<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>runZero Rapid Responses</title>
    <link>https://help.runzero.com/docs/em-rapid-response/</link>
    <description>Latest runZero Rapid Response queries for emerging threats</description>
    <language>en-us</language>
    <lastBuildDate>Mon, 18 May 2026 17:39:02 +0000</lastBuildDate>
    <item>
      <title>Rapid Response: Vercel Next.js SSRF Via WebSocket Upgrades (CVE-2026-44578)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Next.js, an open-source React framework developed by Vercel, provides structure, routing, and rendering solutions for&#xA;building full-stack web applications.&#xA;&#xA;Self-hosted Next.js applications using the built-in Node.js server are vulnerable to server-side request forgery&#xA;(SSRF) within the WebSocket upgrade handling mechanism. A remote, unauthenticated attacker can exploit this flaw by&#xA;sending crafted WebSocket upgrade requests. Successful exploitation allows the server to proxy requests to arbitrary&#xA;internal or external destinations. This can expose sensitive internal services or cloud infrastructure endpoints, such&#xA;as the Instance Metadata Service (IMDS), a local HTTP endpoint used by virtual machines to retrieve configurations,&#xA;IP addresses, and IAM roles via a link-local address.&#xA;&#xA;The following versions are affected:&#xA;- Next.js 13, 14, and 15: Versions 13.4.13 through 15.5.15&#xA;- Next.js 16: Versions 16.0.0 through 16.2.4&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;vendor:=Vercel AND product:=&amp;#34;Next.js&amp;#34;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: software · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Mon, 18 May 2026 17:39:02 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#0ec18cb0-43da-406d-a1b6-92f35514664b</guid>
    </item>
    <item>
      <title>Rapid Response: Cisco Catalyst SD-WAN Manager/Controller (CVE-2026-20182)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;The Cisco Catalyst SD-WAN Controller serves as the centralized control-plane element, utilizing the Overlay Management &#xA;Protocol (OMP) to manage routing intelligence, distribute security keys, and enforce network-wide policies. In &#xA;contrast, the Cisco Catalyst SD-WAN Manager acts as the centralized management system, providing the graphical &#xA;interface necessary for the configuration, monitoring, and orchestration of all devices within the fabric.&#xA;&#xA;A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco &#xA;Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass &#xA;authentication and obtain administrative privileges on an affected system. This vulnerability exists because the&#xA;peering authentication mechanism in an affected system is not working properly. An attacker could exploit this &#xA;vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to &#xA;log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using &#xA;this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network &#xA;configuration for the SD-WAN fabric.&#xA;&#xA;Note that there is evidence that this vulnerability is being *exploited in the wild*.&#xA;&#xA;The following versions are affected:&#xA;- Catalyst SD-WAN releases prior to 20.9&#xA;- Catalyst SD-WAN release 20.9 versions prior to 20.9.9.1&#xA;- Catalyst SD-WAN release 20.10 versions prior to 20.12.7.1&#xA;- Catalyst SD-WAN release 20.11 versions prior to 20.12.7.1&#xA;- Catalyst SD-WAN release 20.12 versions prior to 20.12.5.4&#xA;- Catalyst SD-WAN release 20.12 versions prior to 20.12.6.2&#xA;- Catalyst SD-WAN release 20.13 versions prior to 20.12.7.1&#xA;- Catalyst SD-WAN release 20.13 versions prior to 20.15.5.2&#xA;- Catalyst SD-WAN release 20.14 versions prior to 20.15.5.2&#xA;- Catalyst SD-WAN release 20.15 versions prior to 20.15.4.4&#xA;- Catalyst SD-WAN release 20.15 versions prior to 20.15.5.2&#xA;- Catalyst SD-WAN release 20.16 versions prior to 20.18.2.2&#xA;- Catalyst SD-WAN release 20.18 versions prior to 20.18.2.2&#xA;- Catalyst SD-WAN release 26.1 versions prior to 26.1.1.1&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;hw:=&amp;#34;Cisco vManage&amp;#34; OR os:=&amp;#34;Cisco Viptela OS&amp;#34;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Thu, 14 May 2026 20:29:12 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#201c31f3-d676-4035-a9cb-340382df50f0</guid>
    </item>
    <item>
      <title>Rapid Response: F5 NGINX (CVE-2026-42945)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Nginx is a high-performance, open-source software used primarily as a web server and reverse proxy to efficiently &#xA;handle large volumes of simultaneous connections. It is widely favored for its speed and stability, often serving &#xA;as a load balancer or HTTP cache to optimize the delivery of web content.&#xA;&#xA;A heap-based buffer overflow vulnerability exists in the `ngx_http_rewrite_module` component of NGINX Plus and NGINX &#xA;Open Source base products. The flaw is triggered when a `rewrite` directive is followed by a `rewrite`, `if`, or `set`&#xA;directive that uses an unnamed PCRE capture group (e.g., `$1`, `$2`) whose replacement string contains a question mark&#xA;(?). An unauthenticated, remote attacker may exploit this by sending specially crafted HTTP requests, causing a heap &#xA;buffer overflow in the NGINX worker process and resulting in a service restart. On systems where Address Space Layout &#xA;Randomization (ASLR) is disabled, exploitation may also allow arbitrary code execution.