead of hardcoded defaults. SuperMicro now ships with a password derived from your device serial number. Progress. They also still ship with IPMI and RAKP enabled by default, which is enough for an attacker to dump and crack credentials remotely without any exploitation at all. The attacker doesn't need to go after your hardened server. They go after the KVM attached to its serial port, and they're in.</p>
<h2>IPv6 is already on your network & you're probably not watching it</h2>
<p dir="ltr">A quick count on a modern laptop turns up 28 active network interfaces, the majority of them IPv6. This is normal. What's not normal is that most teams are only writing firewall rules for IPv4. A device with solid IPv4 filtering and no equivalent IPv6 rules may be exposing databases, fileshares, and credential stores to anyone on the same subnet through its IPv6 address,  an address nobody is scanning for, and that doesn't show up in any normal monitoring.</p>
<p dir="ltr">Recently, a customer using runZero was flagged for having a device with a public IP. The customer looked at it and said, that's impossible and that they knew every public IP on this network. It was a packet capture server which was supposed  to be completely internal. It had a global IPv6 address assigned by the upstream ISP router that nobody had ever noticed. The device was globally reachable in a way the customer had no visibility into whatsoever. This is not an unusual story. Shodan has indexed over 200 million IPv6 addresses, partly by running NTP servers that quietly log the source address of anything that syncs to them. Your OT devices might already be in there.</p>
<h2>So what can you do? It goes beyond monitoring</h2>
<p dir="ltr">Passive monitoring alone won't catch any of this. Span port captures don't see traffic that bypasses your choke points. They don't find multi-homed devices. They don't surface link-local IPv6 paths. Vulnerability scanners will tell you whether your firmware is out of date but they won't tell you whether your network is bridged in ways it shouldn't be.</p>
<p dir="ltr">This is the problem runZero was built to solve. We use safe, active scanning designed specifically for fragile OT environments  to query devices and have them report back everything: all interfaces, all IP addresses, IPv4 and IPv6, secondary NICs, VPN adapters, cellular connections. We cross-reference internal fingerprints against our internet-wide scan data so you can find out if something internal is externally reachable without having to start from the internet side. We find the bridges, the unexpected management interfaces, the IPv6 exposure, the out-of-band hardware that's been forgotten in a rack somewhere.</p>
<p dir="ltr">The point isn't that these problems are unfixable. It's that you can't fix what you can't see. The first step is knowing what's actually on your network,  not the diagram version, the real one.</p>
<p dir="ltr"><a href="https://www.runzero.com/contact-sales/" rel="noopener" target="_blank">Book a demo</a> to see how runZero can help in  your environment, or begin your free trial <a href="https://www.runzero.com/try/" rel="noopener" target="_blank">here</a>.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/scanning-global-networks/</id>
            <title>How to optimize runZero scanning for global networks</title>
            <published>2026-02-26T08:00:00-05:00</published>
            <updated>2026-02-26T08:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/scanning-global-networks/" />
            <summary type="html">Enterprise networks are complex. In this guide, we show how to optimize runZero for large-scale deployments using a hypothetical retail enterprise example.</summary>
                            <author>
                    <name>Ali Cheikh</name>
                </author>
                        <content type="html">
                <![CDATA[<p>A large enterprise network is a complex, distributed ecosystem connecting thousands of users, millions of devices, applications, and data centers across multiple geographic regions. It spans corporate headquarters, branch offices, retail locations, distribution centers, cloud environments, remote endpoints, SaaS platforms, and hybrid infrastructure — all interconnected through routers, switches, firewalls, VPNs, and identity systems.</p>
<p>Working solely with Enterprise customers at runZero, the topic of “how can we effectively and accurately discover all the assets in our attack surface” comes up quite frequently. At this scale, security teams must balance availability, <a href="https://www.runzero.com/blog/using-runzero-to-verify-network-segmentation/" rel="noopener" target="_blank">segmentation</a>, and performance while defending against increasingly sophisticated threats. Asset visibility, continuous discovery, and attack surface monitoring become even more pertinent the larger the environment is.</p>
<p>In this guide, we’ll walk through how to optimize runZero for large-scale deployments using a hypothetical retail enterprise example.</p>
<h2>Ex. scenario: global retail enterprise with six hour scan window</h2>
<p>Let’s discuss a hypothetical scenario where runZero is working with a large retail provider called ACME Corp and they want to achieve a six hour scan window for their whole infrastructure. This large retail has different brands they manage each with their own datacenter, stores, distribution centers and corporate offices. To add complexity, these brands use overlapping private IP ranges (e.g., multiple business units using 192.168.10.0/24) because they function as semi-independent entities.</p>
<figure><img src="/uploads/blog/scanning-global-networks/generic-retail-network-architecture.webp" data-image="310263" width="100%"></figure>
<p>Let’s dive into how runZero offers the flexibility and options to perform effective and accurate discovery of the retail provider’s total attack surface.</p>
<h2>Establishing the ground rules: Sites and IP organization</h2>
<p>First thing will be setting the foundation of IP address organization, since the brands are using overlapping IP addresses and they are distinct entities, we will leverage the concept of Sites in runZero. Sites allows enterprises to organize their data and each runZero Site is a unique view of the entire IP address space. </p>
<p>While many organizations use Sites to segment by geography, they are equally effective for:</p>
<ul><li>Business unit separation</li><li>Brand isolation</li><li>Temporary environments</li><li>One-off testing</li></ul>
<p>For ACME Corp, the best practice would be:</p>
<ul><li>Create one runZero Site per brand</li><li>Upload subnet allocations per Site</li><li>Apply structured tagging for reporting, dashboards, and queries</li></ul>
<p>This approach ensures that overlapping IP ranges do not collide in reporting or discovery results.</p>
<figure><img src="/uploads/blog/scanning-global-networks/sites-screenshot.webp" data-image="310295" width="100%"></figure>
<p>Assuming here that <a href="https://help.runzero.com/docs/installing-an-explorer/" rel="noopener" target="_blank">runZero Explorers</a> have already been deployed to the network, the next phase is to explore the plethora of configuration options available from runZero to customize the active scans.</p>
<p>runZero provides <a href="https://www.runzero.com/blog/internet-speed-tests/" rel="noopener" target="_blank">several key controls</a> that directly influence scan speed and network impact. Adjusting these settings impacts performance in terms of Explorer availability, network traffic load, and scan completion times.</p>
<h2>Performance tuning (scan speed)</h2>
<p>To ensure scans complete within their scheduled frequency without overwhelming the network, runZero provides several performance tuning options. The most direct way to reduce scan time is to increase the rate at which probes are sent. Increasing the scan speed (<strong>specially for IT/IoT environments that don't have fragile devices</strong>) and dividing up the scan scope will reduce the time to cover the network scanning.</p>
<p><strong>Scan Speed (Packets Per Second)</strong>: The default scan rate is 1,000 packets per second. For large, robust networks (e.g., data centers or high-speed corporate LANs), increasing this significantly (e.g., 10,000+ pps) to reduce the completion time. A rate of 1,000 packets per second is standard, while 10,000+ is available for large, fast networks. However, higher speeds increase the load on the network and may cause congestion on slower links.Note: The approximate formula for scan time is `hosts × ports × attempts ÷ scan speed`. Increasing the packet rate directly decreases the duration.</p>
<p><strong>Max Group Size</strong>: This setting determines how many IP addresses are scanned simultaneously. Increasing this (default is 4,096) allows for higher concurrency, which is essential for utilizing high packet rates effectively. Reducing this number lowers the concurrency of connections, which helps prevent crashing stateful devices like firewalls and routers that have limited session tables. In enterprise environments with high-capacity infrastructure, raising this value often improves efficiency.</p>
<p><strong>Max Host Rate</strong>: This limits the packets sent to a single host per second. While the default is conservative (40 pps) to protect fragile devices, increasing this for known robust segments can marginally speed up the scan of individual assets. This limits the packets sent to a single host per second. Lowering this is critical when scanning fragile IoT or OT environments to prevent device instability.</p>
<figure><img src="/uploads/blog/scanning-global-networks/advanced-scan-options.webp" data-image="310302" width="100%"></figure>
<h2>Scan frequency options</h2>
<p>runZero allows users to configure scans to run based on specific temporal requirements:</p>
<p><strong>Scheduled and Recurring Tasks</strong>: Scans can be set to run once at a specific future date or on a recurring basis. Recurring options include standard intervals (such as daily, weekly, or monthly) as well as more granular options like "Every <em>N</em> Hours" or specific multiples of minutes...</p>
<p><strong>Continuous Scanning</strong>: For organizations requiring near real-time visibility, runZero supports continuous recurring scans. These scans run back-to-back; as soon as one scan completes, the next begins. It is important to note that an Explorer running a continuous scan will not be able to run additional tasks unless its concurrency setting is increased beyond the default of 1.</p>
<h3>Impact on performance and resources</h3>
<p>Adjusting the frequency and speed of scans directly affects the load on the network and the Explorer.</p>
<p>Important considerations:</p>
<ul><li>Windows Explorers are limited to a single concurrent scan task due to raw packet driver limitations. If a continuous scan is running, other tasks (such as integrations or on-demand scans) may be queued or blocked.</li><li>Linux/macOS Explorers can perform multiple tasks simultaneously. runZero recommends keeping concurrent tasks between 1 and 4 to manage system resources effectively.</li></ul>
<p><strong>Scheduling Grace Period</strong>: To prevent scan failures caused by busy Explorers, users can configure a "scheduling grace period." This defines how long a task will wait for an available Explorer before timing out (e.g., if an Explorer is busy with a previous scan in a high-frequency schedule).</p>
<p>This is critical in high-frequency or distributed scan strategies.</p>
<figure><img src="/uploads/blog/scanning-global-networks/scan-config.webp" data-image="310303" width="100%"></figure>
<h2>Optimization for large IP spaces</h2>
<p>Large CIDRs such as /16 or /8 ranges can significantly increase scan time — especially when sparsely populated. To address this, runZero offers two powerful optimization methods called Prescan Modes:</p>
<p><strong>Subnet Sampling</strong>: This feature speeds up discovery by sending a small number of probes to a subnet to determine if it is active before launching a full scan. This significantly reduces the time required to scan large, sparse network ranges (e.g., /16 or /8), allowing for more frequent discovery cycles. Enabling the option "<strong>Only scan subnets with active hosts</strong>" This runs a pre-scan phase where runZero samples a percentage of a subnet (default 3%). If no assets respond, the subnet is skipped entirely. This dramatically reduces wasted time in unused address space and is essential for scanning massive environments within strict windows.</p>
<p><strong>Host Ping</strong>: Enabling "<strong>Limit scans to pingable hosts</strong>", in this mode, runZero first checks if a host responds to ICMP, TCP, or UDP pings. If it does not respond, the system skips the full deep-dive scan for that specific IP. This drastically reduces time but may miss assets that block pings.</p>
<p>This setting should be evaluated based on security tolerance and network policy.</p>
<figure><img src="/uploads/blog/scanning-global-networks/take-screenshot.webp" data-image="310322" width="100%"></figure>
<h2>Enforcing the window</h2>
<p>To ensure we are&nbsp;adhering to the six hour window, runZero provides a hard limit configuration.</p>
<p><strong>Scan Duration Limit</strong>: A maximum duration (in hours) can be specified for a scan task. If the scan is still running after six hours, runZero will automatically cancel the task. This ensures scan activity never bleeds outside the provided six hour maintenance window.</p>
<h2>Distributed scanning (Explorer Groups)</h2>
<p>A single Explorer scanning a global enterprise is often a bottleneck.</p>
<p><strong>Explorer Groups</strong>:&nbsp;Explorers can be deployed and organized into an "Explorer Group" and when assigned the scan task to a group, the platform distributes the workload among the available Explorers in that group. This allows parallelization of the scanning effort to fit within the six hour window.</p>
<p>For ACME Corp:</p>
<ul><li>Deploy Explorers per data center or region</li><li>Group them by brand or geography</li><li>Run scans in parallel across Sites</li></ul>
<p>This is often the most impactful method for achieving aggressive scan windows.</p>
<figure><img src="/uploads/blog/scanning-global-networks/explorer-groups.webp" data-image="310323" width="100%"></figure>
<p><strong>Concurrent Scans</strong>: If Linux or macOS Explorers are used, they can be configured to run multiple scan tasks simultaneously (Windows Explorers are limited to one concurrent scan). This is helpful to break a large network into multiple smaller sites and schedule them to run at the same time.</p>
<figure><img src="/uploads/blog/scanning-global-networks/explorer-details.webp" data-image="310324" width="100%"></figure>
<h2>Scope management</h2>
<p><strong>Exclusions</strong>: Some subnets create disproportionate delays and If there are specific subnets known to be slow (e.g., legacy networks) or that contain "tarpits" (firewalls that respond slowly to every probe), adding them to the <strong>Excluded hosts</strong> list will prevent them from consuming disproportionate amounts of time.</p>
<p>Adding these to the Excluded Hosts list prevents them from consuming excessive time during global scans.</p>
<p>This allows prioritization of high-value segments while isolating problematic areas for separate tuning.</p>
<h2>Summary: Checklist for achieving a six hour global scan</h2>
<p>As a summary, to meet a strict enterprise-wide window:</p>
<p>✔ Deploy multiple Explorers and use Explorer Groups</p>
<p>✔ Segment environments using Sites</p>
<p>✔ Enable Subnet Sampling for large ranges</p>
<p>✔ Increase scan speed where infrastructure permits</p>
<p>✔ Adjust Max Group Size and Host Rate per segment</p>
<p>✔ Configure a six hour Scan Duration Limit</p>
<p>✔ Exclude known bottlenecks</p>
<h2>Final Thoughts</h2>
<p>Large global enterprises do not fail at asset discovery due to scale and complexity but because of tool limitations and operational constraints.</p>
<p>runZero’s flexibility in segmentation, distributed scanning, prescan optimization, and performance tuning allows security architects to design discovery programs that are both comprehensive and operationally safe.</p>
<p>When configured strategically, even the most complex retail or global enterprise network can achieve accurate, repeatable asset visibility — within a defined and predictable time window.</p>
<p>Start a <a href="https://www.runzero.com/try/" rel="noopener" target="_blank">free trial</a> or <a href="https://www.runzero.com/contact-sales/" rel="noopener" target="_blank">request a demo</a> today to see firsthand how runZero can bring clarity to your most complex environments and turn visibility into your greatest security advantage.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/roundcube-webmail/</id>
            <title>Roundcube Webmail vulnerability: How to find affected assets</title>
            <published>2025-06-04T10:30:00-04:00</published>
            <updated>2026-02-20T16:55:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/roundcube-webmail/" />
            <summary type="html">A Roundcube Webmail vulnerability would allow a remote, authenticated attacker to perform RCE due to deserialization of untrusted data.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Roundcube Webmail&nbsp;vulnerability:&nbsp;CVE-2025-49113</h2>
<p>A <a href="https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10" rel="noopener" target="_blank">vulnerability has been disclosed</a> in&nbsp;Roundcube Webmail stable versions from 1.5 prior to 1.5.10,&nbsp;and stable versions 1.6 prior to 1.6.11 that&nbsp;would allow a remote, authenticated attacker&nbsp;to perform remote code execution (RCE) due to deserialization of untrusted data. The <em>_from</em> parameter in a URL is&nbsp;not validated in <em>program/actions/settings/upload.php</em>, resulting in untrusted PHP Object Deserialization. This vulnerability has&nbsp;existed within the product for approximately 10 years.</p>
