Canadian Government Cyber Alerts.
- Microsoft security advisory β April 2026 monthly rollup (AV26-352) – Update 1by Canadian Centre for Cyber Security on April 17, 2026 at 7:53 pm
<article data-history-node-id="7557" about="/en/alerts-advisories/microsoft-security-advisory-april-2026-monthly-rollup-av26-352" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-352<br /><strong>Date: </strong>April 14, 2026<br /><strong>Updated: </strong>April 17, 2026</p> <p>On April 14, 2026, Microsoft published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following products:</p> <ul><li>.NET 10.0 installed on Linux</li> <li>.NET 10.0 installed on Mac OS</li> <li>.NET 10.0 installed on Windows</li> <li>.NET 8.0 installed on Linux</li> <li>.NET 8.0 installed on Mac OS</li> <li>.NET 8.0 installed on Windows</li> <li>.NET 9.0 installed on Linux</li> <li>.NET 9.0 installed on Mac OS</li> <li>.NET 9.0 installed on Windows</li> <li>Azure Logic Apps</li> <li>Azure Monitor Agent</li> <li>Microsoft .NET Framework</li> <li>Microsoft .NET Framework 3.5 AND 4.8.1</li> <li>Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2</li> <li>Microsoft 365 Apps for Enterprise</li> <li>Microsoft Defender Antimalware Platform</li> <li>Microsoft Dynamics 365</li> <li>Microsoft Excel 2016</li> <li>Microsoft HPC Pack 2019</li> <li>Microsoft Office 2016</li> <li>Microsoft Office 2019</li> <li>Microsoft Office LTSC 2021</li> <li>Microsoft Office LTSC 2024</li> <li>Microsoft Office LTSC for Mac 2021</li> <li>Microsoft Office LTSC for Mac 2024</li> <li>Microsoft Power Apps</li> <li>Microsoft PowerPoint 2016</li> <li>Microsoft SQL Server 2016</li> <li>Microsoft SQL Server 2017</li> <li>Microsoft SQL Server 2019</li> <li>Microsoft SQL Server 2022</li> <li>Microsoft SQL Server 2025</li> <li>Microsoft SharePoint Enterprise Server 2016</li> <li>Microsoft SharePoint Server 2019</li> <li>Microsoft SharePoint Server Subscription Edition</li> <li>Microsoft Visual Studio 2022</li> <li>Microsoft Visual Studio Code CoPilot Chat Extension</li> <li>Office Online Server</li> <li>PowerShell</li> <li>Remote Desktop client for Windows Desktop</li> <li>Windows 10</li> <li>Windows 11</li> <li>Windows Admin Center</li> <li>Windows App Client for Windows Desktop</li> <li>Windows Server 2012</li> <li>Windows Server 2012 R2</li> <li>Windows Server 2016</li> <li>Windows Server 2019</li> <li>Windows Server 2022</li> <li>Windows Server 2025</li> </ul><p>Microsoft has received reports that CVE-2026-32201 has been exploited.</p> <p>On April 14, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-32201 to their Known Exploited Vulnerabilities (KEV) Database.</p> <h2 class="h3">Update 1</h2> <p>Open-source reporting indicates that the CVE-2026-33825 vulnerability is being exploited in the wild.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr">April 2026 Security Updates</a></li> <li><a href="https://msrc.microsoft.com/update-guide/en-us">Security Update Guide</a></li> <li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-32201">CISA KEV: CVE-2026-32201</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825">CVE-2026-33825 Detail</a></li> </ul></div> </div> </div> </div> </div> </article>
- JetBrains security advisory (AV26-364)by Canadian Centre for Cyber Security on April 17, 2026 at 1:30 pm
<article data-history-node-id="7571" about="/en/alerts-advisories/jetbrains-security-advisory-av26-364" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-364<br /><strong>Date: </strong>April 17, 2026</p> <p>On April 17, 2026, JetBrains published a security advisory to address a vulnerability in the following product:</p> <ul><li>JetBrains Youtrack β versions prior to 2025.3.131383</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.jetbrains.com/privacy-security/issues-fixed/">JetBrains β Fixed security issues</a></li> </ul></div> </div> </div> </div> </div> </article>
- HashiCorp security advisory (AV26-363)by Canadian Centre for Cyber Security on April 17, 2026 at 1:20 pm
<article data-history-node-id="7570" about="/en/alerts-advisories/hashicorp-security-advisory-av26-363" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-363<br /><strong>Date: </strong>April 17, 2026</p> <p>On April 16, 2026, HashiCorp published security advisories to address vulnerabilities in the following products:</p> <ul><li>Vault Community Edition β multiple versions</li> <li>Vault Enterprise Edition β multiple versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://discuss.hashicorp.com/t/hcsec-2026-05-vault-kvv2-metadata-and-secret-deletion-policy-bypass-denial-of-service/77342">HCSEC-2026-05 – Vault KVv2 Metadata and Secret Deletion Policy Bypass Denial-of-Service</a></li> <li><a href="https://discuss.hashicorp.com/t/hcsec-2026-06-vault-vulnerable-to-server-side-request-forgery-in-acme-challenge-validation-via-attacker-controlled-dns/77343">HCSEC-2026-06 – Vault Vulnerable to Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS</a></li> <li><a href="https://discuss.hashicorp.com/c/security/52">HashiCorp Security</a></li> </ul></div> </div> </div> </div> </div> </article>