&#xA;&#xA;The following product versions are affected:&#xA;- NGINX Plus: Versions R32 through R36&#xA;- NGINX Open Source: Versions 1.0.0 through 1.30.0&#xA;- NGINX Open Source: Versions 0.6.27 through 0.9.7&#xA;- NGINX Instance Manager: Versions 2.16.0 through 2.21.1&#xA;- F5 WAF for NGINX: Versions 5.9.0 through 5.12.1&#xA;- NGINX App Protect WAF: Versions 5.1.0 through 5.8.0&#xA;- NGINX App Protect WAF: Versions 4.9.0 through 4.16.0&#xA;- F5 DoS for NGINX: Version 4.8.0&#xA;- NGINX App Protect DoS: Versions 4.3.0 through 4.7.0&#xA;- NGINX Gateway Fabric: Versions 2.0.0 through 2.5.1&#xA;- NGINX Gateway Fabric: Versions 1.3.0 through 1.6.2&#xA;- NGINX Ingress Controller: Versions 5.0.0 through 5.4.1&#xA;- NGINX Ingress Controller: Versions 4.0.0 through 4.0.1&#xA;- NGINX Ingress Controller: Versions 3.5.0 through 3.7.2&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;((vendor:=&amp;#34;F5&amp;#34; OR vendor:=&amp;#34;NGINX&amp;#34;) AND  (product:=&amp;#34;nginx plus&amp;#34; OR product:=&amp;#34;nginx&amp;#34; OR product:=&amp;#34;nginx ingress controller&amp;#34;))&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: software · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Wed, 13 May 2026 21:39:19 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#bed46c5e-8df9-45b7-9169-0b2995af1167</guid>
    </item>
    <item>
      <title>Rapid Response: Palo Alto Networks PAN-OS RCE In IKEv2 Processing (CVE-2026-0263)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;PAN-OS is the proprietary operating system that powers all Palo Alto Networks Next-Generation Firewalls (NGFW) &#xA;across physical, virtual, and cloud environments. It uses a Single-Pass Parallel Processing (SP3) architecture &#xA;to provide deep visibility and control over network traffic by identifying applications, users, and content &#xA;simultaneously.&#xA;&#xA;Several versions of Palo Alto Networks PAN-OS are vulnerable to a high buffer overflow during IKEv2 handling. A &#xA;remote, unauthenticated attacker can exploit this over the network to either gain elevated code execution or disrupt &#xA;services entirely.&#xA;&#xA;The following versions are affected&#xA;- PAN-OS versions 12.1.5 through 12.1.6, 12.1.2 through 12.1.4-h*.&#xA;- PAN-OS 11.2 versions 11.2.11 or later, 11.2.8 through 11.2.10-h*, 11.2.5 through 11.2.7-h*, or 11.2.0 through 11.2.4-h*.&#xA;- PAN-OS 11.1 versions 11.1.14 or later, 11.1.11 through 11.1.13-h*, 11.1.8 through 11.1.10-h*, 11.1.7 through 11.1.7-h*, 11.1.5 through 11.1.6-h*, 11.1.0 through 11.1.4-h*.&#xA;&#xA;Note: This vulnerability only affects PA-Series hardware.&#xA;&#xA;Severity &amp;amp; Risk Assessment&#xA;- Severity: High – Successful exploitation could allow an attacker to potentially execute arbitrary code on the vulnerable system.&#xA;- Risk: High – This vulnerability can be exploited by an unauthenticated remote attacker, meaning the barrier to entry&#xA;for an attacker is low. This significantly increases the likelihood of widespread exploitation.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;hw:=&amp;#34;Palo Alto Networks&amp;#34; AND os:=&amp;#34;Palo Alto Networks PAN-OS%&amp;#34; AND os_version:&amp;gt;0 AND ((os_version:&amp;gt;=&amp;#34;12.1.5&amp;#34; AND os_version:&amp;lt;&amp;#34;12.1.7&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;12.1.2&amp;#34; AND os_version:&amp;lt;&amp;#34;12.1.4-h5&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.2.11&amp;#34; AND os_version:&amp;lt;&amp;#34;11.2.12&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.2.8&amp;#34; AND os_version:&amp;lt;&amp;#34;11.2.10-h6&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.2.5&amp;#34; AND os_version:&amp;lt;&amp;#34;11.2.7-h13&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.2.0&amp;#34; AND os_version:&amp;lt;&amp;#34;11.2.4-h17&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.1.14&amp;#34; AND os_version:&amp;lt;&amp;#34;11.1.15&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.1.11&amp;#34; AND os_version:&amp;lt;&amp;#34;11.1.13-h5&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.1.8&amp;#34; AND os_version:&amp;lt;&amp;#34;11.1.10-h25&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.1.7&amp;#34; AND os_version:&amp;lt;&amp;#34;11.1.7-h6&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.1.5&amp;#34; AND os_version:&amp;lt;&amp;#34;11.1.6-h32&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;11.1.0&amp;#34; AND os_version:&amp;lt;&amp;#34;11.1.4-h33&amp;#34;))&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: High&lt;/p&gt;</description>
      <pubDate>Wed, 13 May 2026 18:07:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#761f1c58-49b0-45b4-9b32-210d3187c294</guid>
    </item>
    <item>
