<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><id>https://cyber.gc.ca/api/cccs/atom/v1/get?feed=alerts_advisories&amp;lang=en</id><link rel="self" href="https://cyber.gc.ca/api/cccs/atom/v1/get?feed=alerts_advisories&amp;lang=en"/><title>Alerts and advisories</title><updated>2026-04-08T20:27:35Z</updated><entry><id>https://cyber.gc.ca/en/alerts-advisories/sonicwall-security-advisory-av26-332</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/sonicwall-security-advisory-av26-332"/><title><![CDATA[SonicWall security advisory (AV26-332)]]></title><updated>2026-04-08T20:27:35Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7530" about="/en/alerts-advisories/sonicwall-security-advisory-av26-332" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-332<br /><strong>Date: </strong>April 8, 2026</p>

<p>On April 8, 2026, SonicWall published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>SMA1000 – version 12.4.3-03245 (platform-hotfix) and prior</li>
	<li>SMA1000 – version 12.5.0-02283 (platform-hotfix) and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2026-0003">SonicWall SMA1000 Series Appliances Affected By Multiple Vulnerabilities</a></li>
	<li><a href="https://psirt.global.sonicwall.com/vuln-list">SonicWall Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/palo-alto-networks-security-advisory-av26-331</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/palo-alto-networks-security-advisory-av26-331"/><title><![CDATA[Palo Alto Networks security advisory (AV26-331)]]></title><updated>2026-04-08T20:04:52Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7532" about="/en/alerts-advisories/palo-alto-networks-security-advisory-av26-331" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-331<br /><strong>Date: </strong>April 8, 2026</p>

<p>On April 8, 2026, Palo Alto Networks published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Autonomous Digital Experience Manager 5.11.0 – versions prior to 5.11.4</li>
	<li>Cortex XDR Agent 9.0 – versions prior to 9.0.1 without CU-2120 on Windows</li>
	<li>Cortex XDR Agent 8.9 – versions prior to 8.9.1 without CU-2120 on Windows</li>
	<li>Cortex XDR Agent 8.7-CE – versions prior to 8.7.101-CE without CU-2120 on Windows</li>
	<li>Cortex XDR Agent 8.3-CE – all without CI-2120 on Windows</li>
	<li>Cortex XDR Agent 7.9-CE – all without CI-2120 on Windows</li>
	<li>Cortex XSIAM Microsoft Teams Marketplace 1.5.0 – versions prior to 1.5.52</li>
	<li>Cortex XSOAR Microsoft Teams Marketplace 1.5.0 – versions prior to 1.5.52</li>
	<li>Prisma Browser – versions prior to 145.16.12.110</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations, and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://security.paloaltonetworks.com/CVE-2026-0234">CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration</a></li>
	<li><a href="https://security.paloaltonetworks.com/PAN-SA-2026-0004">PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026)</a></li>
	<li><a href="https://security.paloaltonetworks.com/CVE-2026-0233">CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate</a></li>
	<li><a href="https://security.paloaltonetworks.com/CVE-2026-0232">CVE-2026-0232 Cortex XDR Agent: Local Administrator can disable the agent on Windows</a></li>
	<li><a href="https://security.paloaltonetworks.com/">Palo Alto Network Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/apache-activemq-security-advisory-av26-330</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/apache-activemq-security-advisory-av26-330"/><title><![CDATA[Apache ActiveMQ security advisory (AV26-330)]]></title><updated>2026-04-08T19:19:17Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7529" about="/en/alerts-advisories/apache-activemq-security-advisory-av26-330" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-330<br /><strong>Date:</strong> April 8, 2026</p>

<p class="mrgn-bttm-md">On April 8, 2026, Apache published a security advisory to address a vulnerability in the following products:</p>

<ul><li>Apache ActiveMQ Broker - versions prior to 5.19.4</li>
	<li>Apache ActiveMQ Broker - 6.0.0 versions prior to 6.2.3</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt">CVE-2026-34197</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ivanti-security-advisory-av26-068</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ivanti-security-advisory-av26-068"/><title><![CDATA[Ivanti security advisory (AV26-068) – Update 2]]></title><updated>2026-04-08T17:58:01Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7217" about="/en/alerts-advisories/ivanti-security-advisory-av26-068" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-068<br /><strong>Date: </strong>January 29, 2026<br /><strong>Updated: </strong>April 8, 2026</p>