- Microsoft Edge security advisory (AV26-362)by Canadian Centre for Cyber Security on April 17, 2026 at 1:06 pm
<article data-history-node-id="7569" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-362" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-362<br /><strong>Date: </strong>April 17, 2026</p> <p>On April 16, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p> <ul><li>Microsoft Edge Stable Channel β versions prior to 147.0.3912.72</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p> <ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-16-2026">Microsoft Edge Stable Channel Release Notes</a></li> </ul></div> </div> </div> </div> </div> </article>
- Apache ActiveMQ security advisory (AV26-330) – Update 1by Canadian Centre for Cyber Security on April 16, 2026 at 5:59 pm
<article data-history-node-id="7529" about="/en/alerts-advisories/apache-activemq-security-advisory-av26-330" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number:</strong> AV26-330<br /><strong>Date:</strong> April 8, 2026<br /><strong>Update:</strong> April 16, 2026</p> <p class="mrgn-bttm-md">On April 8, 2026, Apache published a security advisory to address a vulnerability in the following products:</p> <ul><li>Apache ActiveMQ BrokerΒ – versions prior to 5.19.4</li> <li>Apache ActiveMQ BrokerΒ – 6.0.0 versions prior to 6.2.3</li> </ul><h2 class="h3">Update 1</h2> <p>On April 16, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-34197 to their Known Exploited Vulnerabilities (KEV) Database.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt">CVE-2026-34197</a></li> <li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-34197">CISA KEV: CVE-2026-34197</a></li> </ul></div> </div> </div> </div> </div> </article>
- HPE security advisory (AV26-361)by Canadian Centre for Cyber Security on April 16, 2026 at 5:46 pm
<article data-history-node-id="7568" about="/en/alerts-advisories/hpe-security-advisory-av26-361" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-361<br /><strong>Date: </strong>April 16, 2026</p> <p>On April 16, 2026, HPE published a security advisory to address vulnerabilities in the following product:</p> <ul><li>HPE Cray Supercomputing EX420 Compute Blade β versions prior to 1.91</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr05043en_us&docLocale=en_US#hpesbcr05043-rev-1-hpe-cray-supercomputing-ex-serv-0">HPESBCR05043 rev.1 – HPE Cray Supercomputing EX Servers Using Intel Processors, INTEL-SA-01397, 2026.1 IPU, Intel Trust Domain Extensions (Intel TDX) module Advisory, Multiple Vulnerabilities</a></li> <li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li> </ul></div> </div> </div> </div> </div> </article>
- Nginx UI security advisory (AV26-360)by Canadian Centre for Cyber Security on April 16, 2026 at 3:06 pm
<article data-history-node-id="7567" about="/en/alerts-advisories/nginx-ui-security-advisory-av26-360" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-360<br /><strong>Date: </strong>April 16, 2026</p> <p>On April 10, 2026, Nginx UI published a security advisory to address a critical vulnerability in the following product:</p> <ul><li>Nginx UI β version v2.3.5 and prior</li> </ul><p>Open-source reporting indicates that the CVE-2026-33032 vulnerability is being exploited in the wild.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates, when available.</p> <ul class="list-unstyled"><li><a href="https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.6">Nginx UI – CVE-2026-33032</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33032">NVD – CVE-2026-33032 Detail</a></li> </ul></div> </div> </div> </div> </div> </article>
- Drupal security advisory (AV26-359)by Canadian Centre for Cyber Security on April 16, 2026 at 12:48 pm
<article data-history-node-id="7566" about="/en/alerts-advisories/drupal-security-advisory-av26-359" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-359<br /><strong>Date: </strong>April 16, 2026</p> <p>On April 15, 2026, Drupal published a security advisory to address a critical vulnerability in the following product:</p> <ul><li>Drupal core β multiple versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates or perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://www.drupal.org/sa-core-2026-001">Drupal core – Critical – Cross-site scripting – SA-CORE-2026-001</a></li> <li><a href="https://www.drupal.org/security">Drupal Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Google Chrome security advisory (AV26-358)by Canadian Centre for Cyber Security on April 15, 2026 at 7:39 pm