<p>This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-49113" rel="noopener" target="_blank">CVE-2025-49113</a> and has a CVSS score of <strong>9.9</strong>&nbsp;(<strong>critical</strong>).</p>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/02/20/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system, potentially leading to complete system compromise.</p>
<h2>Are any updates or workarounds available?</h2>
<p>Roundcube has <a href="https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10" rel="noopener" target="_blank">released updates</a> to mitigate this issue. Users are encouraged to update to the latest stable&nbsp;version as quickly as possible.</p>
<ul><li>For Roundcube Webmail stable version 1.5, update to version 1.5.10 or later.</li><li>For Roundcube Webmail stable version 1.6, update to version 1.6.11 or later.</li></ul>
<h2>How do I find Roundcube Webmail installations&nbsp;with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" rel="noopener" target="_blank">Service Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>_asset.protocol:http AND protocol:http AND ((has:html.title AND html.title:="RoundCube%") OR (has:favicon.ico.image.md5 AND (favicon.ico.image.md5:="924a68d347c80d0e502157e83812bb23" OR favicon.ico.image.md5:="f1ac749564d5ba793550ec6bdc472e7c" OR favicon.ico.image.md5:="ef9c0362bf20a086bb7c2e8ea346b9f0")))</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/grandstream-voip-phones/</id>
            <title>Grandstream VoIP phone vulnerability: CVE-2026-2329</title>
            <published>2026-02-19T19:00:00-05:00</published>
            <updated>2026-02-19T19:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/grandstream-voip-phones/" />
            <summary type="html">Security researchers at Rapid7 reported a stack-based buffer overflow vulnerability that allows remote root RCE. Here&#039;s how to find affected assets.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest&nbsp;Grandstream VoIP&nbsp;phone&nbsp;vulnerability:&nbsp;CVE-2026-2329</h2>
<p>Security researchers at Rapid7&nbsp;<a href="https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed/" target="_blank">reported</a>&nbsp;a stack-based buffer overflow vulnerability in the HTTP API endpoint <em>/cgi-bin/api.values.get</em>. Successful exploitation could allow a remote, unauthenticated adversary achieve remote code execution (RCE) with root privileges on the phone.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-2329" target="_blank">CVE-2026-2329</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.3</strong>.</p>
<ul></ul>
<p><strong>The following models and versions are affected</strong><br></p>
<ul><li>GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630 firmware versions prior to 1.0.7.81</li></ul>
<h2>What are&nbsp;Grandstream GXP1600 Series VoIP Phones?</h2>
<p>The Grandstream GXP1600 series is a collection of entry-level, Linux-based Voice over Internet Protocol (VoIP) phones used for making and receiving voice calls over a network via the Session Initiation Protocol (SIP).</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630 upgrade to firmware version 1.0.7.81 or later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>hw:="Grandstream GXP16__" AND (os_version:&gt;0 AND os_version:&lt;"1.0.7.81")</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/cisa-bod-26-02-eos-and-runzero/</id>
            <title>CISA BOD 26-02, EOS, and runZero</title>
            <published>2026-02-19T07:00:00-05:00</published>
            <updated>2026-02-19T07:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/cisa-bod-26-02-eos-and-runzero/" />
            <summary type="html">CISA is keeping its EOS device list under wraps. Our resident former fed breaks down BOD 26-02 and shares a runZero query to help you find your exposed edge assets.</summary>
                            <author>
                    <name>todb</name>
                </author>
                        <content type="html">
                <![CDATA[<p>Hey internet! Back in early February, <a href="https://www.runzero.com/blog/bod-26-02-compliance/" rel="noopener" target="_blank">we told you</a> about CISA's new BOD 26-02 on end-of-support (EOS) devices on federal networks – specifically, edge devices, like firewalls, VPNs, routers, switches, proxies, all that. You know, the first (and often last) line of defense you have standing between the world's criminal masterminds and super-spies, which really, really should be getting regular care and feeding.</p>
<p>At first, we were all very excited about this BOD. It reads a whole lot like BOD 22-01, which is the binding operational directive that spawned the KEV, which is one of the most useful, free-to-use vulnerability intelligence resources the US Government has ever produced (of course, only if you use it correctly).<br></p>
<p>Alas, CISA has decided to make their list of identified EOL edge devices private, rather than blasting it out to the world. This is a real bummer, but it really does highlight how special the CISA KEV really is. As a former federal employee, I am here to tell you that when it comes to civilian government (and most other large enterprises), the default stance is to keep your mouth shut. Even in the best of times, cybersecurity people are often stingy with any scrap of intelligence, lest you accidentally inform the enemy on what's up with your infrastructure, and the federal government, doubly so.</p>
<p>I do expect that the list that CISA is compelled to produce in the BOD will get out regardless, since they've already committed to share it privately with state, local, tribal, and territorial governments (SLTT) and critical infrastructure providers (CI), but it won't be published in a formal or referenceable (or remixable or collidable) as the KEV.</p><h2>Find EOL/EOS devices with one simple query</h2>
<p>But in the meantime, we wanted to let runZero customers know how you can approximate the spirit, if not the letter, of what BOD 26-02 is after. It comes down to a fairly straightforward asset query:</p>
<pre><code>os_eol_extended:&lt;=now AND has_public:t AND NOT (type:Server OR type:Desktop OR type:Laptop)</code></pre>
<p>What this does is go over your already-collected inventory and looks for those devices that are a) in "EOL Extended" state, which is runZero's tag for those devices that are so end-of-life/end-of-service they will never see another security fix, b) exposed to the internet, and c) isn't a normal server, desktop or laptop.</p>
<p>Now, excluding (c) there is a little bit dubious – you probably <em>also</em> don't want EOS stuff that people are actually using to type email and surf the web, all naked and exposed to the wild and woolly internet – but this gets you to a place where you can seek out all those "devices" discussed on BOD 26-02, like so:</p>
<figure><img src="/uploads/blog/bod-26-02/filthy-edge-network.webp" data-image="309365" width="100%"></figure>
<p><em>(This is a particularly dirty network, and yours is certainly not this awful, but you get the idea.)</em></p>
<p>At any rate, we'll be fiddling with this over the next couple of weeks, and have a pretty self-contained single push-button thing to get you ahead of any BOD 26-02 worries, much like how we do with Section 889 compliance. And if you don't already know about Section 889… the feds certainly do, so you probably should too.</p>
<p><a href="https://www.runzero.com/try/" rel="noopener" target="_blank">Try runZero now!</a></p>
<figure><img src="/uploads/blog/bod-26-02/hypnotoad-try-runzero.webp" data-image="309366" width="100%"></figure>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/dell-recoverpoint/</id>
            <title>Dell RecoverPoint vulnerability: CVE-2026-22769</title>
            <published>2026-02-18T01:54:00-05:00</published>
            <updated>2026-02-18T01:54:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/dell-recoverpoint/" />
            <summary type="html">Dell disclosed certain versions of Dell RecoverPoint for Virtual Machines contain a hardcoded credential vulnerability. Here&#039;s how to find affected assets.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Dell RecoverPoint vulnerability:&nbsp;CVE-2026-22769</h2>
<p>Dell&nbsp;<a href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" target="_blank">disclosed</a>&nbsp;certain versions of Dell RecoverPoint for Virtual Machines (RP4VMs)&nbsp;contain a hardcoded credential vulnerability. Successful exploitation could allow a remote, unauthenticated adversary with knowledge of the hardcoded credential to gain unauthorized access to the underlying operating system and achieve root-level persistence.&nbsp;The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-22769" target="_blank">CVE-2026-22769</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>10.0</strong>.<br></p>
<ul></ul>
<p>There is <a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day" target="_blank">evidence</a> that this vulnerability <strong>is being <a href="https://www.cisa.gov/news-events/alerts/2026/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank">actively</a> exploited in the wild</strong>.</p>
<ul></ul>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>RecoverPoint for Virtual Machines versions prior to 6.0.3.1 HF1</li></ul>
<h2>What is Dell RecoverPoint for Virtual Machines?</h2>
<p>Dell RecoverPoint for Virtual Machines is a software-based orchestration tool that provides continuous data protection for VMware environments by capturing and replicating hypervisor-level write operations to a journal, allowing a VM to be rolled back to any specific point in time.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerabilities would allow an adversary to gain unauthorized access to the underlying operating system and achieve root-level persistence.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>RecoverPoint for Virtual Machines upgrade to version 6.0.3.1 HF1 and later</li></ul>
<p>If an immediate upgrade is not feasible, apply the remediation script for <a href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" target="_blank">DSA-2026-079</a> as soon as possible to mitigate risk.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>hw:="RecoverPoint for Virtual Machines" OR os:="EMC RecoverPoint" OR hw:="EMC RecoverPoint"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/solarwinds/</id>
            <title>Latest SolarWinds vulnerabilities: how to find affected assets</title>
            <published>2024-10-17T10:29:00-04:00</published>
            <updated>2026-02-13T18:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/solarwinds/" />
            <summary type="html">SolarWinds has disclosed multiple vulnerabilities affecting certain versions of WHD: CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, CVE-2025-40554, and CVE-2025-40536</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest SolarWinds vulnerabilities:&nbsp;CVE-2025-40551,&nbsp;CVE-2025-40552, CVE-2025-40553, CVE-2025-40554, and&nbsp;CVE-2025-40536</h2>
<p>SolarWinds has <a href="https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm" target="_blank">disclosed</a> multiple vulnerabilities affecting certain versions of&nbsp;Web Help Desk (WHD).<br></p>
<ul><li>An untrusted data deserialization vulnerability that could lead to remote code execution (RCE)&nbsp;designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-40551" target="_blank">CVE-2025-40551</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.&nbsp;Successful exploitation allows a remote, unauthenticated adversary to execute arbitrary code on the host machine. There is <a href="https://www.cisa.gov/news-events/alerts/2026/02/03/cisa-adds-four-known-exploited-vulnerabilities-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</li><li>An authentication bypass vulnerability designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-40552" target="_blank">CVE-2025-40552</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>. A remote, unauthenticated adversary could exploit this to trigger actions and methods that should otherwise be restricted.</li><li>An untrusted data deserialization vulnerability that could lead to RCE&nbsp;designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-40553" target="_blank">CVE-2025-40553</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>. Successful exploitation allows a remote, unauthenticated adversary to execute arbitrary code on the host machine.</li><li>An authentication bypass vulnerability designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-40554" target="_blank">CVE-2025-40554</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.&nbsp;A remote, unauthenticated adversary could exploit this to invoke specific actions within Web Help Desk.</li><li>A&nbsp;security control bypass&nbsp;vulnerability&nbsp;designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-40536" target="_blank">CVE-2025-40536</a> and has been rated <em><em>high</em></em> with a CVSS score of <strong>8.1</strong>.&nbsp;Successful exploitation allows a remote, unauthenticated adversary to gain access to certain restricted functionality. There is <a href="https://www.cisa.gov/news-events/alerts/2026/02/12/cisa-adds-four-known-exploited-vulnerabilities-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</li></ul>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>SolarWinds Web Help Desk versions prior to 12.8.8 Hotfix 1 (HF1)</li></ul>
<ul></ul>
<h2>What is&nbsp;SolarWinds Web Help Desk?<br></h2>
<p>SolarWinds Web Help Desk is an on-premises IT service management (ITSM) software that automates help desk ticketing, asset tracking, and change management through a centralized, self-hosted platform.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2>Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>SolarWinds Web Help Desk upgrade to version 12.8.8 Hotfix 1 (HF1) or later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=SolarWinds AND product:="Web Help Desk"</code></pre>
<hr>
<h2>September 2025:&nbsp;CVE-2025-26399</h2>
<p>SolarWinds has <a href="https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26399" target="_blank">disclosed</a> a deserialization of untrusted data vulnerability in the <em>AjaxProxy</em> component&nbsp;of its Web Help Desk (WHD). Successful exploitation allows a remote, unauthenticated adversary to achieve remote code execution (RCE) on the host machine. This vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2025-26399" target="_blank">CVE-2025-26399</a> and has been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8</strong>.&nbsp;This vulnerability bypasses the patch for <a href="https://www.cve.org/CVERecord?id=CVE-2024-28988" target="_blank">CVE-2024-28988</a>, which in turn was an incomplete fix for the original vulnerability, <a href="https://www.cve.org/CVERecord?id=CVE-2024-28986" target="_blank">CVE-2024-28986</a>.<br></p>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>SolarWinds Web Help Desk versions prior to 12.8.7 Hotfix 1 (HF1)</li></ul>
<ul></ul>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2>Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>SolarWinds Web Help Desk upgrade to version 12.8.7 Hotfix 1 (HF1) or later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=SolarWinds AND (product:="Web Help Desk" OR product:="webhelpdesk") AND (version:&gt;0 AND version:&lt;12.8.7.2174)</code></pre>
<hr>
<h2>October 2024: CVE-2024-28987</h2>
<p dir="ltr">According to the&nbsp;US Cybersecurity and Infrastructure Security Agency (CISA), a critical hardcoded password&nbsp;vulnerability within SolarWinds' Web&nbsp;Help Desk software is actively being exploited and was added to their Known Exploited Vulnerability (KEV)&nbsp;catalog.&nbsp;</p>
<ul><li dir="ltr"><p dir="ltr"><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-28987" target="_blank">CVE-2024-28987</a> is rated <em><strong>critical</strong></em> with CVSS score of <strong>9.1 </strong>allowing for unauthorized access by a remote attacker.</p></li></ul>
<h3>What is the impact?</h3>
<p>A remote attacker has the ability to log in to&nbsp;a vulnerable system using hardcoded credentials, providing access to internal information with the ability to&nbsp;modify the data.</p>
<h3>Are updates or workarounds available? </h3>
<p>According to&nbsp;the&nbsp;<a href="https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987" target="_blank">security advisory</a>&nbsp;issued by SolarWinds, systems&nbsp;running&nbsp;"WHD 12.8.3 HF1 and all previous versions"&nbsp;of the Web&nbsp;Help Desk software are affected. Organizations are recommended to manually apply the <a href="https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2" target="_blank">hot fix</a> released by SolarWinds to remove the hardcoded credentials from the software.</p>
<h3>How to find potentially vulnerable systems with runZero </h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/service" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>_service.product:="SolarWinds:Web Help Desk:"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/how-to-use-the-kev-collider/</id>
            <title>How to use the KEV collider: A quick tour</title>
            <published>2026-02-12T08:00:00-05:00</published>
            <updated>2026-02-12T08:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/how-to-use-the-kev-collider/" />
            <summary type="html">Layer signals and test filters to see risk indicators interact across the KEV catalog in real time. No install. No creds. Just open &amp; start experimenting.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<p>The CISA KEV Catalog updates throughout the week. CVSS scores shift. EPSS probabilities fluctuate. Exploit code appears and evolves. But so many vulnerability workflows treat all this movement like background noise, something to acknowledge but not really use.</p>