<p>On January 29, 2026, <span lang="en" xml:lang="en" xml:lang="en">Ivanti</span> published a security advisory to address critical vulnerabilities in the following product:</p>

<ul><li>Ivanti Endpoint Manager Mobile (EPMM) – version 12.5.0.0 and prior, 12.6.0.0 and prior, 12.7.0.0 and prior, version 12.5.1.0 and prior and 12.6.1.0 and prior</li>
</ul><h2>Update 1</h2>

<p class="mrgn-bttm-md">On January 29, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-1281 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<h2>Update 2</h2>

<p>On April 8, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-1340 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p>Ivanti has stated that vulnerabilities CVE-2026-1281 &amp; CVE-2026-1340 have been exploited in the wild.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 &amp; CVE-2026-1340)</a></li>
	<li><a href="https://forums.ivanti.com/s/article/Analysis-Guidance-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Analysis Guidance Ivanti Endpoint Manager Mobile (EPMM) CVE-2026-1281 &amp; CVE-2026-1340</a></li>
	<li><a href="https://forums.ivanti.com/s/searchallcontent?language=en_US#tab=All&amp;sortCriteria=date%20descending&amp;f-sfkbknowledgearticletypec=Security%20Advisory">Ivanti Security Advisories</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1281">CISA KEV: CVE-2026-1281</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-1340">CISA KEV: CVE-2026-1340</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/openssl-security-advisory-av26-329</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/openssl-security-advisory-av26-329"/><title><![CDATA[OpenSSL security advisory (AV26-329)]]></title><updated>2026-04-08T17:46:30Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7528" about="/en/alerts-advisories/openssl-security-advisory-av26-329" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-329<br /><strong>Date:</strong> April 8, 2026</p>

<p>On April 7, 2026, <span lang="en" xml:lang="en" xml:lang="en">Open</span>SSL published security advisories to address vulnerabilities in multiple products. Included were updates for the following:</p>

<ul><li>OpenSSL - versions 3.6.0 to versions prior to 3.6.2</li>
	<li>OpenSSL - versions 3.5.0 to versions prior to 3.5.6</li>
	<li>OpenSSL - versions 3.4.0 to versions prior to 3.4.5</li>
	<li>OpenSSL - versions 3.3.0 to versions prior to 3.3.7</li>
	<li>OpenSSL - versions 3.0.0 to versions prior to 3.0.20</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://openssl-library.org/news/vulnerabilities/index.html">OpenSSL Vulnerabilities</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/mitel-security-advisory-av26-328</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/mitel-security-advisory-av26-328"/><title><![CDATA[Mitel security advisory (AV26-328)]]></title><updated>2026-04-08T17:35:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7527" about="/en/alerts-advisories/mitel-security-advisory-av26-328" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-328<br /><strong>Date:</strong> April 8, 2026</p>

<p>On April 7, 2026, <span lang="en" xml:lang="en" xml:lang="en">Mitel</span> published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>MiCollab - version 10.2.0.24 and prior</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2026-0002">Mitel Product Security Advisory MISA-2026-0002</a></li>
	<li><a href="https://www.mitel.com/support/security-advisories">Mitel Security Bulletins </a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av26-327</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av26-327"/><title><![CDATA[GitLab security advisory (AV26-327)]]></title><updated>2026-04-08T15:48:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7526" about="/en/alerts-advisories/gitlab-security-advisory-av26-327" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-327<br /><strong>Date:</strong> April 8, 2026</p>