<article data-history-node-id="7565" about="/en/alerts-advisories/google-chrome-security-advisory-av26-358" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-358<br /><strong>Date: </strong>April 15, 2026</p> <p>On April 15, 2026, Google published a security advisory to address vulnerabilities in the following product:</p> <ul><li>Stable Channel Chrome for Desktop β versions prior to 147.0.7727.101/102 (Windows/Mac) and 147.0.7727.101 (Linux)</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p> <ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html">Google Chrome Security Advisory</a></li> </ul></div> </div> </div> </div> </div> </article>
- Cisco security advisory (AV26-357)by Canadian Centre for Cyber Security on April 15, 2026 at 5:26 pm
<article data-history-node-id="7564" about="/en/alerts-advisories/cisco-security-advisory-av26-357" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-357<br /><strong>Date: </strong>April 15, 2026</p> <p>On April 15, 2026, Cisco published security advisories to address vulnerabilities in the following products. Included were critical updates for the following:</p> <ul><li>Cisco Identity Services Engine (ISE)Β β multiple versions</li> <li>Cisco ISE Passive Identity Connector (ISE-PIC)Β β multiple versions</li> <li>Cisco Webex Services (cloud-based, configured to use SSO integration with Control Hub)</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p> <ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ">Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities</a></li> <li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv">Cisco Identity Services Engine Remote Code Execution Vulnerabilities</a></li> <li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL">Cisco Webex Services Certificate Validation Vulnerability</a></li> <li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>
- Splunk security advisory (AV26-356)by Canadian Centre for Cyber Security on April 15, 2026 at 4:27 pm
<article data-history-node-id="7563" about="/en/alerts-advisories/splunk-security-advisory-av26-356" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-356<br /><strong>Date: </strong>April 15, 2026</p> <p>On April 15, 2026, Splunk published security advisories to address vulnerabilities in the following products:</p> <ul><li>Splunk Operator for Kubernetes Add-onΒ β versions prior to 3.1.0</li> <li>Splunk MCP ServerΒ β versions prior to 1.0.3</li> <li>Splunk IT Service Intelligence (ITSI)Β β versions prior to 4.21.2</li> <li>Splunk EnterpriseΒ β multiple versions</li> <li>Splunk Cloud PlatformΒ β multiple versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://advisory.splunk.com/advisories">Splunk Security Advisories</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>
- AMD security advisory (AV26-355)by Canadian Centre for Cyber Security on April 15, 2026 at 4:17 pm
<article data-history-node-id="7562" about="/en/alerts-advisories/amd-security-advisory-av26-355" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-355<br /><strong>Date: </strong>April 15, 2026</p> <p>On April 14, 2026, AMD published security advisories to address vulnerabilities in the following products:</p> <ul><li>AMD EPYC ProcessorsΒ β multiple versions and models</li> <li>AMD Ryzen ProcessorsΒ β multiple versions and models</li> <li>AMD Ryzen Embedded ProcessorsΒ β multiple versions and models</li> <li>AMD EPYC Embedded ProcessorsΒ β multiple versions and models</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web links provided and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7054.html">Incorrect use of LocateProtocol Service of the EFI_BOOT_Services table in SMI HandlerΒ – AMD-SB-7054</a></li> <li><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3016.html">IOMMU Write Buffer VulnerabilityΒ – AMD-SB-3016</a></li> <li><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3034.html">SEV-SNP Routing MisconfigurationΒ – AMD-SB-3034</a></li> <li><a href="https://www.amd.com/en/resources/product-security.html">AMD Product Security</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>
- Tenable security advisory (AV26-354)by Canadian Centre for Cyber Security on April 14, 2026 at 7:51 pm
<article data-history-node-id="7560" about="/en/alerts-advisories/tenable-security-advisory-av26-354" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-354<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 14, 2026, Tenable published a security advisory to address critical vulnerabilities in the following product:</p> <ul><li>Tenable Identity Exposure β versions prior to 3.77.17</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.tenable.com/security/tns-2026-11">[R2] Tenable Identity Exposure Version 3.77.17 Fixes Multiple Vulnerabilities</a></li> <li><a href="https://www.tenable.com/security">Tenable Product Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Adobe security advisory (AV26-353)by Canadian Centre for Cyber Security on April 14, 2026 at 6:57 pm