      <title>Rapid Response: Exim Unauthenticated RCE (CVE-2026-45185)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Exim is an open-source Mail Transfer Agent (MTA) for Unix-like operating systems that manages the routing and delivery&#xA;of email messages via SMTP using a highly flexible and programmable configuration system.&#xA;&#xA;Certain versions of Exim are susceptible to a critical remote code execution (RCE) vulnerability caused by a&#xA;use-after-free condition in the BDAT body parsing path. The flaw is specifically triggered when Exim is configured to&#xA;use GnuTLS, the default TLS library for many Debian-based distributions. The vulnerability occurs when a client sends&#xA;a TLS `close_notify` alert mid-body during an SMTP CHUNKING (RFC 3030) transfer, followed by a final cleartext byte on&#xA;the same TCP connection. This specific sequence leads to heap corruption, which a remote, unauthenticated attacker can&#xA;leverage to execute arbitrary code on the system.&#xA;&#xA;The following versions are affected:&#xA;- Exim: Versions prior to 4.99.3 (when configured with GnuTLS).&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;product:=exim AND banner:&amp;#34;STARTTLS&amp;#34;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: services · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Wed, 13 May 2026 13:50:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#a9cab9e5-1beb-4a84-9f08-a7692b6bb99e</guid>
    </item>
    <item>
      <title>Rapid Response: Fortinet FortiAuthenticator RCE (CVE-2026-44277)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;FortiAuthenticator is a centralized Identity and Access Management (IAM) solution that provides secure, &#xA;identity-based access across a network by managing user authentication, multi-factor authentication (MFA), and &#xA;single sign-on (SSO). It acts as a gatekeeper that integrates with existing directories to ensure only authorized &#xA;users and devices can access critical resources across the Fortinet Security Fabric and third-party systems.&#xA;&#xA;A improper access control vulnerability in multiple versions of Fortinet FortiAuthenticator may allow a remote &#xA;attacker to execute unauthorized code or commands via crafted requests.&#xA;&#xA;The following versions are affected:&#xA;- FortiAuthenticator 8.0: 8.0.0, 8.0.2&#xA;- FortiAuthenticator 6.6: Versions 6.6.0 through 6.6.8&#xA;- FortiAuthenticator 6.5: Versions 6.5.0 through 6.5.6&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;hw:FortiAuthenticator&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Tue, 12 May 2026 20:42:40 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#3bea58ba-0783-43e0-ace5-6591812a91a9</guid>
    </item>
    <item>
      <title>Rapid Response: Fortinet FortiSandbox RCE (CVE-2026-26083)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Fortinet FortiSandbox is a security appliance that identifies unknown threats by executing suspicious files in &#xA;isolated virtual environments to monitor their behavior and then automates a response by sharing that intelligence &#xA;across the network to block the detected threat.&#xA;&#xA;A missing authorization vulnerability in multiple Fortinet FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS  &#xA;may allow an unauthenticated attacker to execute unauthorized code or commands via HTTP requests.&#xA;&#xA;The following versions are affected:&#xA;- FortiSandbox 5.0: Versions 5.0.0 through 5.0.1&#xA;- FortiSandbox 4.4: Versions 4.4.0 through 4.4.8&#xA;- FortiSandbox Cloud 24: All versions&#xA;- FortiSandbox Cloud 23: All versions&#xA;- FortiSandbox Cloud 5.0: 5.0.2 through 5.0.5&#xA;- FortiSandbox PaaS 23.4: 23.4 all versions&#xA;- FortiSandbox PaaS 23.3: 23.3 all versions&#xA;- FortiSandbox PaaS 23.1: 23.1 all versions&#xA;- FortiSandbox PaaS 22.2: 22.2 all versions&#xA;- FortiSandbox PaaS 22.1: 22.1 all versions&#xA;- FortiSandbox PaaS 21.4: 21.4 all versions&#xA;- FortiSandbox PaaS 21.3: 21.3 all versions&#xA;- FortiSandbox PaaS 5.0: 5.0.0 through 5.0.1&#xA;- FortiSandbox PaaS 4.4: 4.4.5 through 4.4.8&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;os:=&amp;#34;Fortinet FortiSandbox%&amp;#34;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Tue, 12 May 2026 19:07:37 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#9fa37834-7ec7-410b-81be-2f45b0a950a7</guid>
    </item>
    <item>
      <title>Rapid Response: Ollama Heap Out-Of-Bounds Read (CVE-2026-7482)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Ollama is an open-source framework designed for the local deployment, management, and execution of large language&#xA;models (LLMs) on personal computing hardware.&#xA;&#xA;Certain versions of Ollama are susceptible to a heap out-of-bounds read vulnerability within the GGUF model loader.&#xA;A remote, unauthenticated attacker could exploit this by sending a specially crafted GGUF file to the `/api/create`&#xA;endpoint. When the server processes a GGUF file where the declared tensor offset and size exceed the file&amp;#39;s actual&#xA;length, the functions in `fs/ggml/gguf.go` and `server/quantization.go` (`WriteTo()`) read past the allocated heap&#xA;buffer during the quantization process.&#xA;&#xA;The resulting memory leak may expose sensitive information, including environment variables, API keys, system prompts,&#xA;and concurrent user conversation data. This data can then be exfiltrated by uploading the resulting model artifact to&#xA;an attacker-controlled registry via the `/api/push` endpoint. In the upstream distribution, the `/api/create` and&#xA;`/api/push` endpoints lack authentication. While default deployments bind to `127.0.0.1`, the documented&#xA;`OLLAMA_HOST=0.0.0.0` configuration is common in practice, leading to significant public Internet exposure.&#xA;&#xA;The following versions are affected:&#xA;- Ollama: Versions prior to 0.17.1&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;vendor:=Ollama AND product:=Ollama AND source:runzero&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: software · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 17:28:11 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#213a3433-f3f4-45e5-bcab-17d417994414</guid>
