CVE-2026-28779: Apache Airflow: Path of session token in cookie does not consider base_url - session hijacking via co-hosted applications
Severity: Medium
Affected versions:
- Apache Airflow (apache-airflow) 3.0.0 before 3.1.8
https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb
Severity: Medium
Affected versions:
- Apache Airflow (apache-airflow) 3.0.0 before 3.1.8
https://lists.apache.org/thread/r4n5znb8mcq14wo9v8ndml36nxlksdqb
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries.
In a report published Monday, BeyondTrust revealed that Amazon Bedrock AgentCore Code Interpreter's s…
https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html
Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries.
In a report published Monday, BeyondTrust revealed that Amazon Bedrock AgentCore Code Interpreter's s…
https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html
21 de marzo de 2026: KB5085516 (compilaciones del SO 26200.8039 y 26100.8039) Fuera de banda
Compilaciones del SO 26200.8039 y 26100.8039
Windows 11 version 25H2, all editions Windows 11 version 24H2, all editions
https://support.microsoft.com/es-es/topic/21-de-marzo-de-2026-kb5085516-compilaciones-del-so-26200-8039-y-26100-8039-fuera-de-banda-09e85404-1cb6-4ed4-9ca5-3e40d74307b9
Compilaciones del SO 26200.8039 y 26100.8039
Windows 11 version 25H2, all editions Windows 11 version 24H2, all editions
https://support.microsoft.com/es-es/topic/21-de-marzo-de-2026-kb5085516-compilaciones-del-so-26200-8039-y-26100-8039-fuera-de-banda-09e85404-1cb6-4ed4-9ca5-3e40d74307b9
Escritura fuera de límites en telnetd afecta a productos de Synology
Fecha 23/03/2026
Importancia 5 - Crítica
Recursos Afectados
DSM versión 7.3;
DSM versión 7.2.2;
DSM versión 7.2.1;
DSMUC versión 3.1.
Descripción
Synology ha informado sobre 1 vulnerabilidad crítica que afecta a DiskStation Manager (DSM) que, en caso de ser explotada, podría permitir a atacantes remotos no autenticados ejecutar comandos arbitrarios.
Solución
Se recomienda actualizar los productos a las siguientes versiones o desactivar el servicio Telnet para reducir el riesgo.
7.3.2-86009-3 o superior;
7.2.2-72806-8 o superior;
7.2.1-69057-11 o superior.
Para el producto DSMUC 3.1 no hay actualización por el momento ya que esta está en curso de realizarse.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/escritura-fuera-de-limites-en-telnetd-afecta-productos-de-synology
Fecha 23/03/2026
Importancia 5 - Crítica
Recursos Afectados
DSM versión 7.3;
DSM versión 7.2.2;
DSM versión 7.2.1;
DSMUC versión 3.1.
Descripción
Synology ha informado sobre 1 vulnerabilidad crítica que afecta a DiskStation Manager (DSM) que, en caso de ser explotada, podría permitir a atacantes remotos no autenticados ejecutar comandos arbitrarios.
Solución
Se recomienda actualizar los productos a las siguientes versiones o desactivar el servicio Telnet para reducir el riesgo.
7.3.2-86009-3 o superior;
7.2.2-72806-8 o superior;
7.2.1-69057-11 o superior.
Para el producto DSMUC 3.1 no hay actualización por el momento ya que esta está en curso de realizarse.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/escritura-fuera-de-limites-en-telnetd-afecta-productos-de-synology
www.incibe.es
Escritura fuera de límites en telnetd afecta a productos de Synology
Synology ha informado sobre 1 vulnerabilidad crítica que afecta a DiskStation Manager (DSM) que, en ca
Múltiples vulnerabilidades en productos UniFi Network y UniFi Express de Ubiquiti
Fecha 23/03/2026
Importancia 5 - Crítica
Recursos Afectados
Según la vulnerabilidad, los productos afectados son:
CVE-2026-22557 y CVE-2026-22558:
Lanzamiento oficial: aplicación UniFi Network, versión 10.1.85 y anteriores;
Lanzamiento candidato: aplicación UniFi Network, versión 10.2.93 y anteriores;
UniFi Express (UX): aplicación UniFi Network, versión 9.0.114 y anteriores.
CVE-2026-22559:
Servidor de red UniFi, versión 10.1.85 y anteriores.