<article data-history-node-id="7558" about="/en/alerts-advisories/adobe-security-advisory-av26-353" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-353<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 14, 2026, Adobe published security advisories to address vulnerabilities in the following products:</p> <ul><li>Acrobat 2024 β version Win: 24.001.30362 and prior, Mac: 24.001.30360 and prior</li> <li>Acrobat DC β version 26.001.21411 and prior</li> <li>Acrobat Reader DC β version 26.001.21411 and prior</li> <li>Adobe Bridge β version 15.1.4 (LTS) and prior, version 16.0.2 and prior</li> <li>Adobe Connect Desktop Application β version 2025.3 and prior</li> <li>Adobe Connect β version 12.10 and prior</li> <li>Adobe DNG Software Development Kit (SDK) β versions DNG SDK 1.7.1 build 2502 and prior</li> <li>Adobe Experience Manager (AEM) Screens β version 6.5 Service Pack 24 and prior, version Feature Pack 11.7 and prior</li> <li>Adobe FrameMaker β version 2022 Release Update 8 and prior</li> <li>Adobe InCopy β version 21.2 and prior, version 20.5.2 and prior</li> <li>Adobe InDesign β version ID21.22 and prior, version ID20.5.2 and prior</li> <li>ColdFusion 2023 β version Update 18 and prior</li> <li>ColdFusion 2025 β version Update 6 and prior</li> <li>Illustrator 2025 β version 29.8.5 and prior</li> <li>Illustrator 2026 β version 30.2 and prior</li> <li>Photoshop 2026 β version 27.4 and prior</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://helpx.adobe.com/security.html">Adobe Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Fortinet security advisory (AV26-351)by Canadian Centre for Cyber Security on April 14, 2026 at 5:48 pm
<article data-history-node-id="7556" about="/en/alerts-advisories/fortinet-security-advisory-av26-351" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-351<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 14, 2026, Fortinet published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p> <ul><li>FortiSandbox 4.4 β versions 4.4.0 to 4.4.8</li> <li>FortiSandbox 5.0 β versions 5.0.0 to 5.0.5</li> <li>FortiAnalyzer Cloud 7.6 β versions 7.6.2 to 7.6.4</li> <li>FortiManager Cloud 7.6 β versions 7.6.2 to 7.6.4</li> <li>FortiDDoS-F 7.2 β versions 7.2.1 to 7.2.2</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-100">OS Command Injection through API endpoint</a></li> <li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-112">Unauthenticated Authentication bypass and Privilege escalation in FortiSandbox</a></li> <li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-121">Heap-based buffer overflow in oftpd daemon</a></li> <li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-119">SQL Injection via API</a></li> <li><a href="https://www.fortiguard.com/psirt?filter=1&version=&severity=5&severity=4&severity=3&severity=2">Fortinet PSIRT Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- [Control systems] Schneider Electric security advisory (AV26-350)by Canadian Centre for Cyber Security on April 14, 2026 at 5:28 pm
<article data-history-node-id="7555" about="/en/alerts-advisories/control-systems-schneider-electric-security-advisory-av26-350" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-350<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 14, 2026, Schneider Electric published advisories to address vulnerabilities in the following products:</p> <ul><li>Easergy MiCOM Px40 Series β multiple versions and models</li> <li>Connexium Managed Switches TCSESM β all versions</li> <li>Modicon Managed Switches MCSESM, MCSESP β all versions</li> <li>Modicon Redundancy Switches MCSESR β all versions</li> <li>PowerChute Serial Shutdown β version 1.4 and prior</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-104-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-104-03.pdf">Use of Hard-coded Credentials vulnerability on Easergy MiCOM Px40 Series (PDF)</a></li> <li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-104-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-104-02.pdf">Third-Party vulnerability on Modicon Networking Managed Switches (PDF)</a></li> <li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-104-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-104-01.pdf">Multiple Vulnerabilities on PowerChuteβ’ Serial Shutdown (PDF)</a></li> <li><a href="https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp">Schneider Electric Security Notifications</a></li> </ul></div> </div> </div> </div> </div> </article>
- SAP security advisory β April 2026 monthly rollup (AV26-349)by Canadian Centre for Cyber Security on April 14, 2026 at 2:06 pm