    </item>
    <item>
      <title>Rapid Response: Palo Alto Networks PAN-OS Remote Code Execution Vulnerability (CVE-2026-0300)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;PAN-OS is the proprietary operating system that powers all Palo Alto Networks Next-Generation Firewalls (NGFW) &#xA;across physical, virtual, and cloud environments. It uses a Single-Pass Parallel Processing (SP3) architecture &#xA;to provide deep visibility and control over network traffic by identifying applications, users, and content &#xA;simultaneously.&#xA;&#xA;Certain versions of PAN-OS across PA-Series and VM-series firewalls are susceptible to the following vulnerability:&#xA;&#xA;- CVE-2026-0300: A critical buffer overflow vulnerability in the User-ID Authentication Portal (Captive Portal)&#xA;of Palo Alto Networks PAN-OS that allows an unauthenticated remote attacker to execute arbitrary code with root &#xA;privileges.&#xA;&#xA;This vulnerability is known to be exploited in the wild, as determined by its presence on the CISA.gov &#xA;Known Exploited Vulnerabilities (KEV) list.&#xA;&#xA;The following versions are affected:&#xA;- PAN-OS versions 12.1 through 12.1.4-h5, and 12.1.7.&#xA;- PAN-OS 11.2 versions through 11.2.4-h17, 11.2.7-h13, 11.2.10-hh6, and 11.2.12.&#xA;- PAN-OS 11.1 versions through 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5, and 11.1.15.&#xA;- PAN-OS 10.2 versions through 10.2.7-h34, 10.2.10-h36, 10.2.16-h21, 10.2.16-h7, and 10.2.18-h6.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;hw:=&amp;#34;Palo Alto Networks%&amp;#34; AND os:=&amp;#34;Palo Alto Networks PAN-OS%&amp;#34; AND  (tcp_port:6080 OR tcp_port:6081 OR tcp_port:6082)&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 13:42:48 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#91173087-2493-427c-adf6-4fc86b630fe4</guid>
    </item>
    <item>
      <title>Rapid Response: Progress MOVEit Automation Multiple Vulnerabilities (2026-04)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Progress MOVEit Automation is a managed file transfer (MFT) orchestration tool used to automate the scheduled or&#xA;event-driven movement and processing of data between disparate servers, cloud storage environments, and applications&#xA;via a centralized management interface.&#xA;&#xA;Certain versions of MOVEit Automation are susceptible to vulnerabilities within the service backend command port&#xA;interfaces. Successful exploitation could allow an attacker to gain unauthorized access, obtain administrative&#xA;control, or expose sensitive data.&#xA;&#xA;- CVE-2026-4670: An authentication bypass vulnerability that allows a remote, unauthenticated attacker to gain&#xA;unauthorized access to the system.&#xA;&#xA;- CVE-2026-5174: An improper input validation vulnerability that allows a remote, low-privileged attacker to elevate&#xA;their privileges.&#xA;&#xA;The following versions are affected:&#xA;- MOVEit Automation: Version 2024.1.7 (16.1.7) and prior&#xA;- MOVEit Automation: Version 2025.0.8 (17.0.8) and prior&#xA;- MOVEit Automation: Version 2025.1.4 (17.1.4) and prior (Affected by CVE-2026-5174 only)&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;_asset.protocol:http AND protocol:http AND (html.title:=&amp;#34;MOVEit Automation%&amp;#34; OR last.html.title:=&amp;#34;MOVEit Automation%&amp;#34;)&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: services · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Tue, 05 May 2026 04:54:14 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#d825a4fe-f7bb-4f72-9101-9d94ac6dfb3b</guid>
    </item>
    <item>
      <title>Rapid Response: Apache HTTP Server HTTP2 Double Free And Possible RCE (CVE-2026-23918)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Apache HTTP Server is an open-source, cross-platform application that serves web content by processing requests via&#xA;the Hypertext Transfer Protocol (HTTP).&#xA;&#xA;Certain versions of Apache HTTP Server are affected by a double free vulnerability that may lead to remote code&#xA;execution (RCE). This flaw occurs within the HTTP/2 protocol implementation when a stream undergoes an &amp;#34;early reset.&amp;#34;&#xA;While further technical details are not publicly available at this time, the vulnerability involves a memory&#xA;management error triggered during specific HTTP/2 communication sequences.&#xA;&#xA;The following versions are affected:&#xA;- Apache HTTP Server: Version 2.4.66&#xA;&#xA;Severity &amp;amp; Risk Assessment&#xA;- Severity: High – Successful exploitation could allow an attacker to potentially execute arbitrary code on the vulnerable system.&#xA;- Risk: High – This vulnerability can be exploited by a low-privileged remote attacker, meaning the barrier to entry&#xA;for an attacker is low. This significantly increases the likelihood of widespread exploitation.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;vendor:=Apache AND product:=HTTPD AND version:&amp;gt;0 AND version:=2.4.66&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: software · Category: Rapid Response · Severity: High&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 18:11:26 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#7d2ede5a-090c-494b-a872-0ebb333dacd0</guid>