<p class="mrgn-bttm-md">On April 8, 2026, GitLab published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>GitLab Community Edition (CE) - versions prior to 18.10.3, 18.9.5 and 18.8.9</li>
	<li>GitLab Enterprise Edition (EE) - versions prior to 18.10.3, 18.9.5 and 18.8.9</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://about.gitlab.com/releases/2026/04/08/patch-release-gitlab-18-10-3-released/">GitLab Patch GitLab Patch Release: 18.10.3, 18.9.5, 18.8.9</a></li>
	<li><a href="https://about.gitlab.com/releases/categories/releases/ ">GitLab Releases</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cups-security-advisory-av26-326</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cups-security-advisory-av26-326"/><title><![CDATA[CUPS security advisory (AV26-326)]]></title><updated>2026-04-08T15:35:11Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7524" about="/en/alerts-advisories/cups-security-advisory-av26-326" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-326<br /><strong>Date:</strong> April 8, 2026</p>

<p>On April 5, 2026, OpenPrinting published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Common UNIX Printing Systems (CUPS) - version 2.4.16 and prior</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates once available.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://heyitsas.im/posts/cups/">Spooler Alert: Remote Unauth'd RCE-to-root Chain in CUPS</a></li>
	<li><a href="https://github.com/OpenPrinting/cups/security/advisories/GHSA-c54j-2vqw-wpwp">Local print admin token disclosure using temporary printers (CVE-2026-34990)</a></li>
	<li><a href="https://github.com/OpenPrinting/cups/security/advisories/GHSA-4852-v58g-6cwf">Shared PostScript queue lets anonymous Print-Job requests reach `lp` code execution over the network (CVE-2026-34980)</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-325</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-325"/><title><![CDATA[HPE security advisory (AV26-325)]]></title><updated>2026-04-08T15:23:58Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7523" about="/en/alerts-advisories/hpe-security-advisory-av26-325" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-325<br /><strong>Date:</strong> April 8, 2026</p>

<p>On April 7, 2026, HPE published a security advisory to address a vulnerability in the following product:</p>

<ul><li>HPE Aruba Networking Private 5G Core - version 1.25.3.0 and prior</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05032en_us&amp;docLocale=en_US#hpesbnw05032-rev-1-hpe-aruba-networking-private-5g-0">HPESBNW05032 rev.1 - HPE Aruba Networking Private 5G Core On-Prem, Open Redirect Vulnerability</a></li>
	<li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-324</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-324"/><title><![CDATA[[Control systems] CISA ICS security advisories (AV26–324)]]></title><updated>2026-04-07T20:46:24Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7520" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-324" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26–324<br /><strong>Date: </strong>April 7, 2026</p>

<p>Between March 30 and April 5, 2026, CISA published ICS advisories to address vulnerabilities in the following products:</p>

<ul><li>Anritsu Remote Spectrum Monitor MS27100 – all versions</li>
	<li>Anritsu Remote Spectrum Monitor MS27101A – all versions</li>
	<li>Anritsu Remote Spectrum Monitor MS27102A – all versions</li>
	<li>Anritsu Remote Spectrum Monitor MS27103A – all versions</li>
	<li>Hitachi Energy Ellipse – version 9.0.50 and prior</li>
	<li>PX4 Autopilot – v1.16.0_SITL_latest_stable (CVE-2026-1579)</li>
	<li>Siemens CPCI85 Central Processing/Communication RTUM85 RTU Base – versions prior to V26.10</li>
	<li>Siemens CPCI85 Central Processing/Communication SICORE Base system – versions prior to V26.10</li>
	<li>Yokogawa CENTUM VP – multiple versions</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p>

<ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av26-323</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av26-323"/><title><![CDATA[Mozilla security advisory (AV26-323)]]></title><updated>2026-04-07T20:44:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7518" about="/en/alerts-advisories/mozilla-security-advisory-av26-323" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-323<br /><strong>Date: </strong>April 7, 2026</p>

<p>On April 7, 2026, Mozilla published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Firefox – versions prior to 149.0.2</li>
	<li>Firefox ESR – versions prior to 34.1</li>
	<li>Firefox ESR – versions prior to 9.1</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-27/">Security Vulnerabilities fixed in Firefox ESR 140.9.1</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-26/">Security Vulnerabilities fixed in Firefox ESR 115.34.1</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-25/">Security Vulnerabilities fixed in Firefox 149.0.2</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/">Mozilla Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-322</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-322"/><title><![CDATA[Dell security advisory (AV26-322)]]></title><updated>2026-04-07T20:27:07Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7521" about="/en/alerts-advisories/dell-security-advisory-av26-322" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-322<br /><strong>Date:</strong> April 7, 2026</p>