<p>That's the gap our new tool,&nbsp;<a href="https://www.runzero.com/kev-collider/" rel="noopener" target="_blank">KEV Collider</a>,  fills. This is our daily-updated web application that lets you layer signals, test filters, and watch how different risk indicators interact across the catalog in real time. No installation. No credentials. Just open it and start experimenting.</p>
<h2>What you can actually do with it</h2>
<p>The KEV Collider is designed to help you figure out what’s most important for your organization and your team by making the data interrogatable. Here's what that looks like in practice.</p>
<h2>Filter for your infrastructure</h2>
<p>Every environment has its own risk profile. Maybe you care about network-accessible vulnerabilities that require no user interaction. Or maybe you need to identify everything Microsoft released on Patch Tuesday that's since appeared on the KEV.&nbsp;</p>
<p>KEV Collider allows you to&nbsp;filter across:</p>
<ul><li><p><strong>CVSS metrics:</strong> Attack vector, privileges required, user interaction, impact scores</p></li><li><p><strong>KEV metadata:</strong> Date added, date due, vendor, product, ransomware usage</p></li><li><p><strong>EPSS signals: </strong>Current probability, trending direction, magnitude of change</p></li><li><p><strong>Exploit availability:</strong> Public “commodity” exploits vs targeted, private exploitation</p></li></ul>
<p>Want to see only straight-shot remote code execution vulnerabilities? <a href="https://www.runzero.com/kev-collider/?sort=kev.dateDue%3Adesc&cvss.av=network&cvss.pr=none&cvss.ui=none&cvss.i=high" rel="noopener" target="_blank">There's a preset for that</a>. Need to track EPSS vulnerabilities where exploitation probability is actively shifting? <a href="https://www.runzero.com/kev-collider/?epss.delta-direction=increasing" rel="noopener" target="_blank">Filter for it.</a></p>
<figure><img src="/uploads/assets/kev-collider/kev-collider-bento-1.webp" data-image="307730" width="100%"></figure>
<h2>Test signal combinations, not just individual scores</h2>
<p>One of the KEV Collider's core design principles is that single metrics don't tell the whole story. A high CVSS score without active exploitation is different from a moderate score that's trending on EPSS. A KEV entry added last month behaves differently than one added this week, even if both have the same due date.</p>
<p>The tool makes these combinations visible. For example, maybe you want to look at just Microsoft vulnerabilities, cross-referenced against reported ransomware campaign usage, and really only those rated as a CVSS “High” or worse, then sort what’s left by the KEV due date rather than the KEV add date.  <a href="https://www.runzero.com/kev-collider/?sort=kev.dateDue%3Adesc&kev.ransomware=true&kev.vendor-project=microsoft&cvss.base-severity=critical%2Chigh" rel="noopener" target="_blank">Here’s a sample filter for just that</a>, all through the magic of HTTP GET parameters. The goal is to surface patterns that only emerge when you look at multiple signals together.</p>
<h2>Understand timing</h2>
<p>When a vulnerability appears on the KEV matters as much as whether it appears at all. The KEV Collider tracks:</p>
<ul><li><p>Date added to the KEV</p></li><li><p>Date due under BOD 22-01</p></li><li><p>Day of the week it was added (useful for spotting Patch Tuesdays or unusual Friday to Sunday additions)</p></li><li><p>EPSS momentum: whether exploitation probability is increasing, decreasing, or stable, as of today.</p></li></ul>
<p>This temporal context helps distinguish between commoditized mass exploitation and newly emerging threats. A vulnerability added to the KEV three months ago with stable EPSS tells a different operational story than one added yesterday with a sharp EPSS spike.</p>
<figure><img src="/uploads/assets/kev-collider/kev-collider-bento-2.webp" data-image="307734" width="100%"></figure>
<h2>Three ways to start using KEV Collider today</h2>
<h3><strong>1. Run the presets, then modify them</strong></h3>
<p><strong></strong>Start with one of the built-in presets and see what they return. Then adjust the filters to reflect your own priorities. The presets are hypothesis starters, not final answers.</p>
<h3>2. Compare vendor behavior</h3>
<p><strong></strong>Filter by specific vendors and watch how their KEV entries cluster. Do certain vendors show up disproportionately on particular days? Do their vulnerabilities trend differently on EPSS? These patterns can inform patching cadence and vendor risk assessments.</p>
<h3>3. Test your assumptions</h3>
<p><strong></strong>Think high CVSS scores correlate perfectly with KEV urgency? Filter for CVSS 9+ and sort by date due. Believe all network-accessible RCE is equally critical? Layer in EPSS to see which ones are actually being exploited at scale. The tool is designed to challenge conventional wisdom by letting you measure it.</p>
<h2>Built to help empower defenders like you</h2>
<p>The KEV Collider is a community resource. It's hosted by runZero, updated daily, and built entirely on open-source data. There's no paywall, no required sign-up, and no attempt to prescribe priorities. We're releasing it because defenders need tools that support thoughtful, repeatable reasoning, not just checkbox coverage.</p>
<p>Compliance-driven patching treats every KEV entry the same because regulations can't accommodate nuance. But operational security requires exactly that: distinguishing signal from noise, urgency from ceremony, and real risk from theoretical possibility.</p>
<h2>Where it fits in your workflow</h2>
<p>The KEV Collider doesn't replace your vulnerability management platform or patching process. It's a layer above those tools, offering a place to validate assumptions, explore signal combinations, and test prioritization hypotheses before translating them into operational decisions.</p>
<h3>Use KEV Collider&nbsp;to:</h3>
<ul><li><p>Audit whether your current patching priorities align with actual threat behavior</p></li><li><p>Identify blind spots in your vulnerability triage process</p></li><li><p>Build evidence-based arguments for resource allocation</p></li><li><p>Train your team to think critically about risk signals instead of treating scores as gospel</p></li></ul>
<p>The CISA KEV is an operational signal, not a static list. The KEV Collider treats it that way.</p>
<h2>Get started</h2>
<p><a href="https://www.runzero.com/kev-collider/" rel="noopener" target="_blank">Explore the KEV Collider</a>. For the research foundation behind it, read our new <a href="https://www.runzero.com/resources/kevology/" rel="noopener" target="_blank">KEVology report</a>. And if you want to see how KEV entries map to your actual asset inventory, <a href="https://www.runzero.com/try/">try runZero</a> for free.<a href="https://www.runzero.com/research/runzero-hour/" rel="noopener" target="_blank"></a><a href="https://www.runzero.com/research/runzero-hour/" rel="noopener" target="_blank"></a><a href="https://www.runzero.com/research/runzero-hour/" rel="noopener" target="_blank"></a></p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/beyondtrust-appliances/</id>
            <title>BeyondTrust RCE vulnerability: CVE-2026-1731</title>
            <published>2024-12-20T00:00:00-05:00</published>
            <updated>2026-02-08T22:40:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/beyondtrust-appliances/" />
            <summary type="html">BeyondTrust has disclosed a pre-authentication RCE vulnerability affecting certain versions of both RS and PRA. Here&#039;s how to find impacted assets.</summary>
                            <author>
                    <name>Matthew Kienow</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest BeyondTrust vulnerability:&nbsp;CVE-2026-1731</h2>
<p>BeyondTrust <a href="https://www.beyondtrust.com/trust-center/security-advisories/bt26-02" target="_blank">disclosed</a> a pre-authentication remote code execution (RCE) vulnerability affecting certain versions of both Remote Support (RS) and Privileged Remote Access (PRA). This flaw is triggered via specially crafted client requests sent to the appliance. Successful exploitation could allow a remote, unauthenticated adversary to execute arbitrary operating system commands in the context of the site user, potentially leading to full system compromise. The vulnerability has been designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-1731" target="_blank">CVE-2026-1731</a> and has been rated <em>critical</em>&nbsp;with a CVSS score of <strong>9.9</strong>.<br></p>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/02/13/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<ul></ul>
<p><strong>The following versions are affected</strong><br></p>
<ul><li>Remote Support (RS) versions 25.3.1 and prior</li><li>Privileged Remote Access (PRA) versions 24.3.4 and prior</li></ul>
<ul></ul>
<h2>What are BeyondTrust&nbsp;Remote Support, and&nbsp;Privileged Remote Access?<strong><br></strong></h2>
<p><strong>BeyondTrust Remote Support (RS)</strong> is an enterprise platform designed for help desks to securely access and troubleshoot end-user devices or mobile platforms across any network without a VPN.</p>
<p><strong>BeyondTrust&nbsp;Privileged Remote Access (PRA)</strong> is a zero-trust security solution providing vendors and internal admins with granular, audited access to critical infrastructure without granting full network visibility.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.</p>
<h2>Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Remote Support (RS) versions 21.3 and older upgrade to a newer version to apply patch BT26-02-RS</li><li>Remote Support (RS) versions 25.3.1 and prior upgrade to version 25.3.2 and later</li><li>Privileged Remote Access (PRA) versions 22.1 and older upgrade to a newer version to apply patch BT26-02-PRA</li><li>Privileged Remote Access (PRA) versions 24.3.4 and prior upgrade to version 25.1.1 and later</li></ul>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/services" target="_blank">Services Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>_asset.protocol:=http AND protocol:=http AND
  (product:="BeyondTrust Remote Support" OR
  product:="Beyond Trust Remote Support" OR
  product:="BeyondTrust BeyondTrust Remote Support" OR
  product:="BeyondTrust Privileged Remote Access")
  AND _service.product:beyondtrust</code></pre>
<hr>
<h2>January 2025:&nbsp;CVE-2024-12356</h2>
<p>BeyondTrust&nbsp;<a href="https://www.beyondtrust.com/trust-center/security-advisories/bt24-10" target="_blank">disclosed</a>&nbsp;that affects their&nbsp;Privileged Remote Access (PRA) and Remote Support (RS) appliances. This has also been added to the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">CISA KEV</a> as it has been exploited in the wild.</p>
<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-12356" target="_blank">CVE-2024-12356</a>&nbsp;is rated <strong><em>highly-critical</em></strong> with a CVSS score of <strong>9.8</strong>. Successful exploitation of this vulnerability would allow an attacker execute arbitrary commands on the appliance.</li></ul>
<h2>What is the impact?</h2>
<p>The issue impacts PRA and RS versions <strong>24.3.1 and earlier</strong>.</p>
<h2>Are updates or workarounds available?</h2>
<p>BeyondTrust has released a patch for all supported iterations of PRA and RS versions <strong>22.1.x and higher</strong> and has applied the patch to cloud customers earlier this week.</p>
<h2>How do I find potentially vulnerable systems with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Services Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>vendor:BeyondTrust or http.body:BeyondTrust
</code></pre>
<p>From the <a href="https://console.runzero.com/inventory" target="_blank">Assets Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre>os:BeyondTrust OR hw:BeyondTrust OR os:Bomgar OR hw:Bomgar</pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/bod-26-02-compliance/</id>
            <title>How runZero helps agencies meet CISA BOD 26-02 compliance</title>
            <published>2026-02-06T14:30:00-05:00</published>
            <updated>2026-02-06T14:30:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/bod-26-02-compliance/" />
            <summary type="html">Achieve total visibility and BOD 26-02 compliance. Discover every asset, validate your edge, and surface EOL/EOS risks in minutes. Start your free trial.</summary>
                            <author>
                    <name>Colin Dupreay</name>
                </author>
                        <content type="html">
                <![CDATA[<p>On February 5th, 2026 the Cybersecurity and Infrastructure Security Agency (CISA) published Binding Operational Directive <a href="https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices" rel="noopener" target="_blank">BOD 26-02</a>: <em>Mitigating Risk From End-of-Support Edge Devices</em> directing agencies to update or remove End-of-Support (EOS) Edge devices.&nbsp;</p>
<p>For context, a&nbsp;Binding Operational Directive&nbsp;(BOD) is a “<em>compulsory direction to federal, executive branch, departments and agencies for purposes of safeguarding federal information and information systems</em>.”&nbsp;<sup><a href="https://www.cisa.gov/news-events/directives/bod-26-02-mitigating-risk-end-support-edge-devices" target="_blank">1</a></sup>&nbsp; While BODs do not apply to certain agencies whose systems are classified as national security systems (NSS), they do apply to all federal civilian executive branch agencies.</p>
<h2>What is BOD 26-02?</h2>
<p>BOD 26-02 mandates a two-year program requiring all affected agencies to identify and address unsupported edge devices, <strong>effective February 5, 2026.</strong></p>
<ul><li><p>All federal agencies <a href="https://www.cisa.gov/news-events/directives/federal-civilian-executive-branch-agencies-list" rel="noopener" target="_blank">under CISA’s authorities</a> must immediately update all <strong>supported</strong> edge devices.</p></li><li><p>In three months (May 5, 2026), federal agencies must identify those devices in production listed on the “CISA EOS Edge Device List.” These agencies must also have a mechanism in place to identify <strong>all</strong> supported and unsupported edge devices in production, regardless of CISA’s list.</p></li><li><p>In a year (Feb 5, 2027), all devices on CISA’s list of unsupported devices should be updated or replaced by all federal agencies.</p></li><li><p>In 18 months (August 5, 2027), all unsupported edge devices must be updated or replaced by all federal agencies, regardless if they’re on CISA’s list or not.</p></li><li><p>In two years (Feb 5, 2028), all federal agencies must have a continuous mechanism to identify all edge devices, and ensure that only supported devices are in production.</p></li></ul>
<p>While BOD 26-02 specifically calls out the risk of having EOS edge devices on a network, CISA states that “EOS devices should not reside anywhere on federal networks.” Here at runZero, we couldn’t agree more! But, for the purposes of BOD 26-02, “edge devices” are often, but not limited to, devices such as firewalls, switches, routers, load-balancers, proxies, reverse proxies, VPN gateways, or combinations thereof. Interestingly, security vendors products whose devices often live at the edge were the most frequently exploited devices in 2024. Unsupported devices, no matter where they exist in an organization, pose a significant risk to organizations.</p>
<p>We go into this in some depth in our recent report, "<a href="https://www.runzero.com/resources/undead-by-design-report/" rel="noopener" target="_blank">Undead by Design</a>, Benchmarking end-of-life operating systems," where we concentrate specifically on operating systems and their prevalence across industry sectors, and more importantly, <strong>why</strong> unsupported systems linger for so long in production.</p>
<h2>BOD 26-02 compliance challenges</h2>
<p>	When it comes detecting and discovering unsupported edge devices, two main challenges arise almost immediately: </p>
<ol><li><p><strong>Accurate discovery and fingerprinting of EOS devices</strong></p></li><li><p><strong>Defining the Edge</strong></p></li></ol>
<p>	The first challenge, accurate discovery and fingerprinting of EOS devices, has been traditionally solved via manually managed Excel spreadsheets, IPAM, or not at all. That is to say, having and maintaining an accurate and up to date asset inventory has traditionally been a collection of disjointed systems, programs, or procedures, leading to an incomplete and inaccurate list of what's on the network, starting from the moment that list is produced. This spotty and laggy coverage makes it difficult to impossible to identify with accuracy <strong>anything</strong> on the network, let alone unsupported devices.  </p>
<p>This takes us to our second challenge of defining the edge. Oftentimes, organizations think they know where their perimeter lies, but shadow IT, network misconfigurations, and wandering “bring your own devices” (BYODs) all can extend the perimeter beyond what was known. This exposure of unknown devices, supported or otherwise, represents a real risk to agencies that are often under constant attack from adversaries looking to steal, disrupt, or destroy US infrastructure.&nbsp;</p>
<h2>How runZero supports BOD 26-02</h2>
<p>	Accurately and expediently discovering assets can be a daunting task, especially if you don't know where to start. runZero can help agencies discover all of their assets, validate the edge, and <a href="https://www.runzero.com/blog/eol-asset-risk-management/" rel="noopener" target="_blank">identify EOL and EOS devices,</a> before the adversaries do. With runZero, agencies can:</p>
<h3>1. Discover all assets</h3>
