Rapid responses

View as Markdown

runZero’s Rapid Response program provides immediate detection and notification of emerging threats. Older entries are migrated to standalone queries or templates.

9
Rapid Responses
4
services
3
software
2
assets
9 of 9 rapid responses
Citrix Hypervisor Multiple Vulnerabilities (2026-04)
Type:assetsPublished:Apr 27, 2026

Citrix Hypervisor, formerly known as Citrix XenServer, is a bare-metal hypervisor based on the open-source Xen project that enables multiple virtual machines to run concurrently on a single physical server.

On April 24, 2026, researchers publicly disclosed an audit identifying 89 exploitable vulnerabilities. These issues primarily involve missing input validation across all writable Map(String,String) fields within eight XAPI object types. Consequently, an attacker with the vm-admin management role “can achieve full host filesystem read/write [access], cross-VM data exfiltration, storage protocol injection, cross-hypervisor lateral movement, and pool-wide compromise through single API calls with no exploit code, no root shell, and no security alerts.” These vulnerabilities have persisted since the inception of the XAPI codebase (circa 2006). The researchers assigned the following CVSS severity distribution: 5 critical, 28 high, 46 medium, and 10 low.

These vulnerabilities do not currently have CVE IDs assigned.

The following products and versions are affected:

  • Citrix Hypervisor or XenServer: All versions
  • XCP-ng: All versions
  • Any XAPI-based hypervisor distribution
os:="Citrix XenServer"
LiteLLM Proxy Multiple Vulnerabilities (2026-04)
Type:servicesPublished:Apr 23, 2026

LiteLLM Proxy is an open-source gateway that enables applications to interact with multiple large language model (LLM) providers through a single, standardized API by translating requests into the specific formats required by each service.

Certain versions of LiteLLM Proxy are susceptible to multiple vulnerabilities that can be chained together to achieve remote code execution (RCE). In the official LiteLLM container images, the process runs as root. For deployments outside of these official containers, the code executes with the privileges of the user account running the proxy process. Research regarding the exploit chain involving GHSA-r75f-5x8p-qvmc and GHSA-xqmj-j6mv-4862 indicates that the vulnerable code path only triggers after the server has processed “a minimum amount of legitimate interaction.”

These vulnerabilities do not currently have CVE IDs assigned. Update (April 27, 2026): The advisories now reflect assigned CVE IDs; however, these remain in a “reserved” state, and further details have not yet been provided by the CNA.

  • CVE-2026-42208: A SQL injection vulnerability exists in the API key verification process due to improper error handling. A remote, unauthenticated attacker can exploit this by sending a specially crafted Authorization header to any LLM API endpoint (e.g., /chat/completions). Successful exploitation allows an attacker to read or potentially modify database data, leading to unauthorized access to the proxy and the credentials it manages.

  • CVE-2026-42203: A server-side template injection (SSTI) vulnerability in the /prompts/test API endpoint arises from the improper neutralization of user-supplied prompt templates, which are rendered without sandboxing. A crafted template can execute arbitrary code within the LiteLLM Proxy process. Successful exploitation allows a remote, authenticated user to access secrets in the process environment (e.g., provider API keys or database credentials) or execute arbitrary code on the host.

  • CVE-2026-42271: An authenticated command execution vulnerability exists in the MCP stdio test endpoints (/mcp-rest/test/connection and /mcp-rest/test/tools/list), which are used to preview an MCP server before saving. A remote, low-privileged attacker can exploit this by providing a crafted server configuration in the request body. The command is spawned as a subprocess on the proxy host with the privileges of the proxy process.

The following versions are affected:

  • LiteLLM: Versions 1.81.16 through 1.83.6
_asset.protocol:http AND protocol:http AND (html.title:="LiteLLM%" OR last.html.title:="LiteLLM%")
CrowdStrike Falcon LogScale Unauthenticated Path Traversal (CVE-2026-40050)
Type:servicesPublished:Apr 22, 2026

CrowdStrike Falcon LogScale (formerly Humio) is a log management and observability platform that ingests, stores, and enables real-time search of large-volume streaming data using an index-free architecture.