<p>Between March 30 and April 5, 2026, Dell published security advisories to address vulnerabilities in multiple products:</p>

<ul><li>Dell Networking OS10 – versions prior to 10.6.11</li>
	<li>Connectrix Switches and Directors – versions prior to sannav_ova_9x_os_02_2026</li>
	<li>Elastic Cloud Storage – versions prior to 3.8.1.7</li>
	<li>ObjectScale - versions prior to 4.1.0.3 and 4.2.00</li>
	<li>Dell Data Protection Central – versions 19.9 to 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1</li>
	<li>Dell PowerProtect DP Series Appliance – versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1</li>
	<li>Dell PowerProtect Data Manager – versions prior to 20.1.0.0</li>
	<li>Dell AppSync – versions prior to 4.6.0.4</li>
	<li>Dell APEX Cloud Platform for Microsoft Azure – versions prior to 01.07.01.00</li>
	<li>Unisphere for PowerMax Virtual Appliance – versions prior to 9.2.4.20</li>
	<li>Solutions Enabler – versions prior to 10.3.0.1 and 9.2.4.9</li>
	<li>Solutions Enabler Virtual Appliance – versions prior to 9.2.4.9</li>
	<li>Dell PowerMax EEM 5978 – versions prior to 5978.720.720.11249</li>
	<li>Dell PowerMax EEM 10.3.1.0 – versions prior to 10.3.1.0 patch 11248</li>
	<li>Dell PowerMaxOS 5978 – versions prior to 5978.720.720.11249</li>
	<li>Dell PowerMaxOS 10.3.0.1 – versions prior to 10.3.0.1 patch 11248</li>
	<li>PowerSwitch Z9664F-ON – versions prior to 3.54.5.1-11</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-321</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-321"/><title><![CDATA[Hitachi security advisory (AV26-321)]]></title><updated>2026-04-07T20:10:16Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7517" about="/en/alerts-advisories/hitachi-security-advisory-av26-321" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-321<br /><strong>Date: </strong>April 7, 2026</p>

<p>On April 7, 2026, Hitachi published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Hitachi Ops Center Common Services (Japanese version) – versions prior to 11.0.8-00</li>
	<li>Hitachi Ops Center Common Services (English version) – versions prior to 11.0.8-00</li>
	<li>Hitachi Ops Center Viewpoint (Japanese version) – versions 11.0.2-00 to versions prior to 11.0.8-00</li>
	<li>Hitachi Ops Center Viewpoint data center proxy (Japanese version) – versions 11.0.2-00 to versions prior to 11.0.8-00</li>
	<li>JP1/IT Desktop Management (Manager) – multiple versions</li>
	<li>Job Management Partner 1/IT Desktop Management (Manager) – multiple versions</li>
	<li>JP1/IT Desktop Management 2 (Manager) – multiple versions</li>
	<li>JP1/IT Desktop Management 2 (Operations Director) – multiple versions</li>
	<li>Job Management Partner 1/IT Desktop Management 2 (Manager) – versions 10-50 to 10-50-11</li>
	<li>JP1/NETM/DM (Manager) – multiple versions</li>
	<li>JP1/NETM/DM (Client) – multiple versions</li>
	<li>Job Management Partner 1/Software Distribution (Manager) – multiple versions</li>
	<li>Job Management Partner 1/Software Distribution (Client) – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-118/index.html">Multiple Vulnerabilities in JP1/IT Desktop Management 2 and JP1/NETM/DM</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-117/index.html">Multiple Vulnerabilities in Hitachi Ops Center Common Services</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-115/index.html">Multiple Vulnerabilities in Hitachi Ops Center Viewpoint</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/index.html">Hitachi Vulnerability Information</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/erlang-security-advisory-av26-320</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/erlang-security-advisory-av26-320"/><title><![CDATA[Erlang security advisory (AV26-320)]]></title><updated>2026-04-07T19:52:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7516" about="/en/alerts-advisories/erlang-security-advisory-av26-320" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-320<br /><strong>Date: </strong>April 7, 2026</p>