<p>Through novel unauthenticated active scanning, passive discovery, and API integrations, runZero can identify, fingerprint, and report on your entire systems risk and exposure, including aging, unmaintained, and forgotten EOS devices. </p>
<figure><img src="/uploads/blog/bod-26-02/image1-bod-26-02.webp" data-image="307127" width="100%"></figure>
<h3>2. Identify all edge assets (supported or otherwise)</h3>
<p>runZero can scan both internally and <a href="https://www.runzero.com/blog/external-scanning/" rel="noopener" target="_blank">externally</a>, providing agencies a comprehensive view of the internal and external attack surfaces. Utilizing native reporting, agencies can validate their edge devices, including EOS devices. </p>
<figure><img src="/uploads/blog/bod-26-02/image2-bod-26-02.webp" data-image="307106" width="100%"></figure>
<h3>3. Native EOL asset discovery</h3>
<p>runZero includes native alerting capabilities when EOL devices are discovered:' or 'runZero includes a native alerting capability when EOL devices are discovered:</p>
<figure><img src="/uploads/blog/bod-26-02/image3-bod-26-02.webp" data-image="307110" width="100%"></figure>
<p>If there are devices that runZero cannot track support for, Government off-the-shelf (GOTS) or classified devices for example, custom queries allow agencies to build and track their own inventories: </p>
<figure><img src="/uploads/blog/bod-26-02/image4-bod-26-02.webp" data-image="307114" width="100%"></figure>
<p>These queries can then be tracked on a simple dashboard, allowing for easy access to offending assets.</p>
<figure><img src="/uploads/blog/bod-26-02/image5-bod-26-02.webp" data-image="307113" width="100%"></figure>
<h3>4. Goals for tracking</h3>
<p>runZero queries can also be used to build custom Goals, so progress can be tracked toward BOD compliance.</p>
<figure><img src="/uploads/blog/bod-26-02/image6-bod-26-02.webp" data-image="307112" width="100%"></figure>
<figure><img src="/uploads/blog/bod-26-02/image7-bod-26-02.webp" data-image="307111" width="100%"></figure>
<h2>What’s next for your BOD 26-02 strategy</h2>
<p>runZero’s unparalleled asset discovery and fingerprinting can empower agencies to expeditiously discover and maintain an asset inventory for their entire systems. Even more immediately, runZero can help agencies accomplish the requirements of BOD 26-02 before the milestones laid out by CISA.&nbsp;</p>
<p><a href="https://www.runzero.com/try/" rel="noopener" target="_blank">Start a free trial</a> in minutes or <a href="https://www.runzero.com/contact-sales/" rel="noopener" target="_blank">book a demo</a> for a guided tour.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/making-cisa-kev-actionable/</id>
            <title>Making the CISA KEV actionable for real-world risk</title>
            <published>2026-02-05T06:30:00-05:00</published>
            <updated>2026-02-05T06:30:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/making-cisa-kev-actionable/" />
            <summary type="html">If you want to understand what the KEV is actually telling you, read our new KEVology report, then take the analysis into the lab with the KEV Collider.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<p dir="ltr">The CISA Known Exploited Vulnerabilities (KEV) Catalog is one of the most influential signals in vulnerability management worldwide. It’s also one of the most misunderstood.</p>
<p dir="ltr">Some teams treat KEV like a compliance punch list: a fixed set of “things to patch,” universally urgent, universally applicable. But that isn’t what KEV is. It’s an operational signal—produced under real constraints, reflecting real exploitation, and designed to drive action in a very specific context.</p>
<h2>Two new KEV resources, now live!</h2>
<p dir="ltr">Today, we’re releasing two new resources that approach KEV the way defenders actually have to work: by reasoning under uncertainty, mixing imperfect signals, and making defensible decisions when time and coverage are limited.</p>
<h3>KEVology:&nbsp;how exploits, scores, and timelines intersect on the CISA KEV</h3>
<p dir="ltr">A&nbsp;new report by Tod Beardsley, former CISA Section Chief for the KEV, analyzing how KEV entries behave across exploits, scores, and timelines, and what actually matters in real environments.</p>
<p dir="ltr">&#x1f9ea; <a href="https://www.runzero.com/resources/kevology/" target="_blank"><strong>Read the report</strong></a>&nbsp;➜</p>
<figure><a href="https://www.runzero.com/resources/kevology/" target="_blank"></a><a href="https://www.runzero.com/kev-collider/" target="_blank"><img src="/uploads/assets/research-report/KEVology/finals/Report-Tile_Title.webp" data-image="297968" alt="KEVology" width="100%"></a></figure>
<h3>KEV Collider</h3>
<p>A community-first web application and dataset that lets you smash together risk and threat signals and measure what falls out—so you can explore, validate, and adapt the analysis to your own operational reality.</p>
<p>&#x1f680; <a href="https://www.runzero.com/kev-collider/" target="_blank"><strong>Launch KEV Collider</strong></a>&nbsp;➜</p>
<figure><a href="https://www.runzero.com/kev-collider/" rel="noopener" target="_blank"><img src="/uploads/assets/kev-collider/Tool-Tile_Graphic.webp" data-image="298099" alt="KEV Collider" width="100%"></a></figure>
<h2>The uncomfortable truth about KEV</h2>
<p dir="ltr">The starting point for both resources is a simple but uncomfortable truth: the KEV is not a list of “the worst vulnerabilities ever,” and it was never meant to be treated as one. KEV is a constrained catalog shaped by explicit criteria and real-world tradeoffs. Every entry reflects observed exploitation—but not every entry carries the same urgency, impact, or relevance for every environment.</p>
<p dir="ltr">That distinction matters because most vulnerability teams aren’t operating under a single mandate or timeline. Outside of strict <a href="https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities" rel="noopener" target="_blank">BOD 22-01</a> compliance, treating every KEV as equal quickly collapses under operational scrutiny. Teams have limited patching windows, uneven asset visibility, and competing priorities that can’t be resolved by a single score or list.</p>
<p dir="ltr">KEVology takes this problem seriously by treating KEV as data rather than doctrine. Instead of asking whether KEV entries are “important” in the abstract, the report examines how they behave in practice. We explore how commodity exploitation, scoring systems, and timelines interact over time, and where those interactions produce clarity or confusion for defenders. The goal isn’t to undermine KEV, but to make its signal more usable by everyone, inside and outside the US federal government. </p>
<h2>Why no single metric can prioritize risk</h2>
<p dir="ltr">One of the report’s core conclusions is that no single metric can do prioritization for you. CVSS describes potential impact, not likelihood. EPSS models probability, but not exposure. SSVC adds decision framing, but can’t know your environment. Even “exploit exists” is a blunt signal without context. What actually supports better decisions is the combination of signals, especially when you pay attention to <em>when</em> things happen, not just <em>what</em> happens.</p>
<p dir="ltr">That’s where our new KEV Collider tool comes in.</p>
<h2>From analysis to experimentation</h2>
<p dir="ltr">The KEV Collider is designed as a companion to the report: a place to test assumptions rather than accept conclusions. Developed and hosted by runZero, it’s a daily-updated web application built on open-source data that layers the CISA KEV catalog with the enrichment an investigator needs to distinguish between theoretical risk and real-world fire drills. Instead of prescribing priorities, it lets you explore how different signals combine and how those combinations change the story you tell about risk.</p>
<p dir="ltr">Together, KEVology and KEV Collider turn KEV analysis into a controlled and shareable experiment. They’re meant to help teams move beyond checkbox coverage and toward evidence-based reasoning, where prioritization is treated honestly and transparently, as a hypothesis about the world that must be tested, defended, and revised over time.</p>
<h2>Start with the report. Then take it into the lab.</h2>
<p dir="ltr">If you want to understand what the KEV is actually telling you, <a href="https://www.runzero.com/resources/kevology/" rel="noopener" target="_blank">start with the report</a>, then take the analysis into the lab with the <a href="https://www.runzero.com/kev-collider/" rel="noopener" target="_blank">KEV Collider</a>. The KEV will keep evolving. The best way to keep up is to interrogate vulnerabilities with the same rigor attackers apply to exploiting them.</p>
<p>Want to run a holistic experiment in your own environment? runZero surfaces the asset context you need to do it. <a href="https://www.runzero.com/try/" rel="noopener" target="_blank">Try runZero</a> for free today.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/openclaw/</id>
            <title>OpenClaw RCE vulnerability: CVE-2026-25253</title>
            <published>2026-02-03T10:00:00-05:00</published>
            <updated>2026-02-03T10:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/openclaw/" />
            <summary type="html">depthfirst has reported a RCE vulnerability in OpenClaw that could lead to complete system compromise if exploited. Here&#039;s how to find affected assets.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest OpenClaw vulnerability: CVE-2026-25253</h2>
<p>depthfirst has <a href="https://depthfirst.com/post/1-click-rce-to-steal-your-moltbot-data-and-keys" rel="noopener" target="_blank">reported a vulnerability</a> in the OpenClaw personal assistant tool.&nbsp;This flaw allows a remote, unauthenticated attacker one-click remote code execution via authentication token exfiltration exposed through a WebSocket. Successful exploitation could allow complete system compromise.</p>
<p>This vulnerability has been assigned <a href="https://www.cve.org/CVERecord?id=CVE-2026-25253" rel="noopener" target="_blank">CVE-2026-25253</a> and is rated <strong><em>high</em></strong>&nbsp;has a CVSS score of <strong>8.8</strong>.<br></p>
<p><strong>The following versions are affected</strong></p>
<ul><li>OpenClaw versions up to but not including 2026.1.29</li></ul>
<h2>What is OpenClaw?</h2>
<p>OpenClaw is an open-source, autonomous AI personal assistant that&nbsp;runs locally on user devices. It is&nbsp;designed to manage digital tasks by interacting with apps and&nbsp;websites on the user's behalf.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>The OpenClaw project has released version 2026.1.29 of OpenClaw. Users are urged to update as quickly as possible.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software inventory</a>, use the following query to locate potentially vulnerable assets:</p>
<pre><code>vendor:=OpenClaw product:=OpenClaw</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/internet-speed-tests/</id>
            <title>Run Internet speed tests from runZero Explorers</title>
            <published>2026-02-03T09:00:00-05:00</published>
            <updated>2026-02-03T09:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/internet-speed-tests/" />
            <summary type="html">Get an early signal into usability before you scan. Measure internet connectivity via runZero Explorers to remove uncertainty, with audit logs included.</summary>
                            <author>
                    <name>Pete Caldecourt</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Know your site is ready before you scan</h2>
<p>Rolling out scans at a new site often comes with an uncomfortable unknown. You may have an Explorer deployed, but you still do not know what the backhaul traffic looks like or how reliable the connection really is. In distributed environments, M&A scenarios, or remote locations, these questions often go unanswered until something breaks.</p>
<p>Explorer-based internet speed testing helps remove that uncertainty. By measuring internet connectivity directly from deployed Explorers, runZero gives you an early signal into whether a site’s connection is usable before you rely on it for scanning, data uploads, or ongoing monitoring.</p>
<h2>Why internet speed matters before you scan</h2>
<p>Internet speed tests do not tell you whether scanning will impact production traffic, but they do answer an important prerequisite question: is the connection itself stable and usable. There are two common scenarios where this matters:</p>
<p>First, when you deploy an Explorer at a remote site, you often plan to scan from that node rather than across a VPN or WAN link. Knowing the quality of the site’s outbound connectivity helps you decide whether that approach is viable or whether you should limit or stage activity differently.</p>
<p>Second, poor connectivity can still impact data uploads back to the console, integration imports, and day-to-day reliability. Identifying weak or unstable links early helps avoid surprises and makes troubleshooting much easier when issues arise later.</p>
<h2>How Explorer-based bandwidth testing works</h2>
<p>Explorer-based bandwidth internet speed testing allows you to measure internet connectivity directly from the site where the Explorer is installed. This feature uses the well-known <a href="http://speedtest.net" rel="noopener" target="_blank">speedtest.net</a> infrastructure to find the closest server in order to report bandwidth, latency, and jitter.</p>
<p>You can run a speed test on demand using the “Start speed test” action, which immediately starts an Explorer action that records upload speed, download speed, and latency. This is useful for quick validation during deployment or troubleshooting. Once the test completes, it will show in the table on the Explorer details page, and offer Download actions for even more details on the results of the test.</p>
<p>For ongoing insight, we recommend configuring recurring tests from the Explorer details page. The frequency is set in hours and defaults to zero, meaning no recurring tests run unless you explicitly enable them. We don’t recommend running tests any more frequently than hourly; since repeated speed tests can actually impact available bandwidth. Hourly tests minimize potential disruptions while still giving you detailed performance over time.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-1-configuring-recurring-bandwidth-tests-copy.webp" data-image="304987" alt="Configuring recurring bandwidth tests from the Explorer details page" width="100%"><figcaption>Configuring recurring bandwidth tests from the Explorer details page</figcaption></figure>
<p>Since these tests use the well-known speedtest.net network, the Explorer does require connectivity to the main <a href="http://speedtest.net" rel="noopener" target="_blank">speedtest.net</a> site as well as any regional speed test nodes. This test process works by querying <a href="https://www.speedtest.net/api/js/servers" rel="noopener" target="_blank">https://www.speedtest.net/api/js/servers</a> for a list of the closest servers based on the external IP of the Explorer. The Explorer then pings the full server list to find the system with the lowest latency. Finally, the test concludes by performing download and upload bandwidth tests while measuring packet loss, latency, and jitter. If your firewall or proxy blocks the <a href="http://speedtest.net" rel="noopener" target="_blank">speedtest.net</a> portal or the regional test servers, this process may report an error.</p>
<p>You can run a speed test on demand using the ‘Start speed test’ action; this will schedule a test on the Explorer immediately, and after a minute or so, report the upload speed, download speed, jitter, and latency.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-2-explorer-details-showing-on-demand-bandwidth-testing-copy.webp" data-image="304983" alt="Explorer details page showing on-demand bandwidth testing and recorded results" width="100%"><figcaption>Explorer details page showing on-demand bandwidth testing and recorded results</figcaption></figure>
<h2>Designed to be safe and low impact</h2>
<p>Internet speed testing is intentionally conservative. Tests only run when triggered manually or on the schedule you configure. There is no background activity by default, and no impact unless you choose to enable it. Please note that if you self-host runZero and run in Offline mode, speed tests will be disabled, since they do require internet access. Speed tests may fail if your firewall does not allow arbitrary ICMP and HTTP traffic to <a href="http://speedtest.net" rel="noopener" target="_blank">speedtest.net</a> portal and the frequently rotating list of regional servers.</p>
<p>If an Explorer is not on a supported version, the UI clearly indicates this and guides you to upgrade directly from the Explorer details page, making it easy to get started without additional setup.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-3-explorer-details-showing-upgrade-notification-copy.webp" data-image="304995" alt="Explorer details page showing upgrade notification when a newer version is required" width="100%"><figcaption>Explorer details page showing upgrade notification when a newer version is required</figcaption></figure>
<h2>Included with your Explorers</h2>
<p>If you already have Explorers deployed, you already have this capability, with no additional licensing or setup required.</p>
<p>Explorer includes built-in bandwidth testing that integrates directly into existing workflows. It gives you a simple way to understand connectivity at your sites, identify unreliable links early, and avoid learning about bandwidth problems after they start causing issues.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-4-historical-internet-speed-test-results-copy.webp" data-image="304999" alt="Historical internet speed test results recorded per Explorer" width="100%"><figcaption>Historical internet speed test results recorded per Explorer</figcaption></figure>