Descripción
n00r3(@izn0u), Garett Kopcha (@0x5t) y Shubham Gupta (@hackerspider1) han descubierto 3 vulnerabilidades, una de ellas de severidad crítica y 2 alta. En caso de ser explotadas podrían permitir el acceso a ficheros no autorizados, la escalada de privilegios y el acceso no autorizado a una cuenta.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-ubiquiti
Fecha 23/03/2026
Importancia 5 - Crítica
Recursos Afectados
Según la vulnerabilidad, los productos afectados son:
CVE-2026-22557 y CVE-2026-22558:
Lanzamiento oficial: aplicación UniFi Network, versión 10.1.85 y anteriores;
Lanzamiento candidato: aplicación UniFi Network, versión 10.2.93 y anteriores;
UniFi Express (UX): aplicación UniFi Network, versión 9.0.114 y anteriores.
CVE-2026-22559:
Servidor de red UniFi, versión 10.1.85 y anteriores.
Descripción
n00r3(@izn0u), Garett Kopcha (@0x5t) y Shubham Gupta (@hackerspider1) han descubierto 3 vulnerabilidades, una de ellas de severidad crítica y 2 alta. En caso de ser explotadas podrían permitir el acceso a ficheros no autorizados, la escalada de privilegios y el acceso no autorizado a una cuenta.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-ubiquiti
www.incibe.es
Múltiples vulnerabilidades en productos UniFi Network y UniFi Express de Ubiquiti
n00r3(@izn0u), Garett Kopcha (@0x5t) y Shubham Gupta (@hackerspider1) han descubierto 3 vulnerabilidad
Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application.
The vulnerabilities are listed below -
⚠️ CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread
⚠️ CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user session mixup
https://thehackernews.com/2026/03/citrix-urges-patching-critical.html
Citrix has released security updates to address two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw that could be exploited to leak sensitive data from the application.
The vulnerabilities are listed below -
⚠️ CVE-2026-3055 (CVSS score: 9.3) - Insufficient input validation leading to memory overread
⚠️ CVE-2026-4368 (CVSS score: 7.7) - Race condition leading to user session mixup
https://thehackernews.com/2026/03/citrix-urges-patching-critical.html
Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability
Advisory ID: cisco-sa-fmc-rce-NKhnULJh
First Published: 2026 March 4 16:00 GMT
Last Updated: 2026 March 25 14:21 GMT
Version 1.2: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCwt14636
CVSS Score: Base 10.0
CVE-2026-20131
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.
This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.
Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh
Advisory ID: cisco-sa-fmc-rce-NKhnULJh
First Published: 2026 March 4 16:00 GMT
Last Updated: 2026 March 25 14:21 GMT
Version 1.2: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCwt14636
CVSS Score: Base 10.0
CVE-2026-20131
Summary
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.
This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root.
Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh
Cisco
Cisco Security Advisory: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.
This vulnerability is due to insecure…
This vulnerability is due to insecure…
API authentication and authorization bypass
IR Number FG-IR-26-099
Published Date Apr 4, 2026
Severity Critical
Discovered External
Attack Type Unauthenticated
Known Exploited No
CVSSv3 Score 9.1
Impact Escalation of privilege
Version Affected Solution
FortiClientEMS 7.4 7.4.5 through 7.4.6 Upgrade to upcoming 7.4.7 or above
FortiClientEMS 7.2 Not affected Not Applicable
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
IR Number FG-IR-26-099
Published Date Apr 4, 2026
Severity Critical
Discovered External
Attack Type Unauthenticated
Known Exploited No
CVSSv3 Score 9.1
Impact Escalation of privilege
Version Affected Solution
FortiClientEMS 7.4 7.4.5 through 7.4.6 Upgrade to upcoming 7.4.7 or above
FortiClientEMS 7.2 Not affected Not Applicable
https://fortiguard.fortinet.com/psirt/FG-IR-26-099
FortiGuard Labs
PSIRT | FortiGuard Labs
None
Cisco Integrated Management Controller Authentication Bypass Vulnerability
Advisory ID: cisco-sa-cimc-auth-bypass-AgG2BxTn
First Published: 2026 April 1 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCwq55648 CSCwq55659 CSCwq68912
CVE-2026-20093
CWE-20
CVSS Score: Base 9.8
Summary
A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin.
This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that user.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn
Advisory ID: cisco-sa-cimc-auth-bypass-AgG2BxTn
First Published: 2026 April 1 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCwq55648 CSCwq55659 CSCwq68912
CVE-2026-20093
CWE-20
CVSS Score: Base 9.8
Summary
A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin.