<p>On April 7, 2026, Erlang published a security advisory to address a vulnerability in the following products:</p>

<ul><li>inets (OTP) – versions prior to 9.1.0.6, 9.3.2.4 and 9.6.2</li>
	<li>OTP – versions prior to 28.4.2, 27.3.4.10, and 26.2.5.19</li>
	<li>Public_key (OTP) – versions prior to 1.17.1.2 and 1.20.3</li>
	<li>ssl (OTP) – versions prior to 11.2.12.7 and 11.5.4</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/erlang/otp/security/advisories/GHSA-gxrm-pf64-99xm">OCSP designated-responder authorization bypass — missing signature verification (RFC 6960 §4.2.2.2)</a></li>
	<li><a href="https://github.com/erlang/otp/security/advisories/GHSA-3vhp-h532-mc3f">ScriptAlias CGI targets bypass `directory` auth (mod_auth vs mod_cgi path mismatch)</a></li>
	<li><a href="https://github.com/erlang/otp/security">Erlang Security</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av26-319</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av26-319"/><title><![CDATA[VMware security advisory (AV26-319)]]></title><updated>2026-04-07T19:40:52Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7515" about="/en/alerts-advisories/vmware-security-advisory-av26-319" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-319<br /><strong>Date:</strong> April 7, 2026</p>

<p>On April 2, 2026, VMware published a security advisory to address critical vulnerabilities in the following products:</p>

<ul><li>VMware Tanzu Data Intelligence – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu Data Services – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu Data Services Pack – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu Data Services Solutions – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu Data Suite – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu for MySQL – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu Platform – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>Vmware Tanzu Platform SM – versions prior to MySQL for Kubernetes 2.0.2</li>
	<li>VMware Tanzu SQL – versions prior to MySQL for Kubernetes 2.0.2</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37340">Product Release Advisory - VMware Tanzu for MySQL on Kubernetes 2.0.2</a></li>
	<li><a href="https://support.broadcom.com/web/ecx/security-advisory?segment=VT ">Security Advisories – Tanzu</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-318</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-318"/><title><![CDATA[Red Hat security advisory (AV26-318)]]></title><updated>2026-04-07T19:28:54Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7514" about="/en/alerts-advisories/red-hat-security-advisory-av26-318" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-318<br /><strong>Date:</strong> April 7, 2026</p>

<p>Between March 30 and April 5, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products:</p>

<ul><li>Red Hat CodeReady Linux Builder - multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux - multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux Server - multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux for Real Time - multiple versions and platforms</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-317</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-317"/><title><![CDATA[Ubuntu security advisory (AV26-317)]]></title><updated>2026-04-07T19:04:46Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7513" about="/en/alerts-advisories/ubuntu-security-advisory-av26-317" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-317<br /><strong>Date:</strong> April 7, 2026</p>

<p>Between March 30 and April 5, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products:</p>

<ul><li>Ubuntu 14.04 LTS</li>
	<li>Ubuntu 16.04 LTS</li>
	<li>Ubuntu 18.04 LTS</li>
	<li>Ubuntu 20.04 LTS</li>
	<li>Ubuntu 22.04 LTS</li>
	<li>Ubuntu 24.04 LTS</li>
	<li>Ubuntu 25.10</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-316</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-316"/><title><![CDATA[IBM security advisory (AV26-316)]]></title><updated>2026-04-07T18:47:37Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7512" about="/en/alerts-advisories/ibm-security-advisory-av26-316" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-316<br /><strong>Date:</strong> April 7, 2026</p>

<p>Between March 30 and April 5, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p>

