Rapid responses

runZero’s Rapid Response program provides immediate detection and notification of emerging threats. Each Rapid Response includes a query to find matching assets, a trigger to analyze all inventories for exposure, and a corresponding blog post with the details of the issue. This program focuses on helping customers mitigate exposures before compromise.

Vulnerabilities covered by the Rapid Response program are replaced by more specific coverage as mitigations become available.

Latest Rapid Responses

DateNameTypeSeverityQueryUS SaaS LinkEU SaaS Link
03/17/2026Rapid Response: CraftCMS (CVE-2026-32267)softwareInfovendor:=CraftCMS AND product:="Craft CMS"LinkLink
03/13/2026Rapid Response: Potential GNU Inetutils telnetd Pre-Auth RCE (2026-03)servicesInfo_asset.protocol:=telnet AND protocol:=telnet AND os:Linux AND banner:="%login:" AND NOT (type:device OR type:"ip camera" OR type:"ip phone" OR banner:busybox)LinkLink
03/12/2026Rapid Response: Veeam Backup & Replication Multiple Vulnerabilities (2026-03)softwareInfovendor:=Veeam AND (product:="Backup & Replication" OR product:="Veeam Backup & Replication")LinkLink
03/11/2026Rapid Response: HPE Aruba Networking AOS-CX Multiple Vulnerabilities (2026-03)assetsInfohw:="HPE Aruba CX%" AND protocol:httpLinkLink
03/10/2026Rapid Response: Gogs Cross-Repository LFS Object Overwrite Vulnerability (CVE-2026-25921)softwareInfovendor:=Gogs AND product:=GogsLinkLink
03/09/2026Rapid Response: Nginx UI Unauthenticated Backup Download With Encryption Key Disclosure (CVE-2026-27944)servicesInfo_asset.protocol:=http AND protocol:=http AND favicon.ico.image.mmh3:="-1565173320"LinkLink
03/05/2026Rapid Response: Cisco Secure Firewall Management Center Multiple Vulnerabilities (2026-03)assetsCriticalos:="Cisco FMC%" AND os_version:>0 AND ((os_version:>="6.4.0.13" AND os_version:<="6.4.0.18") OR (os_version:>="7.0.0" AND os_version:<"7.0.9") OR (os_version:>="7.1.0" AND os_version:<"7.2.11") OR (os_version:>="7.3.0" AND os_version:<"7.4.6") OR (os_version:>="7.6.0" AND os_version:<"7.6.5") OR (os_version:>="7.7.0" AND os_version:<"7.7.12") OR (os_version:="10.0.0"))LinkLink
02/27/2026Rapid Response: Junos OS Evolved: PTX Series: CVE-2026-21902assetsInfoos:="Juniper Junos OS Evolved" AND ((os_version:>="25.4R1-EVO" AND os_version:<"25.4R1-S1-EVO") OR (os_version:>"25.4R1-S1-EVO" AND os_version:<"25.4R2-EVO"))LinkLink
02/25/2026Rapid Response: Cisco Catalyst SD-WAN Controller & Manager Authentication Bypass (CVE-2026-20127)assetsInfohw:="Cisco vManage" OR os:="Cisco Viptela OS"LinkLink
02/19/2026Rapid Response: Grandstream GXP1600 Series VoIP Phone RCE (CVE-2026-2329)assetsCriticalhw:="Grandstream GXP16__" AND (os_version:>0 AND os_version:<"1.0.7.81")LinkLink
02/18/2026Rapid Response: Dell RecoverPoint For Virtual Machines (CVE-2026-22769)assetsInfohw:="RecoverPoint for Virtual Machines" OR os:="EMC RecoverPoint" OR hw:="EMC RecoverPoint"LinkLink
02/09/2026Rapid Response: BeyondTrust Remote Support & Privileged Remote Access RCE (CVE-2026-1731)servicesInfo_asset.protocol:=http AND protocol:=http AND (product:="BeyondTrust Remote Support" OR product:="BeyondTrust Privileged Remote Access") AND _service.product:beyondtrustLinkLink
02/03/2026Rapid Response: Detected K8S Ingress-NGINX InstanceservicesInfo(_asset.protocols:tls AND protocol:tls AND tls.issuer:="O=nil1" AND tls.subject:="O=nil2" AND tls.names:"%nginx%")LinkLink
02/02/2026Rapid Response: OpenClaw One-Click RCE Via Authentication Token (CVE-2026-25253)softwareInfovendor:=OpenClaw product:=OpenClawLinkLink
01/29/2026Rapid Response: Ivanti Endpoint Manager Mobile Multiple RCE (2026-01)softwareInfovendor:=Ivanti AND product:="Endpoint Manager Mobile"LinkLink
01/28/2026Rapid Response: SolarWinds Web Help Desk Multiple Vulnerabilities (2026-01)softwareInfovendor:=SolarWinds AND product:="Web Help Desk"LinkLink
01/27/2026Rapid Response: Multiple Fortinet Products Authentication Bypass (CVE-2026-24858)assetsInfoos:="Fortinet FortiAnalyzer" OR hw:="Fortinet FortiManager" OR os:="Fortinet FortiProxy" OR (os:="Fortinet FortiOS" AND os_version:>0 AND ((os_version:>="7.0.0" AND os_version:<="7.0.18") OR (os_version:>="7.2.0" AND os_version:<="7.2.12") OR (os_version:>="7.4.0" AND os_version:<="7.4.10") OR (os_version:>="7.6.0" AND os_version:<="7.6.5")))LinkLink
01/22/2026Rapid Response: Cisco Unified Communications Manager Remote Code Execution (CVE-2026-20045)softwareInfovendor:=Cisco AND product:="Unified Communications Manager"LinkLink
Updated