<article data-history-node-id="7552" about="/en/alerts-advisories/sap-security-advisory-april-2026-monthly-rollup-av26-349" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-349<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 14, 2026, SAP published security advisories to address vulnerabilities in multiple products. Included were updates for the following:</p> <ul><li>SAP Business Planning and Consolidation and SAP Business Warehouse β versions HANABPC 810, BPC4HANA 300, SAP_BW 750, 752, 753, 754, 755, 756, 757, 758 and 816</li> <li>SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise) β versions SAP_FIN 618, 720, 730, EA-FIN 617, 700, SAPSCORE 135, S4CORE 102, 103, 104, 105, 106, 107, 108, 109, EA-APPL 600, 602, 603, 604, 605 and 606</li> <li>SAP BusinessObjects Business Intelligence Platform β versions ENTERPRISE 430, 2025 and 2027</li> <li>SAP Human Capital Management for SAP S/4HANA β versions S4HCMRXX 100, 101, 102, SAP_HRRXX 600, 604 and 608</li> <li>SAP Business Analytics and SAP Content Management β versions S4HCMRXX 100, 101, 102, SAP_HRRXX 600, 604 and 608</li> <li>SAP S/4HANA OData Service (Manage Reference Equipment) β version S4CORE 109</li> <li>SAP S/4HANA Backend OData Service (Manage Reference Structures) β version S4CORE 109</li> <li>SAP S/4HANA Frontend OData Service (Manage Reference Structures) β version UIS4H 109</li> <li>SAP Supplier Relationship Management (SICF Handler in SRM Catalog) β versions SRM_SERVER 702, 713 and 714</li> <li>SAP NetWeaver Application Server Java (Web Dynpro Java) β version WD-RUNTIME 7.50</li> <li>SAP NetWeaver Application Server ABAP β versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 and SAP_BASIS 816</li> <li>SAP HANA Cockpit and HANA Database Explorer β version SAP_HANA_COCKPIT 2.0</li> <li>SAP S/4HANA (Private Cloud and On-Premise) β versions S4CORE 105, 106, 107, 108, 109, FI-CA 606, 616, 617 and 618</li> <li>Material Master Application β versions S4CORE 102, 103, 104, 105, 106, 107, 108, 109, SCM_BASIS 700, SCM_BASIS 701, SCM_BASIS 702, SCM_BASIS 712, SCM_BASIS 713 and SCM_BASIS 714</li> <li>SAP S/4HANA OData Service (Manage Technical Object Structures) β version S4CORE 109</li> <li>SAP S4CORE (Manage Journal Entries) β versions S4CORE 104, 105, 106, 107 and 108</li> <li>SAP BusinessObjects Business Intelligence Platform β versions ENTERPRISE 430, 2025 and 2027</li> <li>SAP NetWeaver Application Server ABAP β versions SAP_UI 758 and 816</li> <li>SAP Landscape Transformation β versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020, S4CORE 102, 103, 104, 105, 106, 107, 108 and 109</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations, and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2026.html">SAP Security Patch Day – April 2026</a></li> </ul></div> </div> </div> </div> </div> </article>
- Samsung mobile security advisory (AV26-348)by Canadian Centre for Cyber Security on April 14, 2026 at 1:54 pm
<article data-history-node-id="7551" about="/en/alerts-advisories/samsung-mobile-security-advisory-av26-348" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-348<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 7, 2026, Samsung published a security update to address vulnerabilities in the following product:</p> <ul><li>Samsung mobile devices β versions prior to SMR-APR-2026 Release 1</li> </ul><p>The most recent security update resolves multiple identified vulnerabilities.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p> <ul class="list-unstyled"><li><a href="https://security.samsungmobile.com/securityUpdate.smsb?year=2026&month=04">Samsung Security Updates</a></li> </ul></div> </div> </div> </div> </div> </article>
- [Control systems] Siemens security advisory (AV26-347)by Canadian Centre for Cyber Security on April 14, 2026 at 1:44 pm
<article data-history-node-id="7550" about="/en/alerts-advisories/control-systems-siemens-security-advisory-av26-347" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-347<br /><strong>Date: </strong>April 14, 2026</p> <p>On April 14, 2026, Siemens published a security advisory to address vulnerabilities in the following products. Included were updates for the following products:</p> <ul><li>Siemens Software Center β versions prior to V3.5.8.2</li> <li>Simcenter 3D β versions prior to V2506.6000</li> <li>Simcenter Femap β versions prior to V2506.0002</li> <li>Simcenter STAR-CCM+ β versions prior to V2602</li> <li>Solid Edge SE2025 β versions prior to V225.0 Update 13</li> <li>Solid Edge SE2026 β versions prior to V226.0 Update 04</li> <li>Tecnomatix Plant Simulation β versions prior to V2504.0008</li> <li>SINEC NMS β versions prior to V4.0 SP3 with UMC</li> <li>RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) β versions prior to V5.8</li> <li>SIPROTEC 5 – CP300 Devices β multiple versions and models</li> <li>SIPROTEC 5 Communication Modules β