<ul><li>API Connect V12 OnPrem - versions 12.1.0.0 and 12.1.0.1</li>
	<li>Automation Assets in IBM Cloud Pak for Integration (CP4I) - multiple versions</li>
	<li>DB2 Client and Server - versions 12.1.0 to 12.1.4</li>
	<li>EDB PGAI AI Factory - version 1.3.0.0</li>
	<li>EDB PGAI Analytics Accelarator - version 1.3.0.0</li>
	<li>EDB PGAI Hybrid Data Management - version 1.3.0.</li>
	<li>EDB PostgreSQL with IBM for IBM Cloud Pak for Data - version 5.3.0</li>
	<li>HMC - versions V10.3.1050.0 to V10.3.1063.1</li>
	<li>HMC - versions V11.1.1110.0 to V11.1.1111.4</li>
	<li>IBM App Connect Enterprise Certified Containers Operands - versions 13.0.6.0-r1 to 13.0.6.2-r1</li>
	<li>IBM App Connect Operator - versions 12.19.0 to 12.21.0</li>
	<li>IBM Business Automation Manager Open Editions - versions 9.0.0 to 9.3.1</li>
	<li>IBM Content Navigator - version 3.0.15, 3.1.0 and 3.2.0</li>
	<li>IBM DataPower Gateway - multiple versions</li>
	<li>IBM Guardium Data Security Center Platform On-prem - version 3.8.7</li>
	<li>IBM Guardium Unified Discovery and Classification (GUDC) - versions 1.0.0 to 1.1.0</li>
	<li>IBM Library Support for Spring - versions 3.4, 3.2.19 and 2.7.31</li>
	<li>IBM Maximo Application Suite IoT Component - version 9.1, 9.0, 8.8 and 8.7</li>
	<li>IBM OpenAPI SDK Generator (Node.js) - version 5.4.9</li>
	<li>IBM Process Mining - versions 2.1.0 IF002, 2.1.0 IF001 and 2.1.0</li>
	<li>IBM Rational Build Forge - versions 8.0.0 to 8.0.0.29</li>
	<li>IBM Security Verify Access - versions 10.0 to 10.0.9.1</li>
	<li>IBM Security Verify Access Container - versions 10.0 to 10.0.9.1</li>
	<li>IBM Storage Protect Plus Server - - versions 10.1.0 to 10.1.17</li>
	<li>IBM Tivoli Netcool Impact - versions 7.1.0.0 to 7.1.0.37</li>
	<li>IBM Verify Identity Access - versions 11.0 to 11.0.2</li>
	<li>IBM Verify Identity Access Container - versions 11.0 to 11.0.2</li>
	<li>IBM Verify Identity Access Digital Credentials - versions 24.06 to 25.12</li>
	<li>IBM watsonx Orchestrate Developer Edition - versions 1.4.0 to 2.6.0</li>
	<li>InfoSphere Information Server - versions 11.7.0.0 to 11.7.1.6</li>
	<li>Maximo AI Service - version 9.1</li>
	<li>Platform Navigator in IBM Cloud Pak for Integration (CP4I) - multiple versions</li>
	<li>UCR IBM DevOps Release - versions 7.0.0 to 7.0.0.6</li>
	<li>UCR IBM UrbanCode Release - versions 6.2.5 to 6.2.5.11</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/">IBM Product Security Incident Response</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/al26-007-vulnerability-impacting-fortinet-forticlientems-cve-2026-35616</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/al26-007-vulnerability-impacting-fortinet-forticlientems-cve-2026-35616"/><title><![CDATA[AL26-007 - Vulnerability impacting Fortinet FortiClientEMS - CVE-2026-35616]]></title><updated>2026-04-07T18:07:26Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7511" about="/en/alerts-advisories/al26-007-vulnerability-impacting-fortinet-forticlientems-cve-2026-35616" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Number:</strong> AL26-007<br /><strong>Date:</strong> April 7, 2026</p>

<h2>Audience</h2>

<p>This Alert is intended for <abbr title="information technology">IT</abbr> professionals and managers.</p>

<h2>Purpose</h2>

<p>An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.</p>

<h2>Details</h2>

<p>The Cyber Centre is aware of a critical vulnerability impacting Fortinet FortiClient Endpoint Management Server <span class="nowrap">(EMS)<sup id="fn1a-rf"><a class="fn-lnk" href="#fn1">1</a></sup>.</span> In response to the vendor advisory released on April 4, 2026, the Cyber Centre released AV26-313 on April 7, <span class="nowrap">2026<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>.</span></p>