    </item>
    <item>
      <title>Rapid Response: SonicWall SonicOS Multiple Vulnerabilities (2026-04)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;SonicWall SonicOS is the proprietary operating system that manages the networking, routing, and deep packet inspection&#xA;security functions for SonicWall physical and virtual firewall appliances.&#xA;&#xA;Certain versions of SonicOS across Gen 6, Gen 7, and Gen 8 firewall platforms are susceptible to the following&#xA;vulnerabilities:&#xA;&#xA;- CVE-2026-0204: A flaw in the access control mechanism may expose management interface functions under specific&#xA;conditions. An unauthenticated attacker with adjacent network access could gain unauthorized access to management&#xA;functionality, potentially leading to security control bypasses or administrative misuse.&#xA;&#xA;- CVE-2026-0205: A post-authentication path traversal vulnerability allows an authenticated attacker with adjacent&#xA;network access to interact with restricted services.&#xA;&#xA;- CVE-2026-0206: A post-authentication stack-based buffer overflow allows a remote, high-privileged attacker to cause&#xA;a denial-of-service (DoS) by crashing the firewall.&#xA;&#xA;While unconfirmed, the initial authentication bypass (CVE-2026-0204) may provide an unauthenticated attacker with the&#xA;privileges necessary to chain and exploit the subsequent path traversal and buffer overflow vulnerabilities.&#xA;&#xA;The following versions are affected:&#xA;- Gen 6 Series (TZ 300/400/500/600, NSA 2650–6650, SOHO 250, SM 9200–9650): SonicOS version 6.5.5.1-6n and prior.&#xA;- Gen 7 Series (TZ 270–670, NSa 2700–6700, NSsp 10700–15700, NSv 270-870): SonicOS 7.0.1-5169 and prior,&#xA;and 7.3.1-7013 and prior.&#xA;- Gen 8 Series (TZ 80–680, NSa 2800–5800): SonicOS version 8.1.0-8017 and prior.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;hw:=&amp;#34;SonicWall%&amp;#34; AND os:=&amp;#34;SonicWall SonicOS%&amp;#34; AND os_version:&amp;gt;0 AND ((os_version:&amp;lt;&amp;#34;6.5.5.2-28n&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;7&amp;#34; AND os_version:&amp;lt;&amp;#34;7.3.2-7010&amp;#34;) OR (os_version:&amp;gt;=&amp;#34;8&amp;#34; AND os_version:&amp;lt;&amp;#34;8.2.0-8009&amp;#34;))&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Fri, 01 May 2026 17:48:08 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#7b7626f9-8217-4dd4-bb0b-cbe698272630</guid>
    </item>
    <item>
      <title>Rapid Response: XCP-ng Multiple Vulnerabilities (2026-04)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;XCP-ng (Xen Cloud Platform - next generation) is a bare-metal hypervisor based on the open-source Xen project that&#xA;enables multiple virtual machines to run concurrently on a single physical server.&#xA;&#xA;On April 24, 2026, researchers publicly disclosed an audit identifying 89 exploitable vulnerabilities. These issues&#xA;primarily involve missing input validation across all writable `Map(String,String)` fields within eight XAPI object&#xA;types. Consequently, an attacker with the `vm-admin` management role could theoretically &amp;#34;achieve full host filesystem&#xA;read/write [access]&amp;#34; and execute &amp;#34;cross-VM data exfiltration&amp;#34; or &amp;#34;pool-wide compromise.&amp;#34; The report claims these&#xA;actions are possible through &amp;#34;single API calls with no exploit code,&amp;#34; requiring neither a root shell nor triggering&#xA;security alerts. These vulnerabilities reportedly persisted since the inception of the XAPI codebase (circa 2006).&#xA;The researchers assigned a CVSS distribution of 5 critical, 28 high, 46 medium, and 10 low, stating that all versions&#xA;of Citrix XenServer / Hypervisor, XCP-ng, and XAPI-based distributions were affected.&#xA;&#xA;On April 28, 2026, the Xen Project (upstream) and XCP-ng (downstream) released advisories addressing these claims.&#xA;The Xen Project issued technical advisories XSA-483 through XSA-489 to address the core source code. Notably, XSA-489&#xA;serves as a direct rebuttal to the April 24 audit, concluding that only five of the 89 claims were actionable.&#xA;The remainder were identified as intended Role-Based Access Control (RBAC) functionality or, in several instances,&#xA;appeared to be &amp;#34;AI hallucinations&amp;#34; within the researcher&amp;#39;s report. Simultaneously, XCP-ng published a blog providing&#xA;specific security and maintenance updates focused on the practical impact on XCP-ng environments.&#xA;&#xA;Vulnerability Details:&#xA;- CVE-2026-23556 (VSA-2026-007, XSA-483): A flaw where oxenstored keeps quota-related use counts across domain&#xA;destruction. XCP-ng notes this could allow a privileged user in a guest domain to trigger a denial-of-service (DoS)&#xA;condition by preventing other domains from starting; the XCP-ng advisory classifies this impact as critical.