multiple versions and models</li> <li>SIPROTEC 5 Compact 7SX800 (CP050) β versions V8.70 to V9.30</li> <li>SIMATIC CN 4100 β hardware versions prior to FS 05</li> <li>SIMATIC Field PG β all versions</li> <li>SIMATIC IPC family β all versions</li> <li>SIMATIC IPC MD-57A β versions prior to V30.01.10</li> <li>SIMATIC ITP1000 β all versions</li> <li>Industrial Edge Management Pro V1 β versions V1.7.6 to V1.15.17</li> <li>Industrial Edge Management Pro V2 β versions V2.0.0 to V2.1.1</li> <li>Industrial Edge Management Virtual β versions V2.2.0 to V2.8.0</li> <li>SINEC NMS β versions prior to V4.0 SP3</li> <li>RUGGEDCOM CROSSBOW Station Access Controller (SAC) β versions prior to V5.8</li> <li>SCALANCE W-700 IEEE 802.11n family β versions prior to V6.6.0</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web link provided, perform the suggested mitigations and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.siemens.com/global/en/products/services/cert.html#SecurityPublications">Siemens Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- [Control systems] ABB security advisory (AV26-346)by Canadian Centre for Cyber Security on April 13, 2026 at 7:44 pm
<article data-history-node-id="7548" about="/en/alerts-advisories/control-systems-abb-security-advisory-av26-346" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-346<br /><strong>Date: </strong>April 13, 2026</p> <p>On April 13, 2026, ABB published security advisories to address vulnerabilities in the following product:</p> <ul><li>ABB CI868 AC800M product line (System 800xA) for IEC 61850Β – multiple firmware versions</li> <li>ABB CI850 Symphony Plus SD Series product line for IEC 61850Β – multiple firmware versions</li> <li>ABB PM 877 Symphony Plus MR (Melody Rack) product line for IEC 61850Β β firmware version 3.10 to 3.52</li> <li>ABB S+ Operations using IEC 61850Β – multiple versions</li> <li>ABB Ability Symphony PlusΒ β multiple versions</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p> <ul class="list-unstyled"><li><a href="https://search.abb.com/library/Download.aspx?DocumentID=7PAA020125&LanguageCode=en&DocumentPartId=&Action=Launch">Denial of Service Vulnerabilities in System 800xA, Symphony Plus IEC 61850 communication stack CVE ID: CVE-2025-3756 </a></li> <li><a href="https://search.abb.com/library/Download.aspx?DocumentID=7PAA017341&LanguageCode=en&DocumentPartId=&Action=Launch">PostgreSQL vulnerabilities in ABB Ability Symphony Plus Engineering CVE ID: CVE-2023-5869, CVE-2023-39417, CVE-2024-7348, CVE-2024-0985 </a></li> <li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>
- Microsoft Edge security advisory (AV26-345)by Canadian Centre for Cyber Security on April 13, 2026 at 7:28 pm
<article data-history-node-id="7547" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-345" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-345<br /><strong>Date: </strong>April 13, 2026</p> <p>On April 10, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p> <ul><li>Microsoft Edge Stable ChannelΒ β versions prior to 147.0.3912.60</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p> <ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-10-2026">Microsoft Edge Stable Channel Release Notes</a></li> </ul><!–CUT & PASTE the French version info –></div> </div> </div> </div> </div> </article>
- Adobe Acrobat security advisory (AV26-340) β Update 1by Canadian Centre for Cyber Security on April 13, 2026 at 6:56 pm
<article data-history-node-id="7541" about="/en/alerts-advisories/adobe-acrobat-security-advisory-av26-340" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-340<br /><strong>Date: </strong>April 13, 2026</p> <p>On April 12, 2026, Adobe published a security advisory to address a critical vulnerability in the following products:</p> <ul><li>Acrobat Mac β versions prior to 24.001.30360</li> <li>Acrobat Windows β versions prior to 24.001.30362</li> <li>Acrobat DC β versions prior to 26.001.21411</li> <li>Acrobat Reader DC β versions prior to 26.001.21411</li> </ul><p>Adobe is aware of CVE-2026-34621 being exploited in the wild.</p> <h2 class="h3"> Update 1 </h2> <p> On April 13, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-34621 to their Known Exploited Vulnerabilities (KEV) Database. </p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html">Security update available for Adobe Acrobat Reader – APSB26-43</a></li> <li><a href="https://helpx.adobe.com/security.html">Adobe Security Advisories</a></li> <li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-34621">CISA KEV: CVE-2026-34621</a></li> </ul></div> </div> </div> </div> </div> </article>
- Fortinet security advisory (AV26-096) β Update 2by Canadian Centre for Cyber Security on April 13, 2026 at 6:50 pm