<p>From the Explorer details page, you can also download detailed results for recent tests. The JSON formats include extensive metadata, such as the public IP address used and detailed statistics that are not yet surfaced in the UI.</p>
<p>Together, this gives teams not just a speed test result, but a <strong>verifiable, automatable record</strong> of when tests ran, where they ran, and what they observed.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-5-speed-test-results-can-be-downloaded-copy.webp" data-image="305000" alt="Speed test results can be downloaded in detailed formats, including JSON, for deeper analysis." width="100%"><figcaption>Speed test results can be downloaded in detailed formats, including JSON, for deeper analysis.</figcaption></figure>
<p>You can also set column visibility, and table preferences from within the Internet Speed tests page. So, that you can make sure you are seeing what is most important to you, and how you want to view the data within the grid.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-6-column-visibility-copy.webp" data-image="305001" width="100%"></figure>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-7-table-preferences-copy.webp" data-image="305002" alt="Column visibility and table preferences let you tailor the view to the metrics that matter most" width="100%"><figcaption>Column visibility and table preferences let you tailor the view to the metrics that matter most</figcaption></figure>
<h2>Structured speed test event in the audit log</h2>
<p>Each completed speed test generates a structured event with metrics like latency, jitter, and throughput that can be used to trigger alerts or automation when connectivity degrades or tests fail.</p>
<figure><img src="/uploads/blog/internet-speed-tests/screenshot-8-event-summary-copy.webp" data-image="305003" alt="Each event includes timestamps, the originating Explorer, and a structured summary of results." width="100%"><figcaption>Each event includes timestamps, the originating Explorer, and a structured summary of results.</figcaption></figure>
<h2>Run an internet speed test you can verify</h2>
<p>Start a free <a href="https://www.runzero.com/try/" rel="noopener" target="_blank">runZero trial</a> to measure site connectivity directly from your Explorers — with full visibility and audit logs included. After the trial period, your account can be converted to our free Community Edition.</p>
<p>As always, we would love your feedback as you use this feature. Let us know how it fits into your deployment and site readiness workflows. Feel free to reach out using the in-product support form or contact the team via <a href="mailto:support@runzero.com">support@runzero.com</a>.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/ivanti-epmm/</id>
            <title>Ivanti EPMM vulnerabilities: CVE-2026-1281 &amp; CVE-2026-1340</title>
            <published>2023-07-31T03:00:00-04:00</published>
            <updated>2026-01-29T18:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/ivanti-epmm/" />
            <summary type="html">Ivanti has disclosed multiple vulnerabilities in its Endpoint Manager Mobile (EPMM) product. Here&#039;s how to find affected assets with runZero.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Ivanti EPMM vulnerabilities:&nbsp;CVE-2026-1281 and CVE-2026-1340</h2>
<p>Ivanti <a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340" rel="noopener" target="_blank">disclosed</a>&nbsp;two remote code execution (RCE) vulnerabilities&nbsp;affecting certain versions of&nbsp;Ivanti Endpoint Manager Mobile (EPMM).&nbsp;These vulnerabilities, designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-1281" rel="noopener" target="_blank">CVE-2026-1281</a> and <a href="https://www.cve.org/CVERecord?id=CVE-2026-1340" rel="noopener" target="_blank">CVE-2026-1340</a> have been rated <em><em>critical</em></em> with a CVSS score of <strong>9.8.&nbsp;</strong>Both are code injection flaws that allow a remote, unauthenticated adversary to execute arbitrary code on the underlying host.<br></p>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/01/29/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank">evidence</a> that the vulnerability designated <a href="https://www.cve.org/CVERecord?id=CVE-2026-1281" rel="noopener" target="_blank">CVE-2026-1281</a> <strong>is being actively exploited in the wild</strong>.<br></p>
<p>The following versions are affected:<br></p>
<ul><li>Endpoint Manager Mobile versions 12.5.0.x prior to RPM 12.5.0.x</li><li>Endpoint Manager Mobile versions 12.5.1.0 prior to RPM 12.5.1.x</li><li>Endpoint Manager Mobile versions 12.6.0.x prior to RPM 12.6.0.x</li><li>Endpoint Manager Mobile versions 12.6.1.0 prior to RPM 12.6.1.x</li><li>Endpoint Manager Mobile versions 12.7.0.x prior to RPM 12.7.0.x</li></ul>
<h2>What is Ivanti Endpoint Manager Mobile?<br></h2>
<p>Ivanti Endpoint Manager Mobile (EPMM) is an on-premises unified endpoint management platform that allows IT administrators to enforce security policies, manage application distribution, and control data access for mobile devices and laptops across an enterprise network.<br></p>
<h2>What is the impact?</h2>
<p>Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process, potentially allowing complete system takeover.</p>
<h2>Are updates or workarounds available?</h2>
<p>Users are encouraged to update to the latest version as quickly as possible:<br></p>
<ul><li>Endpoint Manager Mobile versions 12.5.0.x upgrade to version RPM 12.5.0.x</li><li>Endpoint Manager Mobile versions 12.5.1.0 upgrade to version RPM 12.5.1.x</li><li>Endpoint Manager Mobile versions 12.6.0.x upgrade to version RPM 12.6.0.x</li><li>Endpoint Manager Mobile versions 12.6.1.0 upgrade to version RPM 12.6.1.x</li><li>Endpoint Manager Mobile versions 12.7.0.x upgrade to version RPM 12.7.0.x</li></ul>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Ivanti AND product:="Endpoint Manager Mobile"</code></pre>
<hr>
<h2>May 2025:&nbsp;CVE-2025-4427 and CVE-2025-4428</h2>
<p>Ivanti&nbsp;<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US" rel="noopener" target="_blank">has disclosed multiple vulnerabilities</a>&nbsp;in its Endpoint Manager Mobile (EPMM) product. These vulnerabilities, when chained together and successfully exploited, would allow a remote, unauthenticated attacker to execute arbitrary code on the vulnerable system.</p>
<p>These vulnerabilities, designated&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2025-4427" rel="noopener" target="_blank">CVE-2025-4427</a> and <a href="https://www.cve.org/CVERecord?id=CVE-2025-4428" rel="noopener" target="_blank">CVE-2025-4428</a>&nbsp;have CVSS scores of 5.3 (medium) and 7.2&nbsp;(high), respectively. However, in combination these vulnerabilities are significantly more critical than their individual scores may imply.</p>
<p>There is evidence that these vulnerabilities&nbsp;<em><strong>are being actively exploited in the wild</strong></em>.</p>
<p><em><strong></strong></em>The following versions are affected:</p>
<ul><li>Ivanti Endpoint Manager Mobile (EPMM) 11.x versions 11.2.0.4 and prior</li><li>Ivanti Endpoint Manager Mobile (EPMM) 12.3.x versions 12.3.0.1 and prior</li><li>Ivanti Endpoint Manager Mobile (EPMM) 12.4.x versions 12.4.0.1 and prior</li><li>Ivanti Endpoint Manager Mobile (EPMM) 12.5.x versions 12.5.0.0 and prior</li></ul>
<h2>What is the impact?</h2>
<p>Successfully exploiting this vulnerability would allow an attacker to execute arbitrary code with the privileges of the vulnerable process, potentially allowing complete system takeover.</p>
<h2>Are any updates or workaround&nbsp;available?</h2>
<p>Ivanti has&nbsp;<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US" rel="noopener" target="_blank">released updates</a>&nbsp;to address this vulnerability, and users are advised to update as quickly as possible.</p>
<h2>How do I find potentially vulnerable Ivanti EPMM services with runZero?</h2>
<p>From the <a href="https://console.runzero.com/inventory/" rel="noopener" target="_blank">Asset Inventory</a> use the following query&nbsp;to locate EPMM services on your network:</p>
<pre><code>product:"Ivanti Endpoint Manager Mobile"</code></pre>
<hr>
<h2>July 2023:&nbsp;CVE-2023-35078</h2>
<p>On July 24th, <a href="https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US" rel="noopener" target="_blank">Ivanti announced</a> that their Endpoint Manager Mobile (EPMM, formerly MobileIron Core) product versions 11.10 and prior contain a critical authentication bypass vulnerability. Successfully exploiting this vulnerability would allow an unauthenticated remote attacker to access users’ personally identifiable information (PII) and make changes to the vulnerable server.</p>
<p>There is evidence that this vulnerability is being exploited in the wild.</p>
<h3>What is the impact?</h3>
<p>An unauthenticated remote attacker who successfully exploited this vulnerability would be able to retrieve users’ personally identifiable information (PII) and make changes to the vulnerable server. This is due to an authentication bypass vulnerability, meaning that in some cases an attacker can bypass authentication controls.</p>
<p>With a CVSS score of 10.0, this vulnerability is considered critical. There is evidence that this vulnerability is being exploited in the wild and this vulnerability has been added to the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener" target="_blank">CISA Known Exploited Vulnerabilities</a> catalog.</p>
<h3>Are updates available?</h3>
<p>Ivanti has released a patch for this vulnerability and <a href="https://forums.ivanti.com/s/article/KB-Remote-unauthenticated-API-access-vulnerability-CVE-2023-35078?language=en_US" rel="noopener" target="_blank">issued guidance</a> for customers on how to upgrade.</p>
<h3>How do I find potentially vulnerable Ivanti EPMM services with runZero?</h3>
<p>EPMM can be found by navigating to the <a href="https://console.runzero.com/inventory/services" rel="noopener" target="_blank">Services Inventory</a> and using the following <a href="https://console.runzero.com/inventory/services?search=_asset.protocol%3Ahttp%20AND%20protocol%3Ahttp%20AND%20html.title%3A%22Ivanti%20User%20Portal%3A%20Sign%20In%22" rel="noopener" target="_blank">pre-built query</a> to locate EPMM services on your network:</p>
<pre><code>_asset.protocol:http AND protocol:http AND html.title:"Ivanti User Portal: Sign In"</code></pre>
<p>Starting with runZero 3.10.10, from the <a href="https://console.runzero.com/inventory/" rel="noopener" target="_blank">Asset Inventory</a> use the following <a href="https://console.runzero.com/inventory?search=product%3A%22Ivanti%20Endpoint%20Manager%20Mobile%22" rel="noopener" target="_blank">pre-built query</a> to locate EPMM services on your network:</p>
<pre><code>product:”Ivanti Endpoint Manager Mobile”</code></pre>
<p>Results from the above query should be triaged to determine if they require patching. As always, any prebuilt queries are available from your <a href="https://console.runzero.com/queries" rel="noopener" target="_blank">runZero console</a>. Check out the documentation for other useful inventory <a href="https://help.runzero.com/docs/search-query-syntax/" rel="noopener" target="_blank">queries</a>.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/fortinet-assets/</id>
            <title>Fortinet vulnerabilities: How to find affected assets</title>
            <published>2022-10-11T03:00:00-04:00</published>
            <updated>2026-01-27T18:50:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/fortinet-assets/" />
            <summary type="html">Fortinet has issued an advisory detailing authentication bypass vulnerabilities in multiple Fortinet products. Here&#039;s how find impacted assets.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Fortinet vulnerabilities:&nbsp;CVE-2026-24858</h2>
<p>Fortinet has issued an <a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060" target="_blank">advisory</a> detailing&nbsp;authentication bypass vulnerabilities in multiple Fortinet products when configured for Single Sign-On (SSO) via FortiCloud, including&nbsp;FortiAnalyzer, FortiManager,&nbsp;FortiProxy, and other products running FortiOS. Successful exploitation of these vulnerabilities could allow a remote, unauthenticated adversary who possesses a FortiCloud account and a registered device to bypass authentication and log into devices belonging to other accounts, potentially leading to full system compromise.&nbsp;This vulnerability, designated <a href="https://www.cve.org/cverecord?id=CVE-2026-24858" rel="noopener" target="_blank">CVE-2026-24858</a>, is rated <strong><em>critical</em></strong> with a base CVSS score of <strong>9.4</strong>.<br><br>Note that there is <a href="https://www.cisa.gov/news-events/alerts/2026/01/27/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank">evidence</a> that this vulnerability is <strong>being actively exploited in the wild</strong>.<br><br>The following versions are affected:</p>
<ul><li>FortiAnalyzer 7.0 versions 7.0.0 through 7.0.15</li><li>FortiAnalyzer 7.2 versions 7.2.0 through 7.2.11</li><li>FortiAnalyzer 7.4 versions 7.4.0 through 7.4.9</li><li>FortiAnalyzer 7.6 versions 7.6.0 through 7.6.5</li><li>FortiManager 7.0 versions 7.0.0 through 7.0.15</li><li>FortiManager 7.2 versions 7.2.0 through 7.2.11</li><li>FortiManager 7.4 versions 7.4.0 through 7.4.9</li><li>FortiManager 7.6 versions 7.6.0 through 7.6.5</li><li>FortiOS 7.0 versions 7.0.0 through 7.0.18</li><li>FortiOS 7.2 versions 7.2.0 through 7.2.12</li><li>FortiOS 7.4 versions 7.4.0 through 7.4.10</li><li>FortiOS 7.6 versions 7.6.0 through 7.6.5</li><li>FortiProxy 7.0 all versions 7.0.x</li><li>FortiProxy 7.2 all versions 7.2.x</li><li>FortiProxy 7.4 versions 7.4.0 through 7.4.12</li><li>FortiProxy 7.6 versions 7.6.0 through 7.6.4</li></ul>
<h2>What are Fortinet FortiWeb, FortiProxy, FortiSwitchManager, and FortiOS?</h2>
<p><strong>Fortinet FortiAnalyzer</strong> is a centralized logging and analytics solution that aggregates data from across the security&nbsp;fabric to provide deep visibility, real-time threat detection, and automated compliance reporting.<br>  <br><strong>  Fortinet FortiManager</strong> is a centralized management platform that provides a single point of control for configuring, deploying, and overseeing security policies across an entire fabric of Fortinet devices.<br>  <br><strong>  Fortinet FortiOS</strong> is a custom operating system common to many Fortinet products.<br>  <br><strong>  Fortinet FortiProxy</strong> is a high-performance secure web gateway platform.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow a remote unauthenticated adversary to bypass authentication checks for vulnerable systems. This may allow complete compromise of the vulnerable systems.</p>
<h2>Are updates or workarounds available?</h2>
<p>Fortinet recommends upgrading affected systems to the new versions:</p>
<ul><li>FortiAnalyzer 7.0 upgrade to version 7.0.16 or later</li><li>FortiAnalyzer 7.2 upgrade to version 7.2.12 or later</li><li>FortiAnalyzer 7.4 upgrade to version 7.4.10 or later</li><li>FortiAnalyzer 7.6 upgrade to version 7.6.6 or later</li><li>FortiManager 7.0 upgrade to version 7.0.16 or later</li><li>FortiManager 7.2 upgrade to version 7.2.13 or later</li><li>FortiManager 7.4 upgrade to version 7.4.10 or later</li><li>FortiManager 7.6 upgrade to version 7.6.6 or later</li><li>FortiOS 7.0 upgrade to version 7.0.19 or later</li><li>FortiOS 7.2 upgrade to version 7.2.13 or later</li><li>FortiOS 7.4 upgrade to version 7.4.11 or later</li><li>FortiOS 7.6 upgrade to version 7.6.6 or later</li><li>FortiProxy 7.0 migrate to a fixed release</li><li>FortiProxy 7.2 migrate to a fixed release</li><li>FortiProxy 7.4 upgrade to version 7.4.13 or later</li><li>FortiProxy 7.6 upgrade to version 7.6.6 or later</li></ul>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>os:="Fortinet FortiAnalyzer" OR hw:="Fortinet FortiManager" OR os:="Fortinet FortiProxy" OR
  (os:="Fortinet FortiOS" AND os_version:&gt;0 AND
  ((os_version:&gt;="7.0.0" AND os_version:&lt;="7.0.18") OR
  (os_version:&gt;="7.2.0" AND os_version:&lt;="7.2.12") OR
  (os_version:&gt;="7.4.0" AND os_version:&lt;="7.4.10") OR
  (os_version:&gt;="7.6.0" AND os_version:&lt;="7.6.5")))</code></pre>
<hr>
<h2>January 2026: CVE-2025-25249</h2>
<p>Fortinet has issued an <a href="https://www.fortiguard.com/psirt/FG-IR-25-084" target="_blank">advisory</a> describing a buffer overflow&nbsp;vulnerabilities in multiple Fortinet products, including FortiOS, FortiSASE, and FortiSwitchManager.&nbsp;Successful exploitation of these vulnerabilities could allow a remote, unauthenticated adversary to execute arbitrary code.This vulnerability, designated <a href="https://www.cve.org/cverecord?id=CVE-2025-25249" rel="noopener" target="_blank">CVE-2025-25249</a>,&nbsp;is rated <strong><em>high</em></strong> with a base CVSS score of <strong>7.4</strong>.<br></p>
<p>The following versions are affected:</p>
<ul><li>FortiOS 7.6 versions 7.6.0 through 7.6.3</li><li>FortiOS 7.4 versions 7.4.0 through 7.4.8</li><li>FortiOS 7.2 versions 7.2.0 through 7.2.11</li><li>FortiOS 7.0 versions 7.0.0 through 7.0.17</li><li>FortiOS 6.4 versions 6.40 through 6.4.16</li><li>FortiSASE 25.2 versions 25.1.a.2&nbsp;through 25.2.b</li><li>FortiProxy 7.4 versions 7.4.0 through 7.4.10</li><li>FortiProxy 7.2 versions 7.2.0 through 7.2.14</li><li>FortiProxy 7.0 versions 7.0.0 through 7.0.21</li><li>FortiSwitchManager 7.2 versions 7.2.0 through 7.2.6</li><li>FortiSwitchManager 7.0 versions 7.0.0 through 7.0.5</li></ul>
<h2>What are Fortinet FortiOS and&nbsp;FortiSwitchManager?</h2>
<p><strong>Fortinet FortiOS</strong> is a custom operating system common to many Fortinet products.</p>