Certain versions of self-hosted LogScale are susceptible to an unauthenticated path traversal vulnerability. A remote, unauthenticated attacker could exploit a specific, exposed cluster API endpoint to read arbitrary files from the server filesystem. This vulnerability does not affect Next-Gen SIEM customers.

The following versions are affected:

  • LogScale Self-Hosted (GA): Versions 1.224.0 through 1.234.0 (inclusive)
  • LogScale Self-Hosted (LTS): Version 1.228.0 and 1.228.1
_asset.protocol:http AND protocol:http AND (http.head.server:="Humio-%" OR last.http.head.server:="Humio-%")
Fortinet FortiSandbox Multiple Vulnerabilities (2026-04)
Type:assetsPublished:Apr 15, 2026

Fortinet FortiSandbox is a security appliance that identifies unknown threats by executing suspicious files in isolated virtual environments to monitor their behavior and then automates a response by sharing that intelligence across the network to block the detected threat.

Certain versions of FortiSandbox are susceptible to multiple vulnerabilities:

  • CVE-2026-39808: An OS command injection vulnerability exists within an API endpoint due to the improper neutralization of special elements. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted HTTP requests, potentially allowing for the execution of unauthorized code or commands.

  • CVE-2026-39813: An API privilege escalation vulnerability exists due to a path traversal flaw. A remote, unauthenticated attacker could exploit this vulnerability by sending specially crafted HTTP requests to the JRPC API. Successful exploitation may allow an attacker to bypass authentication and escalate privileges on the system.

The following versions are affected:

  • FortiSandbox 4.4: Versions 4.4.0 through 4.4.8 (affected by both CVEs)
  • FortiSandbox 5.0: Versions 5.0.0 through 5.0.5 (affected by CVE-2026-39813 only)
os:="Fortinet FortiSandbox%"
Fortinet FortiClient Endpoint Management Server API Auth Bypass (CVE-2026-35616)
Type:servicesPublished:Apr 4, 2026

Fortinet FortiClient Endpoint Management Server (EMS) is a centralized application used to deploy, configure, and monitor security settings on devices running the FortiClient agent.

Certain versions of FortiClient EMS are susceptible to an API authentication and authorization bypass vulnerability caused by improper access control. A remote, unauthenticated attacker could exploit this flaw by sending specially crafted requests to the server. A successful exploit may allow the attacker to execute unauthorized code or commands.

Both Fortinet and CISA have now confirmed that this vulnerability is being actively exploited in the wild.

The following versions are affected:

  • FortiClientEMS 7.4: Versions 7.4.5 through 7.4.6
_asset.protocol:http AND protocol:http AND favicon.ico.image.mmh3:=-800551065
Cisco Smart Software Manager On-Prem Multiple Vulnerabilities (2026-04)
Type:servicesPublished:Apr 3, 2026

Cisco Smart Software Manager On-Prem (SSM On-Prem) is a local virtual appliance that enables organizations to manage and track Cisco software licenses within a private network, eliminating the need to connect individual devices directly to Cisco’s cloud-based licensing portal.

Certain versions of Cisco SSM On-Prem are affected by the following vulnerabilities:

  • CVE-2026-20160: A vulnerability that could allow a remote, unauthenticated attacker to execute arbitrary commands on the underlying operating system of an affected host. This issue stems from the unintentional exposure of an internal service. An attacker could exploit this by sending a crafted request to the exposed service’s API. A successful exploit could grant the attacker root level privileges on the underlying operating system.

  • CVE-2026-20151: A vulnerability in the web interface that could allow a remote, low-privileged attacker (System User role) to elevate their privileges. This flaw exists due to the improper transmission of sensitive user information. An attacker could exploit this by sending a crafted message to the host and retrieving session credentials from subsequent status messages. This would allow an attacker to elevate their role from System User to administrative. Note: This vulnerability only exposes information regarding users currently logged into the web interface; SSH sessions are not affected.