<article data-history-node-id="7248" about="/en/alerts-advisories/fortinet-security-advisory-av26-096" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-096<br /><strong>Date: </strong>February 9, 2026<br /><strong>Updated: </strong>April 13, 2026</p> <p>On February 6, 2026, Fortinet published a security advisory to address a critical vulnerability in the following product:</p> <ul><li>FortiClientEMS 7.4 β version 7.4.4</li> </ul><h2 class="h3">Update 1</h2> <p class="mrgn-bttm-md">Open-source reporting indicates that CVE-2026-21643 is being exploited in the wild.</p> <h2 class="h3">Update 2</h2> <p class="mrgn-bttm-md">On April 13, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-21643 to their Known Exploited Vulnerabilities (KEV) Database.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.fortiguard.com/psirt/FG-IR-25-1142">SQLi in administrative interface β FG-IR-25-1142 (CVE-2026-21643)</a></li> <li><a href="https://cwe.mitre.org/data/definitions/89.html">CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)</a></li> <li><a href="https://www.fortiguard.com/psirt?filter=1&version=&severity=5&severity=4&severity=3&severity=2">Fortinet PSIRT Advisories</a></li> <li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21643">CISA KEV: CVE-2026-21643</a></li> </ul></div> </div> </div> </div> </div> </article>
- Tenable security advisory (AV26-336) β Update 1by Canadian Centre for Cyber Security on April 13, 2026 at 5:57 pm
<article data-history-node-id="7536" about="/en/alerts-advisories/tenable-security-advisory-av26-336" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-336<br /><strong>Date:</strong> April 9, 2026<br /><strong>Updated:</strong> April 13, 2026</p> <p class="mrgn-bttm-md">On April 9, 2026, Tenable published a security advisory to address vulnerabilities in the following product:</p> <ul><li>Tenable Security CenterΒ β version 6.5.0 to 6.8.0</li> </ul><p><strong>Update 1</strong><br /> On April 13, 2026, Tenable updated affected products reflected above.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.tenable.com/security/tns-2026-10">[R2] Stand-alone Security Patch Available for Tenable Security Center Versions 6.5.1, 6.6.0, 6.7.2 and 6.8.0: SC202604.1</a></li> <li><a href="https://www.tenable.com/security">Tenable Product Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- wolfSSL security advisory (AV26-344)by Canadian Centre for Cyber Security on April 13, 2026 at 5:32 pm
<article data-history-node-id="7546" about="/en/alerts-advisories/wolfssl-security-advisory-av26-344" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-344<br /><strong>Date: </strong>April 13, 2026</p> <p>On April 9, 2026, wolfSSL published a security advisory to address vulnerabilities in the following product:</p> <ul><li>wolfSSL β versions 3.12.0 to versions prior to 5.9.1</li> </ul><p>CVE-2026-5194 is listed as critical with a CVSS score of 9.3.</p> <p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://github.com/wolfSSL/wolfssl/releases">wolfssl</a></li> <li><a href="https://github.com/advisories/GHSA-f5h9-5q52-qrx7">Missing hash/digest size and OID checks allow digests…</a></li> <li><a href="https://cwe.mitre.org/data/definitions/295.html">CWE-295 Improper Certificate Validation</a></li> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5194">CVE-2026-5194</a></li> </ul></div> </div> </div> </div> </div> </article>
- Dell security advisory (AV26-343)by Canadian Centre for Cyber Security on April 13, 2026 at 5:24 pm
<article data-history-node-id="7545" about="/en/alerts-advisories/dell-security-advisory-av26-343" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-343<br /><strong>Date: </strong>April 13, 2026</p> <p>Between April 6 and 12, 2026, Dell published security advisories to address vulnerabilities in multiple products:</p> <ul><li>Connectrix Switches and Directors β versions prior to sannav_ova_9x_os_02_2026</li> <li>Data Protection Advisor β versions 19.9 to 19.12 SP2</li> <li>Dell AX System β multiple versions and models</li> <li>Dell Data Protection Central β versions 19.9 to 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1</li> <li>Dell EMC Isilon OneFS β versions 8.2.2 and prior</li> <li>Dell EMC PowerScale β version 9.0.0</li> <li>Dell Integrated System for Microsoft Azure Stack Hub 16G β versions prior to 2603</li> <li>Dell Networking OS10 β versions prior to 10.6.1.1</li> <li>Dell PowerProtect DP Series Appliance β versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1</li> <li>Dell PowerScale OneFS β multiple versions</li> <li>Elastic Cloud Storage β versions prior to 3.8.1.7</li> <li>ObjectScale – versions prior to 4.1.0.3 and 4.2.00</li> <li>PowerSwitch Z9664F-ON β versions prior to 3.54.5.1-11</li> <li>PowerSwitch S5448F-ON β versions prior to 3.54.5.1-14</li> <li>PowerSwitch S9664F-ON β versions prior to 3.54.5.1-11</li> <li>PowerSwitch E3200-ON β versions prior to 3.57.5.1-6</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li> </ul></div> </div> </div> </div> </div> </article>