&#xA;&#xA;- CVE-2026-23557 (XSA-484): A denial-of-service (DoS) vulnerability via the XS_RESET_WATCHES command in xenstored.&#xA;&#xA;- CVE-2026-31786 (XSA-485): A Linux kernel out-of-bounds read via a Xen-related sysfs file, potentially leaking&#xA;sensitive information.&#xA;&#xA;- CVE-2026-23558 (VSA-2026-008, XSA-486): A race condition in grant table v2 status page mapping. XCP-ng notes this&#xA;use-after-free (UAF) flaw could allow a privileged user in a HVM or PVH guest domain to escalate their privileges to&#xA;the hypervisor level; the XCP-ng advisory classifies this impact as critical.&#xA;&#xA;- CVE-2026-31787 (XSA-487): A Linux kernel double-free in the Xen privcmd driver; as it requires root privileges, the&#xA;Xen Project considers the crash potential not security-relevant.&#xA;&#xA;- CVE-2025-54505 (VSA-2026-010, XSA-488): Addresses &amp;#34;Floating Point Divider State Sampling&amp;#34; on certain AMD CPUs. While&#xA;not a XCP-ng software vulnerability, this update mitigates a hardware issue to prevent a guest VM from inferring data&#xA;from another VM; the XCP-ng advisory classifies this impact as moderate.&#xA;&#xA;- XAPI RBAC Escalation (VSA-2026-011, XSA-489): This advisory confirms five actionable vulnerabilities:&#xA;CVE-2026-23559, CVE-2026-23560, CVE-2026-23561, CVE-2026-23562, and CVE-2026-42486. While the first three may allow&#xA;`vm-admin` role users to escalate to `root` privileges in the control domain, the flaw relies on advanced RBAC&#xA;features not typically exposed in standard management tools or documentation; the XCP-ng advisory classifies this&#xA;impact as low. This would only impact users with a specific configuration involving an XCP-ng pool using Active&#xA;Directory for user management where the managed user has the XAPI role `vm-admin`.&#xA;&#xA;Note: Current advisories suggest that Xen Project vulnerabilities CVE-2026-23557, CVE-2026-31786, CVE-2026-31787,&#xA;CVE-2026-23562, and CVE-2026-42486 have not yet been addressed specifically by XCP-ng updates.&#xA;&#xA;The following versions are affected:&#xA;- XCP-ng: Version 8.3&#xA;&#xA;Note: XCP-ng 8.3 LTS is currently the only release not marked end-of-life (EOL). Therefore, older versions are likely&#xA;susceptible to these vulnerabilities but fall outside the scope of current security patching and support.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;_asset.protocol:http AND protocol:http AND (html.title:=&amp;#34;Welcome to XCP-ng%&amp;#34; OR html.title:=&amp;#34;XO Lite&amp;#34;)&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: services · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Thu, 30 Apr 2026 14:40:51 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#bedcfc0a-8941-4266-8f29-b301f1b954bc</guid>
    </item>
    <item>
      <title>Rapid Response: cPanel &amp; WHM Login Authentication Vulnerability (2026-04)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;cPanel &amp;amp; WHM comprises two primary components: WebHost Manager (WHM), the administrative interface for server-level&#xA;infrastructure, and cPanel, the user-facing control panel for managing individual hosting accounts.&#xA;&#xA;Certain versions of cPanel &amp;amp; WHM are affected by a critical login authentication vulnerability. While public details&#xA;are currently limited, the changelogs for the affected versions cite a fix for an issue regarding session loading and&#xA;saving (CPANEL-52908), released on April 28, 2026. This vulnerability does not currently have a CVE ID assigned.&#xA;&#xA;Update (April 29, 2026): New details identify this flaw as an authentication bypass vulnerability, now tracked as&#xA;CVE-2026-41940. The weakness resides in the login flow, enabling remote, unauthenticated attackers to gain full&#xA;unauthorized access to the control panel.&#xA;&#xA;There is evidence that this vulnerability is being actively *exploited in the wild*.&#xA;&#xA;The following versions are affected:&#xA;- cPanel &amp;amp; WHM 110.0.x: Versions prior to 110.0.97 (11.110.0.97)&#xA;- cPanel &amp;amp; WHM 118.0.x: Versions prior to 118.0.63 (11.118.0.63)&#xA;- cPanel &amp;amp; WHM 126.0.x: Versions prior to 126.0.54 (11.126.0.54)&#xA;- cPanel &amp;amp; WHM 132.0.x: Versions prior to 132.0.29 (11.132.0.29)&#xA;- cPanel &amp;amp; WHM 134.0.x: Versions prior to 134.0.20 (11.134.0.20)&#xA;- cPanel &amp;amp; WHM 136.0.x: Versions prior to 136.0.5 (11.136.0.5)&#xA;&#xA;Note: Servers running end-of-life or unsupported versions are also likely affected. It is strongly recommended that&#xA;you upgrade your server to a supported, patched version immediately.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;vendor:=cPanel AND (product:=cPanel OR product:=WHM)&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: software · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Tue, 28 Apr 2026 22:30:54 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#132e331b-549c-4ddc-83aa-8f27dd7c35af</guid>
    </item>
    <item>