This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that user.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn
Cisco
Cisco Security Advisory: Cisco Integrated Management Controller Authentication Bypass Vulnerability
A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin.
This vulnerability is due to incorrect handling…
This vulnerability is due to incorrect handling…
DSA-6197-1
Name: DSA-6197-1
Description: dovecot - security update
Source: Debian
References: CVE-2025-59031, CVE-2025-59032, CVE-2026-27855, CVE-2026-27856, CVE-2026-27857, CVE-2026-27858, CVE-2026-27859
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package Release Version Status
dovecot (PTS)
bookworm 1:2.3.19.1+dfsg1-2.1+deb12u1 vulnerable
bookworm (security) 1:2.3.19.1+dfsg1-2.1+deb12u2 fixed
trixie 1:2.4.1+dfsg1-6+deb13u3 vulnerable
trixie (security) 1:2.4.1+dfsg1-6+deb13u4 fixed
https://security-tracker.debian.org/tracker/DSA-6197-1
Name: DSA-6197-1
Description: dovecot - security update
Source: Debian
References: CVE-2025-59031, CVE-2025-59032, CVE-2026-27855, CVE-2026-27856, CVE-2026-27857, CVE-2026-27858, CVE-2026-27859
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package Release Version Status
dovecot (PTS)
bookworm 1:2.3.19.1+dfsg1-2.1+deb12u1 vulnerable
bookworm (security) 1:2.3.19.1+dfsg1-2.1+deb12u2 fixed
trixie 1:2.4.1+dfsg1-6+deb13u3 vulnerable
trixie (security) 1:2.4.1+dfsg1-6+deb13u4 fixed
https://security-tracker.debian.org/tracker/DSA-6197-1
Product Release Advisory - VMware Tanzu for MySQL on Kubernetes 2.0.2
Advisory ID: TNZ-2026-0257
Severity: Critical
Issue Date: 2026-04-02
Synopsis
Many critical & high vulnerabilities were found in MySQL for Kubernetes 2.0.1, which is addressed in MySQL for Kubernetes 2.0.2
Product Version Release Advisory
VMware Tanzu for MySQL on Kubernetes
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37340
Advisory ID: TNZ-2026-0257
Severity: Critical
Issue Date: 2026-04-02
Synopsis
Many critical & high vulnerabilities were found in MySQL for Kubernetes 2.0.1, which is addressed in MySQL for Kubernetes 2.0.2
Product Version Release Advisory
VMware Tanzu for MySQL on Kubernetes
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37340
SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031
Project: SAML SSO - Service Provider
Date: 2026-April-01
Security risk: Critical
Vulnerability: Authentication bypass
Affected versions: <3.1.4
CVE IDs: CVE-2026-5343
Description:
This module enables you to perform SAML-protocol-based single-sign-on (SSO) on a Drupal site.
The module doesn't sufficiently block access, leading to a authentication bypass vulnerability.
Solution:
Install the latest version:
https://www.drupal.org/sa-contrib-2026-031
Project: SAML SSO - Service Provider
Date: 2026-April-01
Security risk: Critical
Vulnerability: Authentication bypass
Affected versions: <3.1.4
CVE IDs: CVE-2026-5343
Description:
This module enables you to perform SAML-protocol-based single-sign-on (SSO) on a Drupal site.
The module doesn't sufficiently block access, leading to a authentication bypass vulnerability.
Solution:
Install the latest version:
https://www.drupal.org/sa-contrib-2026-031
Drupal.org
SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031
This module enables you to perform SAML-protocol-based single-sign-on (SSO) on a Drupal site. The module doesn't sufficiently block access, leading to a authentication bypass vulnerability.
CVE-2026-34040 Detail
Description
Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.
https://nvd.nist.gov/vuln/detail/CVE-2026-34040
https://explore.alas.aws.amazon.com/CVE-2026-34040.html
https://github.com/moby/moby/releases/tag/docker-v29.3.1
Description
Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.
https://nvd.nist.gov/vuln/detail/CVE-2026-34040
https://explore.alas.aws.amazon.com/CVE-2026-34040.html
https://github.com/moby/moby/releases/tag/docker-v29.3.1
GitHub
Release v29.3.1 · moby/moby
29.3.1
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
docker/cli, 29.3.1 milestone
moby/moby, 29.3.1 milestone
Security
This release includ...
For a full list of pull requests and changes in this release, refer to the relevant GitHub milestones:
docker/cli, 29.3.1 milestone
moby/moby, 29.3.1 milestone
Security
This release includ...