- IBM security advisory (AV26-342)by Canadian Centre for Cyber Security on April 13, 2026 at 2:35 pm
<article data-history-node-id="7543" about="/en/alerts-advisories/ibm-security-advisory-av26-342" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-342<br /><strong>Date: </strong>April 13, 2026</p> <p>Between April 6 and 12, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p> <ul><li>DevOps Test Performance β versions 11.0 to 11.0.7</li> <li>EDB PGAI β multiple versions and models</li> <li>EDB PGAI Databases β version 18.0</li> <li>IBM App Connect Operator β multiple versions</li> <li>IBM App Connect Enterprise Certified Containers Operands β multiple versions</li> <li>IBM ApplinX β version 11.1</li> <li>IBM Cloud Pak for AIOps β versions 4.1.0 to 4.12.0</li> <li>IBM DataPower Gateway β multiple versions and models</li> <li>IBM Knowledge Catalog Premium Cartridge β multiple versions</li> <li>IBM Planning Analytics Local β versions 2.1.0 to 2.1.18</li> <li>IBM OpenAPI SDK Generator (Node.js) β version 5.4.9</li> <li>IBM Operations Analytics – Log Analysis β multiple versions</li> <li>IBM Storage Defender Copy Data Management β versions 2.2.0.0 to 2.2.28.1</li> <li>IBM Storage Sentinel Anomaly Scan Engine β versions 1.1.0 to 1.1.11</li> <li>IBM Tivoli Business Service Manager β version 6.2.0</li> <li>IBM Tivoli Business Netcool Impact β version 7.1.1</li> <li>IBM Tivoli Network Manager IP Edition β versions 4.2 GA to 4.2.0.23</li> <li>ITCAM for Transactions β version 7.4.0.2</li> <li>Rational Performance Tester β multiple versions</li> <li>watsonx.data β version 2.3</li> <li>watsonx Code Assistant On Prem β multiple versions</li> <li>IBM watsonx Orchestrate Developer Edition β versions 1.4.0 to 2.6.0</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/ ">IBM Product Security Incident Response</a></li> </ul></div> </div> </div> </div> </div> </article>
- Red Hat security advisory (AV26-341)by Canadian Centre for Cyber Security on April 13, 2026 at 2:29 pm
<article data-history-node-id="7542" about="/en/alerts-advisories/red-hat-security-advisory-av26-341" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-341<br /><strong>Date: </strong>April 13, 2026</p> <p>Between April 6 and 12, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products:</p> <ul><li>Red Hat CodeReady Linux Builder β multiple versions and platforms</li> <li>Red Hat Enterprise Linux β multiple versions and platforms</li> <li>Red Hat Enterprise Linux Server β multiple versions and platforms</li> <li>Red Hat Enterprise Linux for Real Time β multiple versions and platforms</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat Security Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- [Control systems] CISA ICS security advisories (AV26β339)by Canadian Centre for Cyber Security on April 13, 2026 at 2:07 pm
<article data-history-node-id="7540" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-339" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-339<br /><strong>Date: </strong>April 13, 2026</p> <p>Between April 6 and 12, 2026, CISA published ICS advisories to address vulnerabilities in the following products:</p> <ul><li>Contemporary Controls BASC 2OT β BASControl20 3.1</li> <li>GPL Odorizers GPL750 β multiple versions and models</li> <li>Mitsubishi Electric GENESIS64 and ICONICS β multiple versions and models</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p> <ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li> </ul></div> </div> </div> </div> </div> </article>
- Ubuntu security advisory (AV26-338)by Canadian Centre for Cyber Security on April 13, 2026 at 1:56 pm
<article data-history-node-id="7539" about="/en/alerts-advisories/ubuntu-security-advisory-av26-338" class="cccs-threats full clearfix"> <div class="content"> <div class="layout layout–onecol"> <div class="layout__region layout__region–content"> <div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix"> </div> <div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix"> <div class="field field–name-body field–type-text-with-summary field–label-hidden field–item"><p><strong>Serial number: </strong>AV26-338<br /><strong>Date: </strong>April 13, 2026</p> <p>Between April 6 and 12, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products:</p> <ul><li>Ubuntu 14.04 LTS</li> <li>Ubuntu 16.04 LTS</li> <li>Ubuntu 18.04 LTS</li> <li>Ubuntu 20.04 LTS</li> <li>Ubuntu 22.04 LTS</li> <li>Ubuntu 24.04 LTS</li> <li>Ubuntu 25.10</li> </ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web link provided and apply the necessary updates.</p> <ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li> </ul></div> </div> </div> </div> </div> </article>