<p><strong>Fortinet FortiSwitchManager</strong> is a software suite for managing fleets of Fortinet devices.<br></p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow a remote unauthenticated adversary to execute arbitrary code or commands via specifically crafted requests.</p>
<h2>Are updates or workarounds available?</h2>
<p>Fortinet recommends upgrading affected systems to the new versions:</p>
<ul><li>FortiOS 7.6 - Upgrade to 7.6.4 or above</li><li>FortiOS 7.4 - Upgrade to 7.4.9 or above</li><li>FortiOS 7.2 - Upgrade to 7.2.12 or above</li><li>FortiOS 7.0 - Upgrade to 7.0.18 or above</li><li>FortiSASE 25 - Upgrade to 25.2.c</li><li>FortiSwitchManager 7.2 - Upgrade to 7.2.7 or above</li><li>FortiSwitchManager 7.0 - Upgrade to 7.0.6 or above</li></ul>
<p>Fortinet has included workaround guidance.</p>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>os:="Fortinet FortiOS" AND
os_version:&gt;0 AND
((os_version:&gt;="7.6.0" AND os_version:&lt;="7.6.3") OR
(os_version:&gt;="7.4.0" AND os_version:&lt;="7.4.8")  OR
(os_version:&gt;="7.2.0" AND os_version:&lt;="7.2.11") OR
(os_version:&gt;="7.0.0" AND os_version:&lt;="7.0.17") OR
(os_version:&gt;="6.4.0" AND os_version:&lt;="6.4.17"))</code></pre>
<hr>
<h2>December 2025:&nbsp;CVE-2025-59718 and CVE-2025-59719 (Multiple)</h2>
<p>Fortinet has issued an <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-647" target="_blank">advisory</a> describing&nbsp;authentication bypass vulnerabilities in multiple Fortinet products, including FortiWeb, FortiProxy, FortiSwitchManager, and other products running FortiOS. Successful exploitation of these vulnerabilities&nbsp;could allow a remote, unauthenticated adversary to bypass authentication on systems when they are configured to use Single Sign-On via FortiCloud. These vulnerabilities, designated&nbsp;<a href="https://www.cve.org/cverecord?id=CVE-2025-59718" target="_blank">CVE-2025-59718</a>&nbsp;and&nbsp;<a href="https://www.cve.org/cverecord?id=CVE-2025-59719" target="_blank">CVE-2025-59719</a>, are rated <strong><em>critical</em></strong> with a base CVSS score of <strong>9.1</strong>.</p>
<p>Note that there is evidence that this vulnerability is&nbsp;<strong>being actively exploited in the wild</strong> and was&nbsp;<a href="https://www.cisa.gov/news-events/alerts/2025/12/16/cisa-adds-one-known-exploited-vulnerability-catalog" rel="noopener" target="_blank">added to the CISA KEV list</a>&nbsp;on December 16th, 2025.</p>
<p>The following versions are affected:</p>
<ul><li>FortiOS 7.6 versions 7.6.0 through 7.6.3</li><li>FortiOS 7.4 versions 7.4.0 through 7.4.8</li><li>FortiOS 7.2 versions 7.2.0 through 7.2.11</li><li>FortiOS 7.0 versions 7.0.0 through 7.0.17</li><li>FortiProxy 7.6 versions 7.6.0 through 7.6.3</li><li>FortiProxy 7.4 versions 7.4.0 through 7.4.10</li><li>FortiProxy 7.2 versions 7.2.0 through 7.2.14</li><li>FortiProxy 7.0 versions 7.0.0 through 7.0.21</li><li>FortiSwitchManager 7.2 versions 7.2.0 through 7.2.6</li><li>FortiSwitchManager 7.0 versions 7.0.0 through 7.0.5</li><li>FortiWeb 8.0 version 8.0.0</li><li>FortiWeb 7.6 versions 7.6.0 through 7.6.4</li><li>FortiWeb 7.4 versions 7.4.0 through 7.4.9</li></ul>
<h2>What are Fortinet FortiWeb, FortiProxy, FortiSwitchManager, and FortiOS?</h2>
<p><strong>Fortinet FortiWeb</strong> is a specialized Web Application Firewall (WAF) that protects web applications and APIs from known and unknown threats by inspecting HTTP traffic and enforcing security policies to block attacks.</p>
<p><strong>Fortinet FortiProxy</strong> is a high-performance secure web gateway platform.</p>
<p><strong>Fortinet FortiSwitchManager</strong> is a software suite for managing fleets of Fortinet devices.</p>
<p><strong>Fortinet FortiOS</strong> is a custom operating system common to many Fortinet products.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of the vulnerability would allow a remote unauthenticated adversary to bypass authentication checks for vulnerable systems. This may allow complete compromise of the vulnerable systems.</p>
<h2>Are updates or workarounds available?</h2>
<p>Fortinet recommends upgrading affected systems to the new versions:</p>
<ul><li>FortiOS 7.6 - Upgrade to 7.6.4 or above</li><li>FortiOS 7.4 - Upgrade to 7.4.9 or above</li><li>FortiOS 7.2 - Upgrade to 7.2.12 or above</li><li>FortiOS 7.0 - Upgrade to 7.0.18 or above</li><li>FortiProxy 7.6 - Upgrade to 7.6.4 or above</li><li>FortiProxy 7.4 - Upgrade to 7.4.11 or above</li><li>FortiProxy 7.2 - Upgrade to 7.2.15 or above</li><li>FortiProxy 7.0 - Upgrade to 7.0.22 or above</li><li>FortiSwitchManager 7.2 - Upgrade to 7.2.7 or above</li><li>FortiSwitchManager 7.0 - Upgrade to 7.0.6 or above</li><li>FortiWeb 8.0 - 8.0.1 or above</li><li>FortiWeb 7.6 - Upgrade to 7.6.5 or above</li><li>FortiWeb 7.4 - Upgrade to 7.4.10 or above</li></ul>
<p>As a temporary workaround, disabling Single&nbsp;Sign-On via FortiCloud may mitigate this vulnerability.</p>
<h2>How to find potentially vulnerable systems with runZero</h2>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>product:"Fortinet FortiWeb" OR
    (os:="Fortinet FortiOS" AND
    os_version:&gt;0 AND
    ((os_version:&gt;="7.6.0" AND os_version:&lt;="7.6.3") OR
    (os_version:&gt;="7.4.0" AND os_version:&lt;="7.4.8") OR
    (os_version:&gt;="7.2.0" AND os_version:&lt;="7.2.11") OR
    (os_version:&gt;="7.0.0" AND os_version:&lt;="7.0.17")))</code></pre>
<hr>
<h2>October 2025:&nbsp;CVE-2025-49201,&nbsp;CVE-2025-49201</h2>
<p>In October 2025, Fortinet&nbsp;disclosed vulnerabilities in certain versions of their <a href="https://www.runzero.com/blog/fortinet-fortiswitch/" rel="noopener" target="_blank">FortiSwitch Manager</a> and&nbsp;<a href="https://www.runzero.com/blog/fortinet-fortipam/" rel="noopener" target="_blank">FortiPAM</a> and&nbsp;products.</p>
<hr>
<h2>August 2025: CVE-2025-52970 (FortiWeb)</h2>
<p>Fortinet has issued an <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-448" target="_blank">advisory</a> for a vulnerability affecting certain versions of their FortiWeb product where the software improperly handles&nbsp;session cookie parameters, resulting in an authentication bypass vulnerability.&nbsp;To exploit this flaw, a remote, unauthenticated adversary must possess specific non-public information about the device and a target user. Successful exploitation allows the adversary to send a specially crafted request and log in as any existing user on the device.&nbsp;The vulnerability, designated <a href="https://www.cve.org/cverecord?id=CVE-2025-52970" target="_blank">CVE-2025-52970</a>, is rated <strong><em>high</em></strong> with a base CVSS score of <strong>7.7</strong>.<br></p>
<p><strong>The following versions are affected</strong></p>
<ul><li>FortiWeb 7.0 versions 7.0.0 through 7.0.10</li><li>FortiWeb 7.2 versions 7.2.0 through 7.2.10</li><li>FortiWeb 7.4 versions 7.4.0 through 7.4.7</li><li>FortiWeb 7.6 versions 7.6.0 through 7.6.3</li></ul>
<ul></ul>
<h3>What is the impact?</h3>
<p>Successful exploitation of the vulnerability would allow a remote unauthenticated adversary to gain administrative access to the system.<br></p>
<h3>Are updates or workarounds available?</h3>
<p>Upgrade affected systems to the new versions</p>
<ul><li>FortiWeb 7.0 upgrade to version 7.0.11 or later</li><li>FortiWeb 7.2 upgrade to version 7.2.11 or later</li><li>FortiWeb 7.4 upgrade to version 7.4.8 or later</li><li>FortiWeb 7.6 upgrade to version 7.6.4 or later</li></ul>
<h3>How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:=Fortinet AND product:=FortiWeb</code></pre>
<hr>
<h2>August 2025: CVE-2025-25256 (FortiSIEM)</h2>
<p>Fortinet has issued an <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-152" target="_blank">advisory</a> for a vulnerability affecting certain versions of their&nbsp;FortiSIEM product where the software improperly neutralizes special elements used in an OS command, resulting in an OS command injection vulnerability that allows a remote, unauthenticated adversary to execute unauthorized code or commands via crafted CLI requests.&nbsp;The vulnerability, designated <a href="https://www.cve.org/cverecord?id=CVE-2025-25256" target="_blank">CVE-2025-25256</a>, is rated <strong><em>critical</em></strong> with a base CVSS score of <strong>9.8</strong>.<br></p>
<p>There is evidence that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<p><strong>The following versions are affected</strong></p>
<ul><li>FortiSIEM 5.4 all versions</li><li>FortiSIEM 6.1 all versions</li><li>FortiSIEM 6.2 all versions</li><li>FortiSIEM 6.3 all versions</li><li>FortiSIEM 6.4 all versions</li><li>FortiSIEM 6.5 all versions</li><li>FortiSIEM 6.6 all versions</li><li>FortiSIEM 6.7 versions 6.7.0 through 6.7.9</li><li>FortiSIEM 7.0 versions 7.0.0 through 7.0.3</li><li>FortiSIEM 7.1 versions 7.1.0 through 7.1.7</li><li>FortiSIEM 7.2 versions 7.2.0 through 7.2.5</li><li>FortiSIEM 7.3 versions 7.3.0 through 7.3.1</li></ul>
<ul></ul>
<h3>What is the impact?</h3>
<p>Successful exploitation of the vulnerability would allow a remote unauthenticated adversary to execute arbitrary commands on the remote system, potentially including operating system commands with the privileges of the vulnerable process.</p>
<h3>Are updates or workarounds available?</h3>
<p>Upgrade affected systems to the new versions</p>
<ul><li>FortiSIEM 5.4 migrate to a fixed release</li><li>FortiSIEM 6.1 migrate to a fixed release</li><li>FortiSIEM 6.2 migrate to a fixed release</li><li>FortiSIEM 6.3 migrate to a fixed release</li><li>FortiSIEM 6.4 migrate to a fixed release</li><li>FortiSIEM 6.5 migrate to a fixed release</li><li>FortiSIEM 6.6 migrate to a fixed release</li><li>FortiSIEM 6.7 upgrade to version 6.7.10 or later</li><li>FortiSIEM 7.0 upgrade to version 7.0.4 or later</li><li>FortiSIEM 7.1 upgrade to version 7.1.8 or later</li><li>FortiSIEM 7.2 upgrade to version 7.2.6 or later</li><li>FortiSIEM 7.3 upgrade to version 7.3.2 or later</li></ul>
<h3>How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/software-groups" rel="noopener" target="_blank">Software Inventory</a>, use the following query to locate potentially impacted assets:</p>
<pre><code>vendor:="Fortinet" product:="FortiSIEM"</code></pre>
<hr>
<h2>May 2025: (CVE-2025-32756)</h2>
<p>Fortinet has issued an <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-254" target="_blank">advisory</a> for a vulnerability affecting their FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera products. Note that there is evidence that this vulnerability&nbsp;is <strong><em>actively being exploited in the wild</em></strong>.</p>
<p>The vulnerability, designated&nbsp;<a href="https://www.cve.org/cverecord?id=CVE-2025-32756" target="_blank">CVE-2025-32756</a>,&nbsp;is rated <strong><em>critical</em></strong> with a base CVSS score of <strong>9.8</strong>.&nbsp;Successfully exploiting this vulnerability would&nbsp;allow a remote,&nbsp;unauthenticated attacker to execute arbitrary code.</p>
<ul></ul>
<h3>What is the impact?</h3>
<p>For affected product versions, a&nbsp;remote unauthenticated&nbsp;attacker may execute arbitrary code or commands. Fortinet has included indicators-of-compromise (IoCs)&nbsp;within the advisory to help determine whether a system has been compromised.</p>
<h3>Are updates or workarounds available?</h3>
<p>In addition to disabling, or restricting access to the HTTP/HTTPS administrative interface, Fortinet recommends upgrading the following versions of affected products:<br></p>
<ul><li><strong>FortiCamera 2.1.0 through 2.1.3</strong> to be upgraded to <strong>2.1.4 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiCamera 1.1 and 2.0</strong> to be migrated to a<strong> fixed release</strong></li><li><strong>FortiMail 7.6.0 through 7.6.2</strong> to be upgraded to<strong> 7.6.3 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiMail 7.4.0 through 7.4.4</strong> to be upgraded to <strong>7.4.5 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiMail 7.2.0 through 7.2.7</strong> to be upgraded to<strong> 7.2.8 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiMail 7.0.0 through 7.0.8</strong> to be upgraded to <strong>7.0.9 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiNDR 7.6.0 </strong>to be upgraded to <strong>7.6.1 or <strong><strong><strong>later</strong></strong></strong></strong></li><li><strong>FortiNDR 7.4.0 through 7.4.7</strong> to be upgraded to <strong>7.4.8 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiNDR 7.2.0 through 7.2.4</strong> to be upgraded to<strong> 7.2.5 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiNDR 7.1</strong>&nbsp;to be migrated to a fixed release</li><li><strong>FortiNDR 7.0.0</strong><strong> through 7.0.6</strong> to be upgraded to <strong>7.0.7 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiNDR 1.1 through 1.5</strong> to be migrated to a <strong><strong><strong>fixed release</strong></strong></strong></li><li><strong>FortiRecorder 7.2.0 through 7.2.3</strong> to be upgraded to <strong>7.2.4 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiRecorder 7.0.0 through 7.0.5</strong> to be upgraded to <strong>7.0.6 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiRecorder 6.4.0 through 6.4.5</strong> to be upgraded to <strong>6.4.6 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiVoice 7.2.0</strong> to be upgraded to <strong>7.2.1 or above</strong></li><li><strong>FortiVoice 7.0.0 through 7.0.6</strong> to be upgraded to <strong>7.0.7 or <strong><strong>later</strong></strong></strong></li><li><strong>FortiVoice 6.4.0 through 6.4.10</strong> to be upgraded to<strong> 6.4.11 or <strong><strong>later</strong></strong></strong></li></ul>
<h3 dir="ltr">How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:="Fortinet FortiRecorder" OR hw:="Fortinet FortiNDR" OR hw:="Fortinet FortiMail" OR (hw:"Fortinet" AND type:"SIP Gateway")</code></pre>
<h3 dir="ltr">How to find potentially vulnerable FortiCamera systems with runZero</h3>
<p>From the<a href="https://console.runzero.com/inventory/services" target="_blank"> Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:"Fortinet" AND _asset.protocol:http AND protocol:http AND (((has:http.head.wwwAuthenticate OR has:last.http.head.wwwAuthenticate) AND http.head.wwwAuthenticate:FortiCamera) OR (has:tls.subject AND tls.subject:FortiCamera))
</code></pre>
<hr>
<h2>January 2025: (CVE-2024-55591, CVE-2023-37936)</h2>
<p>Fortinet issued an advisory for a vulnerability affecting their FortiOS and FortiProxy products&nbsp;that is&nbsp;actively being exploited in the wild.</p>
<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-55591" target="_blank">CVE-2024-55591</a> detailed in <a href="https://www.fortiguard.com/psirt/FG-IR-24-535" target="_blank">FG-IR-24-535</a> is rated <strong><em>critical</em></strong> with a CVSS score of <strong>9.6</strong> and may allow unauthenticated attacker to gain administrator privileges.</li></ul>
<p>Fortinet also issued an advisory for their FortiSwitch product.<br></p>
<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-37936" target="_blank">CVE-2023-37936</a> detailed in <a href="https://www.fortiguard.com/psirt/FG-IR-23-260" target="_blank">FG-IR-23-260</a> is rated <strong><em>critical</em></strong> with a CVSS score of <strong>9.6</strong> and may allow unauthenticated attacker to execute arbitrary code.</li></ul>
<h3>What is the impact?</h3>
<p>For affected versions of&nbsp;FortiOS and FortiProxy vulnerable to&nbsp;CVE-2024-55591, a remote attacker may gain administrator privileges bypassing&nbsp;authentication. Fortinet included IoCs within the advisory.</p>
<p>Due to the use of a hard-coded cryptographic key in vulnerable versions of the FortiSwitch product, an unauthenticated attacker with the key could remotely perform arbitrary code execution.&nbsp;</p>
<h3 dir="ltr">Are updates or workarounds available?</h3>
<p>In addition to disabling,&nbsp;or restricting access to the&nbsp;HTTP/HTTP administrative interface,&nbsp;Fortinet recommends upgrading the following versions of affected products:</p>
<h4>CVE-2024-55591</h4>
<ul><li><strong>FortiOS 7.0.0 through 7.0.16&nbsp;</strong>to be upgraded to <strong>7.0.17 or later</strong></li><li><strong>FortiProxy 7.2.0 through 7.2.12</strong> to be upgraded to <strong>7.2.13 or later</strong></li><li><strong>FortiProxy 7.0.0 through 7.0.19</strong> to be upgraded to<strong> 7.0.20 or later</strong></li></ul>
<h4>CVE-2023-37936</h4>
<ul><li><strong>FortiSwitch</strong>&nbsp;<strong>7.4.0</strong><strong>&nbsp;</strong>&nbsp;to be upgraded to <strong>7.4.1</strong><strong>&nbsp;or <strong>later</strong></strong></li><li><strong>FortiSwitch</strong>&nbsp;<strong>7.2.0</strong><strong> through 7.2.5&nbsp;</strong>to be upgrade to <strong>7.2.6 or <strong>later</strong></strong></li><li><strong>FortiSwitch 7.0.0 through 7.0.7 </strong>to be upgraded to<strong> 7.0.8 or later&nbsp;</strong></li><li><strong>FortiSwitch 6.4.0 through 6.4.13 </strong>to be upgraded to <strong>6.4.14 or later</strong></li><li><strong>FortiSwitch 6.2.0 through 6.2.7 </strong>to be upgraded to<strong> 6.2.8 or later</strong></li><li><strong>FortiSwicth 6.0.0 through 6.0.7 </strong>should be migrated to a<strong> </strong>fixed<strong> </strong>release</li></ul>
<h3 dir="ltr">How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>os:"FortiOS" OR hw:"FortiSwitch" OR hw:"FortiProxy"</code></pre>
<hr>
<h2>December 2024: (CVE-2023-34990)</h2>
<p>Fortinet issued advisories&nbsp;for their FortiWLM product.</p>
<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34990" target="_blank">CVE-2023-34990</a> detailed in <a href="https://www.fortiguard.com/psirt/FG-IR-23-144" target="_blank">FG-IR-23-144</a> was rated <strong><em>critical</em></strong> with a CVSS score of <strong>9.6</strong> and may have allowed an unauthenticated attacker to read sensitive files.</li></ul>
<h3>What was the impact?</h3>
<p>An unauthenticated attacker may have been able to manipulate paths through the FortiWLM application and perform a path traversal in order to gain access to sensitive files outside the application root directory on the host machine.</p>