The following versions are affected by one or both vulnerabilities:

  • CVE-2026-20151: Cisco SSM On-Prem versions 9-202510 and earlier.
  • CVE-2026-20160: Cisco SSM On-Prem versions 9-202502 through 9-202510.
_asset.protocol:http AND protocol:http AND html.title:="On-Prem License Workspace"
Cisco Integrated Management Controller Multiple Vulnerabilities (2026-04)
Type:softwarePublished:Apr 2, 2026

The Cisco Integrated Management Controller (IMC) is a dedicated baseboard management controller that provides out-of-band hardware configuration, monitoring, and remote control for Cisco UCS C-Series and S-Series servers via a web interface, CLI, or API, independent of the host operating system.

Certain versions of Cisco IMC are affected by the following vulnerabilities:

  • CVE-2026-20093: A vulnerability in the password change functionality could allow a remote, unauthenticated attacker to bypass authentication. Due to incorrect handling of password requests, an attacker could send a crafted HTTP request to alter any user’s password, including an Admin account, to gain full system access.

  • CVE-2026-20094: A vulnerability in the web-based management interface could allow a remote, low-privileged (read-only) attacker to perform command injection. By sending crafted commands to the interface, an attacker could exploit improper input validation to execute arbitrary commands as the root user.

  • CVE-2026-20095 and CVE-2026-20096: Two vulnerabilities in the web-based management interface could allow a remote, high-privileged (admin-level) attacker to perform command injection. Due to improper input validation, an attacker could execute arbitrary commands on the underlying operating system as the root user.

  • CVE-2026-20097: A vulnerability in the web-based management interface could allow a remote, high-privileged (admin-level) attacker to execute arbitrary code. By sending crafted HTTP requests to an affected device, an attacker could exploit improper input validation to execute arbitrary code on the underlying operating system as the root user.

The following Cisco products are affected if they are running a vulnerable release of Cisco IMC, regardless of device configuration:

5000 Series Enterprise Network Compute Systems (ENCS): (Affected by CVE-2026-20093, CVE-2026-20095, and CVE-2026-20096)

  • Cisco NFV Infrastructure Software (NFVIS) versions 4.15 and earlier

Catalyst 8300 Series Edge uCPE: (Affected by CVE-2026-20093, CVE-2026-20094, CVE-2026-20095, and CVE-2026-20096)

  • Cisco NFVIS versions 4.16 and earlier
  • Cisco NFVIS version 4.18

UCS C-Series M5 & M6 Rack Servers (Standalone Mode): (Affected by all CVEs: CVE-2026-20093, CVE-2026-20094, CVE-2026-20095, CVE-2026-20096, and CVE-2026-20097)

  • Cisco IMC versions 4.2 and earlier
  • Cisco IMC version 4.3
  • Cisco IMC version 6.0 (M6 only)

UCS E-Series M3 & M6: (Affected by CVE-2026-20093, CVE-2026-20094 (M6 only), CVE-2026-20095, and CVE-2026-20096)

  • Cisco IMC versions 3.2 and earlier (M3)
  • Cisco IMC versions 4.15 and earlier (M6)

UCS S-Series Storage Servers (Standalone Mode): (Affected by CVE-2026-20094, CVE-2026-20095, and CVE-2026-20096)

  • Cisco IMC versions 4.2 and earlier
  • Cisco IMC version 4.3

Cisco Appliances: The following appliances are affected if the Cisco IMC user interface (UI) is exposed, as these platforms are built upon preconfigured versions of the UCS C-Series Servers listed above:

  • Application Policy Infrastructure Controller (APIC) Servers
  • Business Edition 6000 and 7000 Appliances
  • Catalyst Center Appliances, formerly DNA Center
  • Cisco Telemetry Broker Appliances
  • Cloud Services Platform (CSP) 5000 Series
  • Common Services Platform Collector (CSPC) Appliances
  • Connected Mobile Experiences (CMX) Appliances
  • Connected Safety and Security UCS Platform Series Servers
  • Cyber Vision Center Appliances
  • Expressway Series Appliances
  • HyperFlex Edge Nodes
  • HyperFlex Nodes in HyperFlex Datacenter without Fabric Interconnect (DC-No-FI) deployment mode
  • IEC6400 Edge Compute Appliances
  • IOS XRv 9000 Appliances
  • Meeting Server 1000 Appliances
  • Nexus Dashboard Appliances
  • Prime Infrastructure Appliances
  • Prime Network Registrar Jumpstart Appliances
  • Secure Endpoint Private Cloud Appliances
  • Secure Firewall Management Center Appliances
  • Secure Malware Analytics Appliances
  • Secure Network Analytics Appliances
  • Secure Network Server Appliances
  • Secure Workload Servers
vendor:=Cisco AND product:="Integrated Management Controller"
Progress ShareFile Storage Zones Controller Multiple Vulnerabilities (2026-04)
Type:softwarePublished:Apr 2, 2026

Progress ShareFile Storage Zones Controller is a software application that enables organizations to store their ShareFile data on-premises or in a private cloud infrastructure, rather than using the default ShareFile cloud storage.

Certain versions of customer-managed ShareFile Storage Zones Controller (SZC) 5.x are affected by the following vulnerabilities:

  • CVE-2026-2699: Allows a remote, unauthenticated adversary to access restricted configuration pages. This could lead to unauthorized system configuration changes and potential Remote Code Execution (RCE) resulting from an Execution After Redirect (EAR) vulnerability.

  • CVE-2026-2701: Allows a remote, high-privileged user to upload a malicious file to the server and execute it to achieve RCE.

The following versions are affected

  • ShareFile Storage Zones Controller 5.x versions prior to 5.12.4
(vendor:="Progress Software" OR vendor:=Citrix OR vendor:=ShareFile) AND (product:="ShareFile Storage Zones Controller" OR product:="ShareFile StorageZones Controller")
Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2026-20963)
Type:softwarePublished:Mar 26, 2026

Microsoft SharePoint is a web-based collaboration and document management platform within the Microsoft 365 suite. It acts as a secure, centralized hub for storing, organizing, sharing, and accessing information from any device.

On January 13, 2026, Microsoft disclosed a remote code execution vulnerability, designated CVE-2026-20963, in Microsoft SharePoint. The vulnerability is due to deserialization of untrusted data in Microsoft SharePoint which allows a remote, unauthenticated attacker to execute code over a network.

While initially released with a CVSS score of 8.8, the score was updated to 9.8 on March 17, 2026.

This vulnerability is known to be exploited in the wild and was added to the CISA.gov Known Exploited Vulnerabilities (KEV) list on March 18, 2026.

The following versions are affected:

  • SharePoint Enterprise Server 2016 before version 16.0.5535.1001
  • SharePoint Server 2019 before version 16.0.10417.20083
  • SharePoint Server Subscription Edition before version 16.0.19127.20442
vendor:=Microsoft AND ( (product:="SharePoint Server 2016" AND (version:>=16.0.4107.1002 AND version:<16.0.5535.1001)) OR (product:="SharePoint Server 2019" AND (version:>=16.0.10711.37301 AND version:<16.0.10417.20083)) OR (product:="SharePoint Server Subscription Edition" AND (version:>=16.0.0.1 AND version:<16.0.19127.20442)) )

Each Rapid Response includes a query to find matching assets, a trigger to analyze all inventories for exposure, and a corresponding blog post with the details of the issue. This program focuses on helping customers mitigate exposures before compromise.

Vulnerabilities covered by the Rapid Response program are replaced by more specific coverage as mitigations become available.
Updated