      <title>Rapid Response: GitHub Enterprise Server RCE (CVE-2026-3854)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;GitHub Enterprise Server (GHES) is a self-hosted version of GitHub that allows organizations to run an isolated&#xA;instance of the platform on their own physical or virtual infrastructure, independent of external cloud services.&#xA;&#xA;Certain versions of GHES are affected by a remote code execution (RCE) vulnerability due to improper neutralization of&#xA;special elements. Successful exploitation could allow an authenticated, low-privileged user with push access to any&#xA;repository, including one they created themselves, to achieve arbitrary command execution on the GitHub server via a&#xA;single `git push` using crafted push option values containing an unsanitized delimiter character.&#xA;&#xA;The following versions are affected:&#xA;- GHES 3.14.x: Versions prior to 3.14.25&#xA;- GHES 3.15.x: Versions prior to 3.15.20&#xA;- GHES 3.16.x: Versions prior to 3.16.16&#xA;- GHES 3.17.x: Versions prior to 3.17.13&#xA;- GHES 3.18.x: Versions prior to 3.18.7&#xA;- GHES 3.19.x: Versions prior to 3.19.4&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;vendor:=GitHub AND product:=&amp;#34;Enterprise%&amp;#34;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: software · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Tue, 28 Apr 2026 21:16:42 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#1be5e7f9-8e5b-4280-8531-af5eaae8501f</guid>
    </item>
    <item>
      <title>Rapid Response: Citrix Hypervisor Multiple Vulnerabilities (2026-04)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;Citrix XenServer, formerly known as Citrix Hypervisor, is a bare-metal hypervisor based on the open-source Xen project&#xA;that enables multiple virtual machines to run concurrently on a single physical server.&#xA;&#xA;On April 24, 2026, researchers publicly disclosed an audit identifying 89 exploitable vulnerabilities. These issues&#xA;primarily involve missing input validation across all writable `Map(String,String)` fields within eight XAPI object&#xA;types. Consequently, an attacker with the `vm-admin` management role &amp;#34;can achieve full host filesystem read/write&#xA;[access], cross-VM data exfiltration, storage protocol injection, cross-hypervisor lateral movement, and pool-wide&#xA;compromise through single API calls with no exploit code, no root shell, and no security alerts.&amp;#34; These&#xA;vulnerabilities have persisted since the inception of the XAPI codebase (circa 2006). The researchers assigned the&#xA;following CVSS severity distribution: 5 critical, 28 high, 46 medium, and 10 low.&#xA;&#xA;These vulnerabilities do not currently have CVE IDs assigned.&#xA;&#xA;The following products and versions are affected:&#xA;- Citrix Hypervisor or XenServer: All versions&#xA;- XCP-ng: All versions&#xA;- Any XAPI-based hypervisor distribution&#xA;&#xA;Update (April 29, 2026): The Xen Project (upstream) and Citrix (downstream) released separate but related advisories&#xA;to address these claims. The Xen Project issued technical advisories XSA-483 through XSA-489 to address the core&#xA;source code. Notably, XSA-489 serves as a direct rebuttal to the April 24 audit, concluding that only five of the 89&#xA;claims were actionable. The remainder were identified as intended RBAC functionality or, in several instances,&#xA;appeared to be &amp;#34;AI hallucinations&amp;#34; within the researcher&amp;#39;s report.&#xA;&#xA;Simultaneously, Citrix released Security Bulletin CTX696527 to provide specific updates and hotfixes for commercial&#xA;users, focusing on the practical impact to the XenServer environments.&#xA;&#xA;Vulnerability Details:&#xA;- CVE-2026-23556 (XSA-483): A flaw where oxenstored keeps quota-related use counts across domain destruction. Citrix&#xA;notes this could allow a privileged user in a guest VM to cause the host to crash or become unresponsive.&#xA;&#xA;- CVE-2026-23557 (XSA-484): A Denial of Service (DoS) vulnerability via the XS_RESET_WATCHES command in xenstored.&#xA;&#xA;- CVE-2026-31786 (XSA-485): A Linux kernel out-of-bounds read via a Xen-related sysfs file, potentially leaking&#xA;sensitive information.&#xA;&#xA;- CVE-2026-23558 (XSA-486): A race condition in grant table v2 status page mapping. Citrix notes this could allow a&#xA;privileged user in a guest VM to compromise the host under specific circumstances.&#xA;&#xA;- CVE-2026-31787 (XSA-487): A Linux kernel double-free in the Xen privcmd driver; as it requires root privileges, the&#xA;Xen Project considers the crash potential not security-relevant.&#xA;&#xA;- CVE-2025-54505 (XSA-488): Addresses &amp;#34;Floating Point Divider State Sampling&amp;#34; on certain AMD CPUs. While not a&#xA;XenServer software vulnerability, this update mitigates a hardware issue to prevent a guest VM from inferring data&#xA;from a different VM.&#xA;&#xA;- XAPI RBAC Escalation (XSA-489): This advisory confirms five actionable vulnerabilities: CVE-2026-23559,&#xA;CVE-2026-23560, CVE-2026-23561, CVE-2026-23562, and CVE-2026-42486. Citrix warns that the first three in particular&#xA;may allow host administrators to gain access beyond the limits of their assigned RBAC role.&#xA;&#xA;Note: Current advisories suggest that Xen Project vulnerabilities CVE-2026-23557, CVE-2026-31786, CVE-2026-31787,&#xA;CVE-2026-23562, and CVE-2026-42486 have not yet been addressed specifically by Citrix updates.&#xA;&#xA;The following versions are affected:&#xA;- Citrix XenServer: Version 8.4&#xA;&#xA;Note: Citrix XenServer 9.x is currently in Public Preview and not covered by standard security bulletins; as such, it&#xA;may be affected by these issues.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;os:=&amp;#34;Citrix XenServer&amp;#34;&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: assets · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Mon, 27 Apr 2026 18:43:24 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#0869e812-e158-466d-9a62-6849047ece96</guid>
