Center for Internet Security

Cyber Security Advisories – MS-ISAC The latest MS-ISAC cyber security advisories. Feed provided by Center for Internet Security.

  • Critical Patches Issued for Microsoft Products, April 14, 2026
    on April 14, 2026 at 6:18 pm

    Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution
    on April 14, 2026 at 5:41 pm

    Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution.FortiAnalyzer is a unified security operations platform that consolidates telemetry across networks, endpoints, and cloud environments.FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent.FortiDDoS is an inline, purpose-built solution that protects organizations against disruptions caused by attacks that flood a target with packets and exhaust resources, causing the network, applications, or services to be unavailable to legitimate traffic.FortiManager is a centralized management platform that lets you configure, monitor, and control multiple Fortinet security devices from a single interface.FortiNAC-F is a zero-trust network access solution that provides users with enhanced visibility into the Internet of Things (IoT) devices on their enterprise networks.FortiNDR is Fortinet’s Network Detection and Response product.FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines.FortiPAM provides privileged access management and control for elevated and privileged accounts, processes, and systems across the entire IT environment.FortiProxy is a secure web gateway product from Fortinet that protects users from internet-borne attacks, enforces compliance, and improves network performance.FortiSandbox is an advanced threat detection solution from Fortinet that uses sandboxing to analyze suspicious files and network traffic for advanced threats like zero-day malware and ransomware.FortiSOAR is a security orchestration, automation, and response (SOAR) solution that aims to simplify security operations for organizations.FortiSwitchManager is Fortinet’s dedicated, on-premise platform for centrally managing FortiSwitch devices in large deployments.FortiVoice is a unified communications solution that combines voice, chat, conferencing, and fax into a single, secure platform for businesses and schools.FortiWeb is a web application firewall (WAF) that protects web applications and APIs from cyberattacks like SQL injection and cross-site scripting, while also helping to meet compliance requirements.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
    on April 14, 2026 at 5:23 pm

    Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.Adobe Acrobat Reader is a free, widely used software application from Adobe that allows users to view, print, sign, share, and annotate PDF documents.Adobe InDesign is desktop publishing software used to create, pre-flight, and publish professional page layouts for print and digital media.Adobe InCopy is professional writing and editing software that integrates directly with Adobe InDesign to enable collaborative workflows between editors, copywriters, and designers.Adobe Experience Manager (AEM) Screens is a cloud-based digital signage solution that extends AEM’s content management capabilities to physical, in-venue displays.Adobe FrameMaker is a powerful, industry-standard desktop publishing software designed for authoring, managing, and publishing complex, long-form technical documentation.Adobe Connect is a secure, highly customizable web conferencing and virtual training platform used for webinars, online meetings, and e-learning.Adobe ColdFusion is a commercial rapid web application development platform and server-side technology used to build, deploy, and manage dynamic websites and internet applications.Adobe Bridge is a free, powerful digital asset management (DAM) application designed to organize, browse, locate, and view creative assets.Adobe Photoshop is software for raster image editing, graphic design, and digital art.The Adobe DNG Software Development Kit (SDK) is a set of tools and libraries for developers to read, write, and manipulate Digital Negative (DNG) files, an open, lossless raw image format.Adobe Illustrator is vector graphics software used by designers to create scalable, high-resolution artwork such as logos, icons, illustrations, and typography.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
    on April 7, 2026 at 8:32 pm

    Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet.Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations.Mozilla Thunderbird is an email client.Mozilla Thunderbird ESR is a version of the email client intended to be deployed in large organizations. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • A Vulnerability in Fortinet FortiClientEMS Could Allow for Arbitrary Code Execution
    on April 4, 2026 at 8:49 am

    A Vulnerability has been discovered in Fortinet FortiClientEMS that could allow for arbitrary code execution. FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent.Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Progress ShareFile Could Allow for Remote Code Execution
    on April 2, 2026 at 6:10 pm

    Multiple vulnerabilities have been discovered in Progress ShareFile, which when chained together, could allow for remote code execution. Progress ShareFile is a secure, cloud-based content collaboration and file-sharing platform. It enables businesses to securely exchange documents, manage client workflows, and obtain electronic signatures, with a focus on compliance for industries like finance and healthcare. Successful exploitation of the vulnerabilities when chained together could allow attackers to abuse the file upload and extraction functionality to place malicious ASPX webshells in the application’s webroot. 

  • Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution
    on April 2, 2026 at 3:17 pm

    Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for arbitrary code execution. Cisco Smart Software Manager On‑Prem is a centralized Cisco tool used by organizations to manage software licenses, entitlements, and compliance for Cisco products within their own network environment.Cisco Integrated Management Controller (IMC) is embedded server management software that allows administrators to remotely monitor, configure, and control Cisco servers without needing an operating system installed.Cisco Evolved Programmable Network Manager (EPNM) is a network management platform used to provision, monitor, and automate large‑scale Cisco network infrastructures.Cisco Nexus Dashboard is a centralized management and operations platform that provides visibility, policy management, and analytics across Cisco Nexus data center networks.Cisco Nexus Dashboard Insights is an analytics and assurance application that runs on Nexus Dashboard to detect configuration issues, performance problems, and network anomalies in data center environments.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution, which may lead to the complete compromise of the affected device.

  • Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
    on April 2, 2026 at 1:18 am

    Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

  • Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation
    on April 1, 2026 at 3:45 am

    Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for privilege escalation. Successful exploitation of the most severe of these vulnerabilities could allow a user to elevate privileges. Depending on the privileges associated with the user, they may be able to modify protected system files. 

  • A Vulnerability in F5 Products Could Allow for Remote Code Execution
    on March 30, 2026 at 3:40 pm

    A vulnerability has been discovered in F5 Products that could allow for remote code execution. F5 BIG IP APM is an access policy management solution designed to enforce secure access to applications, APIs, and sensitive data. It is commonly deployed by enterprises, financial institutions, and government or public sector organizations to centrally control authentication, authorization, and user access across internal and remote environments.Successful exploitation of this vulnerability could lead to remote code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have less rights on the system could be less impacted than those who operate with administrative user rights.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.