Originally reported by The Hacker News, MSRC Security Updates
TL;DR
Fortinet released emergency patches for CVE-2026-35616, a critical pre-authentication bypass in FortiClient EMS being actively exploited. Researchers also discovered 36 malicious npm packages masquerading as Strapi plugins to exploit databases and deploy persistent implants.
The roundup includes an actively exploited zero-day vulnerability in Fortinet FortiClient EMS with a CVSS score of 9.1, representing confirmed exploitation in the wild of enterprise security infrastructure.
Fortinet has issued out-of-band security patches for CVE-2026-35616, a critical vulnerability in FortiClient EMS with a CVSS score of 9.1 that threat actors are actively exploiting in the wild. The flaw represents a pre-authentication API access bypass leading to privilege escalation.
The vulnerability stems from improper access control (CWE-284) that allows attackers to bypass authentication mechanisms and escalate privileges without legitimate credentials. Fortinet's emergency patch release indicates the severity of ongoing exploitation campaigns targeting enterprise environments.
Organizations running FortiClient EMS should prioritize immediate patching, as the pre-authentication nature of the vulnerability significantly lowers the barrier to exploitation.
Security researchers have identified 36 malicious packages in the npm registry masquerading as legitimate Strapi CMS plugins. These packages deploy sophisticated payloads designed to exploit Redis and PostgreSQL databases, establish reverse shells, harvest credentials, and maintain persistent access to compromised systems.
Each malicious package follows a consistent structure containing three files: package.json, index.js, and postinstall.js. The packages lack standard metadata such as descriptions or repository links, serving as potential indicators for detection.
The campaign demonstrates the continued evolution of supply chain attacks targeting JavaScript ecosystems, with attackers specifically focusing on database infrastructure commonly deployed alongside Node.js applications.
Microsoft's Security Response Center has published information for eight new CVE identifiers covering vulnerabilities across multiple components:
Linux Kernel Vulnerabilities:
CVE-2026-23473: io_uring polling mechanism race condition affecting multishot receive operationsCVE-2026-31394: mac80211 crash vulnerability in AP_VLAN station bandwidth change handlingCVE-2026-23468: AMD GPU driver resource exhaustion through unlimited buffer object list entriesCVE-2026-23442: IPv6 null pointer dereference in Segment Routing v6 (SRv6) code pathsCVE-2026-23472: Serial core infinite loop condition for PORT_UNKNOWN devicesSystem Components:
CVE-2026-34978: OpenPrinting CUPS path traversal vulnerability enabling arbitrary file writes outside designated cache directoriesCVE-2026-27456: util-linux mount utility time-of-check-time-of-use (TOCTOU) race condition during loop device setupCVE-2026-35414: Unspecified vulnerability with limited public informationThese disclosures span critical system components from kernel networking stacks to printing subsystems, requiring coordinated patching efforts across Linux distributions and affected platforms.
Originally reported by The Hacker News, MSRC Security Updates