<h3 dir="ltr">Are updates or workarounds available?</h3>
<p>Fortinet recommended upgrading the following versions:</p>
<ul><li>FortiWLM <strong>8.6.0 through 8.6.5</strong> to be upgraded to <strong>8.6.6 or above</strong></li><li>FortiWLM&nbsp;<strong>8.5.0 through 8.5.4 </strong>to be upgrade to <strong>8.5.5 or above</strong></li></ul>
<h3 dir="ltr">How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/services" target="_blank">Service Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>html.title:FortiWLM</code></pre>
<hr>
<h2>October 2024: (CVE-2023-50176, CVE-2024-23666)</h2>
<p dir="ltr">Fortinet issued advisories for its FortiAnalyzer, FortiAnalyzer-BigData,&nbsp;FortiManager, and FortiOS products.</p>
<ul><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50176" target="_blank">CVE-2023-50176</a> detailed in <a href="https://www.fortiguard.com/psirt/FG-IR-23-475" target="_blank">FG-IR-23-475</a> was rated <strong><em>high</em></strong> with a CVSS score of <strong>7.1</strong>, and may have allowed an unauthenticated attacker to hijack a user session.</li><li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23666" target="_blank">CVE-2024-23666</a> detailed in <a href="https://fortiguard.fortinet.com/psirt/FG-IR-23-396" target="_blank">FG-IR-23-396</a> was rated <strong><em>high</em></strong> with a CVSS score of <strong>7.1</strong> and may have allowed an authenticated,&nbsp;read-only user the ability to execute "sensitive operations".</li></ul>
<h3>What was the impact?</h3>
<p>CVE-2024-23666, which affected FortiAnalyzer and FortiManager&nbsp;products,&nbsp;required that an attacker (or malicious user) was authenticated against the system. A read-only user could potentially execute sensitive operations through&nbsp;crafted requests, bypassing client-side enforcement through&nbsp;the web interface.&nbsp;CVE-2023-50176, which affected the&nbsp;SSLVPN component of FortiOS, was a session fixation vulnerability that allowed an unauthenticated attacker the ability to&nbsp;hijack an authenticated user's session via a&nbsp;"phishing SAML authentication link".</p>
<h3 dir="ltr">Are updates or workarounds available?</h3>
<p>The vendor released patches for all affected products. They recommended following the upgrade path using their <a href="https://docs.fortinet.com/upgrade-tool" target="_blank">upgrade tool</a>.</p>
<h3 dir="ltr">How to find potentially vulnerable systems with runZero</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate systems running potentially vulnerable software:</p>
<pre><code>hw:FortiManager OR hw:FortiAnalyzer OR os:FortiOS</code></pre>
<hr>
<h2>March 2024</h2>
<p dir="ltr"><strong>On March 12th, 2024</strong>, Fortinet disclosed several vulnerabilities in their <strong>FortiOS</strong>, <strong>FortiProxy</strong>, and <strong>FortiClient</strong> products:<br></p>
<ul><li dir="ltr"><p dir="ltr"><a href="https://www.fortiguard.com/psirt/FG-IR-23-328" rel="noopener" target="_blank">FG-IR-23-328</a> – a buffer overflow vulnerability in the handling of form-based authentication in the FortiOS and FortiProxy captive portals, allowing remote, unauthenticated attackers to execute arbitrary code. This vulnerability has been assigned CVEs <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42789" rel="noopener" target="_blank">CVE-2023-42789</a> and <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42790" rel="noopener" target="_blank">CVE-2023-42790</a>. These vulnerabilities have a CVSS score of 9.3, indicating that they are <em>critical</em>.</p></li><li dir="ltr"><p dir="ltr"><a href="https://www.fortiguard.com/psirt/FG-IR-24-007" rel="noopener" target="_blank">FG-IR-24-007</a> – a SQL injection vulnerability in the FortiClient Enterprise Management Server. This vulnerability has been designated <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48788" rel="noopener" target="_blank">CVE-2023-48788</a>, and has been given a CVSS score of 9.8 (<em>critical</em>).</p></li><li dir="ltr"><p dir="ltr"><a href="https://www.fortiguard.com/psirt/FG-IR-23-390" rel="noopener" target="_blank">FG-IR-23-390</a> – a log injection vulnerability in the FortiClient Enterprise Management Server. This vulnerability has been assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47534" rel="noopener" target="_blank">CVE-2023-47534</a> and a CVSS score of 7.7 (<em>high</em>).</p></li><li dir="ltr"><p dir="ltr"><a href="https://www.fortiguard.com/psirt/FG-IR-23-103" rel="noopener" target="_blank">FG-IR-23-103</a> – a remote code execution vulnerability in the FortiManager product. This vulnerability has been designated <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36554" rel="noopener" target="_blank">CVE-2023-36554</a> with a CVSS score of 7.7 (<em>high</em>). Note that the vulnerable subsystem is not installed by default.</p></li><li dir="ltr"><p dir="ltr"><a href="https://www.fortiguard.com/psirt/FG-IR-24-013" rel="noopener" target="_blank">FG-IR-23-013</a> – an information disclosure vulnerability in the FortiGuard SSL-VPN product. This vulnerability has been designated <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23112" rel="noopener" target="_blank">CVE-2024-23112</a> and given a CVSS score of 7.2 (<em>high</em>).</p></li></ul>
<div>Upon successful exploitation of these vulnerabilities, attackers could execute arbitrary code on the vulnerable system or disclose privileged information.&nbsp;Fortinet released <a href="https://docs.fortinet.com/upgrade-tool" rel="noopener" target="_blank">updates</a> to mitigate this issue and all users were urged to update immediately.</div>
<h3>How to find FortiOS,&nbsp;FortiProxy or FortiClient operating systems</h3>
<p dir="ltr">From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, use the following query to locate assets running the FortiOS or FortiProxy operating systems, which may be vulnerable:</p>
<pre><code>os:"FortiOS" OR os:"FortiProxy"</code></pre>
<p dir="ltr">Additionally, from the <a href="https://console.runzero.com/inventory/services" rel="noopener" target="_blank">Services Inventory</a>, use the following query to locate potentially vulnerable systems:</p>
<pre><code>html.title:="FortiClient Endpoint Management Server"</code></pre>
<hr>
<h2>February 2024: (CVE-2024-21762)</h2>
<p>On February 8th, 2024, Fortinet <a href="https://www.fortiguard.com/psirt/FG-IR-24-015" target="_blank">disclosed</a> a serious vulnerability in their FortiOS operating system, used by multiple <a href="https://www.runzero.com/blog/fortinet-assets/" rel="noopener" target="_blank">Fortinet products</a>.</p>
<p>The issue, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21762" target="_blank">CVE-2024-21762</a>, allowed attackers to execute arbitrary code on vulnerable devices. The vendor has indicated that this is a <strong>critical vulnerability</strong>.&nbsp;The vendor reports that there are indications that this vulnerability may be actively exploited in the wild.&nbsp;Upon successful exploitation of these vulnerabilities, attackers could execute arbitrary code on the vulnerable system.<br></p>
<p>Fortinet released an <a href="https://docs.fortinet.com/upgrade-tool" target="_blank">update</a> to mitigate this issue and all users were urged to update immediately. Additionally, the vendor indicated that disabling the SSL-VPN functionality of the device would mitigate the issue.</p>
<h3>How to find&nbsp;FortiOS devices</h3>
<p>From the <a href="https://console.runzero.com/inventory/" target="_blank">Asset Inventory</a>, use the following query to locate assets running the FortiOS operating system which may potentially be vulnerable:</p>
<pre><code>os:"FortiOS" AND tcp:443
</code></pre>
<hr>
<h2>October 2022: (CVE-2022-40684)</h2>
<p>News surfaced in October 2022 of&nbsp;a <a href="https://www.bleepingcomputer.com/news/security/fortinet-says-critical-auth-bypass-bug-is-exploited-in-attacks/" rel="noopener" target="_blank">critical authentication bypass vulnerability</a> present in the web administration interface of some Fortinet products. Successful exploitation of this vulnerability (tracked as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684" rel="noopener" target="_blank">CVE-2022-40684</a>) via crafted HTTP and HTTPS requests could provide remote attackers with admin-level command execution on vulnerable FortiOS devices including FortiGate firewalls, FortiProxy web proxies, and FortiSwitchManager assets.<br></p>
<p>With a CVSS critical score of 9.6, attackers running admin-level commands on compromised assets may have had the ability to persist presence, explore connected internal networks, and exfiltrate data. At the time&nbsp;Fortinet was aware of at least one <a href="https://www.fortiguard.com/psirt/FG-IR-22-377" rel="noopener" target="_blank">exploit of this vulnerability in the wild</a>, and Bleeping Computer offered a Shodan search showing <a href="https://www.bleepingcomputer.com/news/security/fortinet-says-critical-auth-bypass-bug-is-exploited-in-attacks/" rel="noopener" target="_blank">more than 140k publicly accessible FortiGate devices</a>&nbsp;potentially&nbsp;running vulnerable FortiOS. Additionally, security researchers with Horizon3.ai planned on <a href="https://twitter.com/Horizon3Attack/status/1579285863108087810" rel="noopener" target="_blank">publishing an exploit PoC</a>. For admins wanting to check if a FortiOS/FortiProxy/FortiSwitchManager asset had been exploited, Fortinet provides an <a href="https://www.fortiguard.com/psirt/FG-IR-22-377" rel="noopener" target="_blank">indicator of compromise</a> (see the “Exploitation Status” section).</p>
<p>Fortinet called out the vulnerable FortiOS, FortiProxy, and FortiSwitchManager versions in <a href="https://www.fortiguard.com/psirt/FG-IR-22-377" rel="noopener" target="_blank">their advisory</a> and had made updates available for affected products. Admins were advised to&nbsp;ensure that affected models were updated to the latest version as soon as possible. If updates could not&nbsp;be completed in the near term, Fortinet provided some <a href="https://www.fortiguard.com/psirt/FG-IR-22-377" rel="noopener" target="_blank">mitigation steps</a> (see the “Workaround” section) that could be taken to secure vulnerable assets.</p>
<h3>How to find FortiOS, FortiProxy, and FortiSwitchManager assets</h3>
<p>From the <a href="https://console.runzero.com/inventory" rel="noopener" target="_blank">Asset Inventory</a>, runZero users entered&nbsp;the following <a href="https://console.runzero.com/inventory?search=os%3AFortiOS%20or%20product%3AFortiProxy%20or%20product%3AFortiSwitchManager" rel="noopener" target="_blank">pre-built query</a> to locate FortiOS, FortiProxy, and FortiSwitchManager assets:</p>
<pre><code>os:FortiOS or product:FortiProxy or product:FortiSwitchManager
</code></pre>
<figure><img src="/img/rapid-response/fortinet-query.png" class="img-fluid" alt="The prebuilt query is available in the Queries Library" title="The Queries Library" data-image="ub17dygydnhj"></figure>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/cisco-ucm/</id>
            <title>Cisco Unified Communications products vulnerability: CVE-2026-20045</title>
            <published>2026-01-22T17:21:00-05:00</published>
            <updated>2026-01-22T17:21:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/cisco-ucm/" />
            <summary type="html">Cisco has reported a vulnerability affecting multiple products used to manage telecommunications, voice, video, and telepresence across various devices.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest Cisco Unified Communications Manager&nbsp;vulnerability: CVE-2026-20045</h2>
<p>Cisco has&nbsp;<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b#fs" rel="noopener" target="_blank">reported a vulnerability</a> in their Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, and Cisco Dedicated Webex Calling Dedicated Instance products. These are products used to manage&nbsp;telecommunications,&nbsp;voice, video, and telepresence across various devices.</p>
<p>These products contain a vulnerability that would allow a remote, unauthenticated attacker to execute arbitrary commands on the underlying operating system of the device. This could be used to gain complete control over the vulnerable system.</p>
<p>This vulnerability has been assigned <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20045" target="_blank">CVE-2026-20045</a> and has a CVSS score of 8.2 (<strong><em>high</em></strong>). Note that while the CVSS score indicates a&nbsp;<em>high</em> ranking, the vendor advisory indicates that this is a&nbsp;<em><strong>critical</strong></em> vulnerability.<em><strong></strong></em></p>
<p><strong>The following versions are affected</strong></p>
<ul><li>Versions 12.5, 14.x, and 15.x&nbsp;of the above products are confirmed vulnerable. Older versions may still be vulnerable.</li></ul>
<h2>What are these products?</h2>
<p>These products are used to manage telecommunications, voice, video, and telepresence across various devices.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an adversary to execute arbitrary commands on a vulnerable host.</p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>No workarounds are available but Cisco has released patches for vulnerable systems. For users of versions 12.5 or earlier, users are advised they must upgrade to a fixed version. For newer versions,&nbsp;<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b#fs" rel="noopener" target="_blank">apply the appropriate patches</a>&nbsp;as indicated in the vendor's security advisory.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software inventory</a>, use the following query to locate potentially vulnerable assets:</p>
<pre><code>vendor:=Cisco AND product:="Unified Communications Manager"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/six-predictions-cybersecurity-2026/</id>
            <title>Six things we’re expecting for cybersecurity in 2026</title>
            <published>2026-01-15T08:30:00-05:00</published>
            <updated>2026-01-15T08:30:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/six-predictions-cybersecurity-2026/" />
            <summary type="html">Now we’re all back at work and the holidays are a distant memory, we’ve had a chance to take stock of the traditional annual rush of end-of-year predictions and hot takes.</summary>
                            <author>
                    <name>runZero Team</name>
                </author>
                        <content type="html">
                <![CDATA[<p dir="ltr">Now we’re all back at work and the holidays are a distant memory, we’ve had a chance to take stock of the traditional annual rush of end-of-year predictions and hot takes. Away from the hype, there are practical changes we’re already seeing across networks, vulnerabilities, and security operations, as discussed on the recent <a href="https://www.runzero.com/resources/runzero-hour-25/" rel="noopener" target="_blank">runZero Hour</a> and when Tod Beardsley appeared on the TrojAI podcast, <a href="https://www.youtube.com/watch?v=Tqq00ebB8zU" rel="noopener" target="_blank">Predictions 2026: AI, Security, and the Next Wave of Tech</a>.</p>
<p dir="ltr">What follows is what we’re expecting to see more of in 2026, from OT exposure and exploit noise to vulnerability decision-making, automation risks, and where AI actually, genuinely helps defenders. Taken together, they point to a 2026 shaped less by breakthroughs, and more by how well organizations understand their own changing environments.</p>
<h2 dir="ltr">As OT exposure increases, ransomware will follow</h2>
<p dir="ltr">OT environments are increasingly being managed through IT and cloud platforms for practical reasons: easier management, remote access, and operational efficiency. But that shift means more OT systems are now either directly exposed to the internet or sitting just one hop away from it. </p>
<p dir="ltr">In 2026, we predict ransomware will increasingly target OT and edge systems. Not because attackers have developed new techniques, but because these systems have become much more reachable. </p>
<p dir="ltr">What makes this especially challenging is that many OT environments were never designed with this level of connectivity in mind, and organisations often lack a clear, current understanding of how these systems are exposed.</p>
<h2 dir="ltr">Attackers scale noise, not capability</h2>
<p dir="ltr">Attackers won’t suddenly become more capable in 2026, but they will become much louder. AI is already being used to generate exploit code at scale, and the result is a flood of low-quality output rather than a wave of consistently effective new attacks.</p>
<p dir="ltr">Every headline vulnerability now attracts instant, AI-generated proof-of-concept exploits, often published to GitHub without testing or validation. Most don’t work. Some barely compile. But they still demand attention, forcing defenders to waste time sorting through dozens of broken PoCs to find the handful that are actually relevant. </p>
<p dir="ltr">We expect this dynamic to intensify in 2026. AI gives attackers scale, not precision, and that scale creates noise that bleeds directly into defender workflows. The real cost shows up in time and focus, not breach statistics. Teams that can quickly determine whether a vulnerability or exploit applies to their environment will cope. Teams that can’t will spend 2026 chasing ghosts.</p>
<h2 dir="ltr">The real vuln problem is actionability, not volume</h2>
<p dir="ltr">In 2026, we predict vulnerability management will hinge less on counting CVEs and more on deciding which ones deserve attention at all. Teams that treat every new disclosure as equally urgent will struggle. The bottleneck won’t be finding vulnerabilities: it will be determining which ones matter in a specific environment, and which can safely wait.</p>
