Critical SolarWinds Web Help Desk Flaw Exploited; CISA Orders Rapid Patching
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Langflow: Critical RCE Exploited Within a Day of Patch
Langflow suffered unauthenticated remote code execution that attackers weaponized roughly twenty hours after the fix shipped, enabling credential theft and potential supply-chain staging. Immediate action: rotate secrets, isolate pipelines, and hunt for indicator overlaps across CI/CD and cloud services.

Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges
A critical unauthenticated remote-code execution bug (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access was probed and targeted within 24 hours of a public proof-of-concept, exposing thousands of internet-facing instances. Organizations should treat exposed BeyondTrust deployments as emergency patching and containment priorities, applying access restrictions, WAF/ACL rules, and focused threat-hunting while verifying remediation.

VMware Aria Operations Exploited; CISA Adds CVE-2026-22719 to KEV
A high-severity, unauthenticated command-injection flaw, CVE-2026-22719 , is being exploited against VMware Aria Operations , and CISA has added it to the Known Exploited Vulnerabilities catalog with a federal remediation mandate. This event is one of several recent management-plane and remote‑access vulnerabilities (e.g., SolarWinds WHD, BeyondTrust) that have been weaponized quickly after disclosure, compressing patch windows and forcing urgent compensating controls.

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
CISA added a high-severity vulnerability in TeamT5’s ThreatSonar (CVE-2024-7694) to its Known Exploited Vulnerabilities catalogue and required federal remediation by March 10, 2026. The bug allows unsafe file uploads that can be chained with elevated privileges to achieve remote command execution; a vendor patch was issued in August 2024 but evidence of in‑the‑wild exploitation has been reported.

Cisco SD‑WAN Compromised; CISA and Five Eyes Order Emergency Hunts
CISA and Five Eyes partners warned of active exploitation against Cisco SD‑WAN, flagging two tracked CVEs and urging immediate hunts, log preservation, and patching. The alert joins a string of rapid, high‑impact exploit events (Fortinet, SolarWinds and other KEV additions), compressing remediation windows and forcing both near‑term incident response and longer‑term edge‑device inventory and replacement planning.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Google: Multiple APTs and crime syndicates widely exploited a critical WinRAR flaw
Google Threat Intelligence Group says a high-severity WinRAR vulnerability (CVE-2025-8088) has been actively abused for months by both nation-state actors and financially motivated groups. Attackers leveraged crafted RAR archives and hidden alternate data streams to place persistent payloads — affecting government, military, technology, travel, and banking targets globally.
Oracle issues emergency patch for Identity Manager remote-code flaw
Oracle released an out-of-cycle fix for CVE-2026-21992 , a critical unauthenticated remote-code risk in Identity Manager and Web Services Manager . Security teams should assume a compressed remediation window (CVSS 9.8 ) and prioritize emergency patching plus short-term network isolation and focused hunting.