    </item>
    <item>
      <title>Rapid Response: LiteLLM Proxy Multiple Vulnerabilities (2026-04)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;LiteLLM Proxy is an open-source gateway that enables applications to interact with multiple large language model&#xA;(LLM) providers through a single, standardized API by translating requests into the specific formats required by&#xA;each service.&#xA;&#xA;Certain versions of LiteLLM Proxy are susceptible to multiple vulnerabilities that can be chained together to achieve&#xA;remote code execution (RCE). In the official LiteLLM container images, the process runs as `root`. For deployments&#xA;outside of these official containers, the code executes with the privileges of the user account running the proxy&#xA;process. Research regarding the exploit chain involving GHSA-r75f-5x8p-qvmc and GHSA-xqmj-j6mv-4862 indicates that the&#xA;vulnerable code path only triggers after the server has processed &amp;#34;a minimum amount of legitimate interaction.&amp;#34;&#xA;&#xA;These vulnerabilities do not currently have CVE IDs assigned.&#xA;Update (April 27, 2026): The advisories now reflect assigned CVE IDs; however, these remain in a &amp;#34;reserved&amp;#34; state, and&#xA;further details have not yet been provided by the CNA.&#xA;&#xA;Update (May 8, 2026): There is evidence that CVE-2026-42208 is being actively *exploited in the wild*.&#xA;&#xA;- CVE-2026-42208: A SQL injection vulnerability exists in the API key verification process due to improper error&#xA;handling. A remote, unauthenticated attacker can exploit this by sending a specially crafted `Authorization` header to&#xA;any LLM API endpoint (e.g., `/chat/completions`). Successful exploitation allows an attacker to read or potentially&#xA;modify database data, leading to unauthorized access to the proxy and the credentials it manages.&#xA;&#xA;- CVE-2026-42203: A server-side template injection (SSTI) vulnerability in the `/prompts/test` API endpoint&#xA;arises from the improper neutralization of user-supplied prompt templates, which are rendered without sandboxing.&#xA;A crafted template can execute arbitrary code within the LiteLLM Proxy process. Successful exploitation allows a&#xA;remote, authenticated user to access secrets in the process environment (e.g., provider API keys or database&#xA;credentials) or execute arbitrary code on the host.&#xA;&#xA;- CVE-2026-42271: An authenticated command execution vulnerability exists in the MCP stdio test endpoints&#xA;(`/mcp-rest/test/connection` and `/mcp-rest/test/tools/list`), which are used to preview an MCP server before saving.&#xA;A remote, low-privileged attacker can exploit this by providing a crafted server configuration in the request body.&#xA;The command is spawned as a subprocess on the proxy host with the privileges of the proxy process.&#xA;&#xA;The following versions are affected:&#xA;- LiteLLM: Versions 1.81.16 through 1.83.6&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;_asset.protocol:http AND protocol:http AND (html.title:=&amp;#34;LiteLLM%&amp;#34; OR last.html.title:=&amp;#34;LiteLLM%&amp;#34;)&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: services · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 21:00:10 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#37649df4-4433-4118-843a-855dcf6c4e16</guid>
    </item>
    <item>
      <title>Rapid Response: CrowdStrike Falcon LogScale Unauthenticated Path Traversal (CVE-2026-40050)</title>
      <link>https://help.runzero.com/docs/em-rapid-response/</link>
      <description>&lt;p&gt;CrowdStrike Falcon LogScale (formerly Humio) is a log management and observability platform that ingests, stores, and&#xA;enables real-time search of large-volume streaming data using an index-free architecture.&#xA;&#xA;Certain versions of self-hosted LogScale are susceptible to an unauthenticated path traversal vulnerability. A remote,&#xA;unauthenticated attacker could exploit a specific, exposed cluster API endpoint to read arbitrary files from the&#xA;server filesystem. This vulnerability does not affect Next-Gen SIEM customers.&#xA;&#xA;The following versions are affected:&#xA;- LogScale Self-Hosted (GA): Versions 1.224.0 through 1.234.0 (inclusive)&#xA;- LogScale Self-Hosted (LTS): Version 1.228.0 and 1.228.1&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Query:&lt;/strong&gt; &lt;code&gt;_asset.protocol:http AND protocol:http AND (http.head.server:=&amp;#34;Humio-%&amp;#34; OR last.http.head.server:=&amp;#34;Humio-%&amp;#34;)&lt;/code&gt;&lt;/p&gt;&lt;p&gt;Type: services · Category: Rapid Response · Severity: Info&lt;/p&gt;</description>
      <pubDate>Wed, 22 Apr 2026 18:03:03 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-rapid-response/#82de4a4a-fd34-463a-a3d7-d6a17a873af3</guid>
    </item>
  </channel>
</rss>