<p dir="ltr">To date, there’s no evidence CVE quality is collapsing under the weight of AI. <a href="https://www.runzero.com/blog/all-american-cve-rejects/" rel="noopener" target="_blank">In 2025, around 900 CVEs were rejected, of which roughly 800 were rejected before they were ever published.</a> Only about 100 were published and later withdrawn. That doesn’t point to a system overwhelmed by bad AI output.</p>
<p dir="ltr">What <em>has </em>changed is how difficult it’s become to decide what’s actionable. CVE issuance is now spread across hundreds of CNAs, not concentrated in a single authority, and vulnerability reports arrive with widely varying levels of clarity and usefulness. <a href="https://www.theregister.com/2025/05/07/curl_ai_bug_reports/" rel="noopener" target="_blank">Some maintainers</a> have already started rejecting AI-generated reports outright because of hallucinations and low signal. Interpretation is the key challenge.</p>
<h2 dir="ltr">AI helps defenders where it supports triage</h2>
<p dir="ltr">Despite the increase in noise, defenders aren’t starting from a position of weakness. AI is already proving useful in one specific area: triage. For years, security teams have been overwhelmed by alerts, vulnerability feeds, and signals competing for attention. LLMs are well suited to classification and prioritization, even when they’re imperfect, because misclassification in triage doesn’t mean something disappears: it just moves lower in the queue. (As an aside, this does contribute to the “low-priority is no-priority” binary problem, but that’s not new in vuln management.)</p>
<p dir="ltr">We expect this to become normalized in 2026. AI won’t (and certainly shouldn’t) replace analysts or make autonomous security decisions, but it will increasingly be used to sort, group, and contextualize work before a human ever looks at it. Teams that use AI to reduce alert fatigue and focus attention will cope better with rising noise, while teams that expect it to think or reason on their behalf won’t.</p>
<h2 dir="ltr">Automation creates new operational failures</h2>
<p dir="ltr">As more security and operational tasks are automated, new classes of mistakes will appear. Not because the technology is malicious, but because it’s being asked to act with limited context. When AI agents are given permissions and autonomy without a clear model of what “normal” behavior looks like, errors can propagate quickly.</p>
<p dir="ltr">At some point in 2026, the incident won’t start with a human clicking a phishing link, but with an AI assistant doing it on that human’s behalf. Or when one assistant convinces another to act on bad information: effectively one AI assistant phishing another.</p>
<p dir="ltr">Automation can remove friction, but it can also remove pauses and checks. Without clear boundaries and visibility into what automated systems are doing, mistakes travel faster than people can intervene.</p>
<h2 dir="ltr">A new AI-created vulnerability class emerges</h2>
<p dir="ltr">2026 may be the year a genuinely new class of software vulnerability appears; one that isn’t just an evolution of existing bug types. This won’t come from AI writing obviously broken code, but from AI producing solutions that work, are adopted, and spread before anyone fully understands how or why they’re risky. The issue won’t be that the code fails; it’s that it will succeed in ways people don’t reason about naturally.</p>
<p dir="ltr">The underlying concern is that models don’t think like programmers. They don’t reason in the same abstractions, assumptions, or constraints, and that difference matters. When AI-generated patterns are reused widely — because they solve real problems efficiently — flaws can propagate at scale before they’re recognized as vulnerabilities at all. </p>
<p dir="ltr">Our prediction isn’t that this will happen someday in the distant future. It’s that 2026 is when the industry will first have to confront vulnerabilities that exist specifically because of how AI systems reason, not because of familiar programming mistakes.</p>
<p dir="ltr"><strong>For the full discussion of these — complete with context, caveats, and detours&nbsp;— plus a look back on 2025's highs and lows,&nbsp;<a href="https://www.runzero.com/resources/runzero-hour-25/" rel="noopener" target="_blank">watch to the latest runZero Hour</a>.</strong><br></p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/n8n/</id>
            <title>Critical n8n RCE vulnerability: CVE-2026-21858</title>
            <published>2026-01-09T00:56:00-05:00</published>
            <updated>2026-01-09T00:56:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/n8n/" />
            <summary type="html">Cyera has reported a critical RCE vulnerability in n8n that could lead to complete system compromise if exploited. Here&#039;s how to find affected assets.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest n8n vulnerability: CVE-2026-21858</h2>
<p>Cyera has <a href="https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858" rel="noopener" target="_blank">reported a vulnerability</a> in the n8n workflow automation tool. This flaw allows a remote, unauthenticated attacker to execute arbitrary code on the vulnerable system. Successful exploitation could allow complete system compromise.</p>
<p>This vulnerability has been assigned <a href="https://www.cve.org/CVERecord?id=CVE-2026-21858" rel="noopener" target="_blank">CVE-2026-21858</a> and is rated <strong><em>highly critical</em></strong> has a CVSS score of <strong>10.0</strong>.<br></p>
<p><strong>The following versions are affected</strong></p>
<ul><li>n8n versions 1.65.0 up to but not including 1.121.0</li></ul>
<h2>What is n8n?</h2>
<p>n8n is an AI-centric workflow automation tool.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>n8n.io has released version 1.121.0 of n8n. Users are urged to update as quickly as possible.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/services" target="_blank">Services inventory</a>, use the following query to locate potentially vulnerable assets:</p>
<pre><code>_asset.protocol:="http" AND protocol:="http" AND html.title:="n8n.io%"</code></pre>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/all-american-cve-rejects/</id>
            <title>All American CVE Rejects</title>
            <published>2026-01-08T08:00:00-05:00</published>
            <updated>2026-01-08T08:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/all-american-cve-rejects/" />
            <summary type="html">How big is the CVE dispute problem, really? Tod Beardsley analyzes the frequency of rejected and disputed CVEs to clear up the confusion.</summary>
                            <author>
                    <name>todb</name>
                </author>
                        <content type="html">
                <![CDATA[<p>Happy New Year, my vuln management friends! While I was busily scribbling on runZero’s next research paper, I became aware of a <a href="https://www.cve.org/Media/News/item/blog/2025/12/16/CVE-Record-Disputes-Explained" rel="noopener" target="_blank">blog post</a> from the <a href="https://www.cve.org/ResourcesSupport/Glossary#glossaryCoR" rel="noopener" target="_blank">CVE Council of Roots</a> (a much less shadowy group than their name might lead you to believe). It’s all about the CVE Dispute process, what the dispute tag really means, and what the CVE Program does when there’s a disagreement about a particular CVE. This has been kind of a hot topic lately, what with the growing amount of CVE scope overlap that is the natural result of recruiting nearly 500 CNAs. Specifically, and unrelatedly, there was a bit of confusion over the recent <a href="https://www.runzero.com/blog/vercel-next-js/" rel="noopener" target="_blank">React.js</a> and <a href="https://nextjs.org/blog/CVE-2025-66478" rel="noopener" target="_blank">Next.js</a> bugs, and what all happened with one of those CVEs.</p>
<p>To get to the point, it occurred to me that I didn’t have an immediate understanding of how often CVEs are disputed, or rejected, in the first place. How big of a problem is this dispute and rejection confusion, really? That’s kind of a gap in my own understanding of the program, so since we’re talking about CVE disputes and rejections and all these sad outcomes for CVEs, let’s find out together how often this all happens!</p>
<p>First off, with over 300,000 CVE records currently published, it’s always a bit of a trick to count subsets of CVE records, especially when you’re dealing with CVEs that were rejected, and thus, deleted out of the history. CVE records don’t come with an easy and obvious history of changes – what you get today from a CVE record stands by itself, atomically. But, with just a little <a href="https://github.com/runZeroInc/research-artifacts/blob/main/cve-rejected-audit/cve-rejected-audit.sh" rel="noopener" target="_blank">shell scripting magic</a> and the power of GitHub, I think I have a pretty decent mechanism to keep on top of these stats, though it takes a few minutes to walk a git history.</p>
<p>Here’s my goofball shell script output, which depends on zsh, as I am a civilized gentleman on a MacBook for most of my computing. A run of this against <a href="https://github.com/cveproject/cvelistV5/commit/9bc16caf728b0e5fe7b236d0dd242642f0351453" rel="noopener" target="_blank">a recent git checkout</a> of <a href="https://github.com/CVEProject/cvelistV5" rel="noopener" target="_blank">CVEProject/cvelistV5</a> can shed some light on what actually goes on in CVE-land:</p>
<pre><code>[2026-01-07 10:31:13] Completed audit:
  [*] Total CVE records:    40480
  [*] Rejected CVE records: 1648
  [*] Year:                 2025
    1648 cveaudit-rejected.txt
     120 cveaudit-disputed-today.txt
      85 cveaudit-rejected-after-published.txt
      18 cveaudit-rejected-after-disputed.txt
    1545 cveaudit-rejected-unpublished.txt
    3416 total
</code></pre>
<p>Some kind of interesting observations shake out here. First, CVE records are very rarely rejected these days. The CVE Program doesn't just <a href="https://www.youtube.com/watch?v=KtypSRcwIhA" rel="noopener" target="_blank"><em>swing, swing, swing</em></a> the rejection hammer at every disagreement; out of the 40,000 CVE records created with a “2025” label, it looks like only 85 were rejected after they were first published. Most (about 96%) were caught and rejected before they ever saw the light of day, and that’s typically due to internal housekeeping – a CNA reserved a CVE, found out it was a duplicate, or not a bug after all, or some other internal process. No dramatic public fight or anything.</p>
<p>Even more interesting, of those CVEs that were published and subsequently labelled as disputed, for whatever reason, only 18 total (not 18%) were ultimately rejected. The comfortable majority (about 85%) live on, with the ignoble <a href="https://www.gutenberg.org/ebooks/33?xs=1" rel="noopener" target="_blank">scarlet letter</a> of a disputed tag. </p>
<p>Just in case you were thinking that 2025 was an outlier, it is, but not for the reasons you think. I get similar results for 2023. Kind of surprisingly, 2024 was the true outlier, since 2025 is a fair bit down from last year.</p>
<figure style="margin:0px!important"><table>
<tbody><tr>
<td><pre><code style="font-size:13px!important">  [*] Total CVE records:    38912
  [*] Rejected CVE records: 737
  [*] Year:                 2024
     737 cveaudit-rejected.txt
     105 cveaudit-disputed-today.txt
     108 cveaudit-rejected-after-published.txt
      82 cveaudit-rejected-after-disputed.txt
     547 cveaudit-rejected-unpublished.txt
    1579 total</code></pre></td>
<td><pre><code style="font-size:13px!important">  [*] Total CVE records:    31103
  [*] Rejected CVE records: 603
  [*] Year:                 2023
     603 cveaudit-rejected.txt
     126 cveaudit-disputed-today.txt
      69 cveaudit-rejected-after-published.txt
      17 cveaudit-rejected-after-disputed.txt
     517 cveaudit-rejected-unpublished.txt
    1332 total</code></pre></td>
</tr>
</tbody></table></figure>
<p>In all three years, the vast majority of rejected CVEs were never published to begin with. This lines up with the aforementioned blog from the CVE Council of Roots – the disputed tag is clearly not being treated as a death sentence for CVE records, but merely a signal that “hey, people disagree about this CVE record, and that’s okay.”</p>
<p>The surprising part, really, is how rarely disputed status even comes up. This could be explained a couple of ways. Maybe the dispute process is really, really high friction, so most people don’t bother unless they’re <strong>really</strong> annoyed by a CVE’s existence. Or, maybe there’s a nefarious conspiracy among the CNAs to squash dispute reports before they ever reach published CVEs, like some kind of <a href="https://en.wikipedia.org/wiki/Star_Chamber" rel="noopener" target="_blank">Star Chamber</a> of CVE truth. On the third hand, maybe most CVEs are basically okay, and there isn’t a need to over-engineer a dispute process when disputes are both rare, and meant to signal mild-to-severe disagreement over a CVE’s content.</p>
<p>What should you do with disputed CVEs? Well, since they’re so rarely disputed, they’re naturally going to be that much more interesting. After all, everyone secretly loves a <em>liiiiitle</em> bit of drama at work. You could study these all in the space of a few days, in depth, and hopefully come away with a better understanding of why they’re in dispute. If you are in a position where you need to justify to your manager why you are, or aren’t, addressing a particular CVE, <strong>and </strong>it’s disputed, you probably want to get a pretty good handle on what people are disagreeing on with that bug. But, since there aren’t hundreds and hundreds of these things, you can usually get caught up pretty quickly with just a little reference-spelunking. Ask the issuing CNA, or the original reporter of the vulnerability, and they’re likely to be eager to spill the tea.</p>
<p>The moral of the story, though, is that while CVEs are generally useful for describing known, documented vulnerabilities, they are not the end-all, be-all of <a href="https://www.runzero.com/resources/vulnerability-management-is-broken/" rel="noopener" target="_blank">vulnerability management</a>. There’s even a tiny percentage that aren’t themselves clear on if they’re even a vulnerability or not. As always, if you want to get a beyond-CVEs view of your enterprise’s overall exposure, in context, give <a href="https://www.runzero.com/try/" rel="noopener" target="_blank">our free trial</a> a whirl, why don’t you? It’s 2026, a brand new year, and a fine time to consider a more whole-network, whole-exposure approach to vulnerability management that will actually help you not get hacked rather than just merely check the compliance box.</p>]]>
            </content>
        </entry>
            
        
        
        
        
        <entry>
            <id>https://www.runzero.com/blog/hpe-oneview/</id>
            <title>HPE OneView RCE vulnerability: CVE-2025-37164</title>
            <published>2025-12-18T13:19:00-05:00</published>
            <updated>2026-01-07T22:00:00-05:00</updated>
            <link rel="alternate" type="text/html" href="https://www.runzero.com/blog/hpe-oneview/" />
            <summary type="html">HP Enterprise has reported a RCE vulnerability in OneView. Successful exploitation could allow total system compromise. Here&#039;s how to find affected assets.</summary>
                            <author>
                    <name>Rob King</name>
                </author>
                        <content type="html">
                <![CDATA[<h2>Latest HPE OneView vulnerability: CVE-2025-37164</h2>
<p>HP Enterprise has&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US#vulnerability-summary-1" rel="noopener" target="_blank">reported a vulnerability</a>&nbsp;in their OneView product. This flaw allows a remote, unauthenticated attacker to execute arbitrary code on the vulnerable system. Successful exploitation could allow complete system compromise.</p>
<p>This vulnerability has been assigned <a href="https://www.cve.org/CVERecord?id=CVE-2025-37164" rel="noopener" target="_blank">CVE-2025-37164</a> and is rated <strong><em>highly critical</em></strong> has a CVSS score of <strong>10.0</strong>.</p>
<p>There is <a href="https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank">evidence</a> that this vulnerability <strong>is being actively exploited in the wild</strong>.</p>
<p><strong>The following versions are affected</strong></p>
<ul><li>All versions of HPE OneView 10.20 and prior</li></ul>
<h2>What is HPE?</h2>
<p>HPE OneView is a comprehensive IT infrastructure management application.</p>
<h2>What is the impact?</h2>
<p>Successful exploitation of this vulnerability would allow an adversary to execute arbitrary code on the vulnerable host, potentially leading to complete system compromise.<br></p>
<h2 dir="ltr">Are updates or workarounds available?</h2>
<p>HPE has&nbsp;<a href="https://myenterpriselicense.hpe.com/cwp-ui/product-details/HPE_OV_CVE_37164_Z7550-98077/-/sw_free" rel="noopener" target="_blank">released hotfix HPE_OV_CVE_37164_Z7550-98077</a>&nbsp;and has advised all users to apply this hotfix. Note that this hotfix does not apply to versions of HPE OneView 5.20, which may remain vulnerable. This hotfix must be reapplied&nbsp;after an appliance upgrade from HPE OneView version 6.60.xx to 7.00.00, including any HPE Synergy Composer reimage.</p>
<h2 dir="ltr">How to find potentially vulnerable systems with runZero</h2>
<p>From the <a href="https://console.runzero.com/inventory/software-groups" target="_blank">Software inventory</a>, use the following query to locate potentially vulnerable assets:</p>
<pre><code>(vendor:="HP" AND product:="Oneview") OR (vendor:="HPE" AND product:="OneView")</code></pre>]]>
            </content>
        </entry>
    </feed>