<p>Tracked as CVE-2026-35616<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>, this vulnerability is an improper access control vulnerability (CWE-284)<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup> in Fortinet FortiClientEMS 7.4.5 through 7.4.6 that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.</p>

<p>Fortinet FortiClientEMS is a centralized security management solution for Fortinet's endpoint agents (FortiClient). It enables administrators to manage, deploy, and monitor security policies, Zero Trust Network Access (ZTNA) tags, and vulnerability scanning for Windows, macOS, and mobile endpoints, primarily designed for enterprise security.</p>

<p>Further information about the impacted versions of Fortinet instances can be found in the Fortinet advisory<sup id="fn1b-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>This vulnerability was added to CISA's Known Exploited Vulnerabilities (KEV) catalog<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup> on April 6, 2026.</p>

<h2>Suggested actions</h2>

<p>The Cyber Centre recommends that organizations using Fortinet FortiClientEMS, review the Fortinet security bulletin<sup id="fn1c-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> and update or upgrade the affected instances to the following versions:</p>

<div class="table-responsive">
<table class="table"><thead><tr><th scope="col">Affected product</th>
			<th scope="col">Affected version</th>
			<th scope="col">Solution</th>
		</tr></thead><tbody><tr><td>FortiClientEMS 7.4</td>
			<td>7.4.5</td>
			<td>Install hotfix<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup> or upgrade to upcoming 7.4.7 or above</td>
		</tr><tr><td>FortiClientEMS 7.4</td>
			<td>7.4.6</td>
			<td>Install hotfix<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup> or upgrade to upcoming 7.4.7 or above</td>
		</tr><tr><td>FortiClientEMS 7.2</td>
			<td>Not affected</td>
			<td>Not affected</td>
		</tr></tbody><thead></thead></table></div>

<p>In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre's Top 10 <abbr title="information technology">IT</abbr> Security Actions with an emphasis on the following topics<sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup>.</p>

<ul><li>Patch operating systems and applications</li>
	<li>Harden operating systems and applications</li>
	<li>Isolate web-facing applications</li>
</ul><p>Should activity matching the content of this alert be discovered, recipients are encouraged to report via <a href="/en/incident-management">My Cyber Portal</a> or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<h2>References</h2>

<aside class="wb-fnote" role="note"><dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p><a href="https://www.fortiguard.com/psirt/FG-IR-26-099">API authentication and authorization bypass</a></p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p><a href="/en/alerts-advisories/fortinet-security-advisory-av26-313">AV26-313 – Fortinet security advisory</a></p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-35616">CVE-2026-35616 Detail</a></p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p><a href="https://cwe.mitre.org/data/definitions/284">CWE-284: Improper Access Control</a></p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-35616">CISA KEV: CVE-2026-35616</a></p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p><a href="https://docs.fortinet.com/document/forticlient/7.4.5/ems-release-notes/832484">Installing an EMS hotfix | FortiClient 7.4.5 | Fortinet Document Library</a></p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p><a href="https://docs.fortinet.com/document/forticlient/7.4.6/ems-release-notes/832484">Installing an EMS hotfix | FortiClient 7.4.6 | Fortinet Document Library</a></p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 8</dt>
	<dd id="fn8">
	<p><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 <abbr title="information technology">IT</abbr> security actions to protect Internet connected networks and information (ITSM.10.089)</a></p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote</span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-315</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-315"/><title><![CDATA[Microsoft Edge security advisory (AV26-315)]]></title><updated>2026-04-07T15:28:53Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7510" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-315" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-315<br /><strong>Date:</strong> April 7, 2026</p>

<p>On April 1, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p>

<ul><li>Microsoft Edge Stable Channel - versions prior to 146.0.3856.97</li>
</ul><p>Microsoft has indicated that CVE-2026-5281 has an available exploit.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-1-2026">Microsoft Edge Stable Channel Release Notes</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/android-security-advisory-april-2026-monthly-rollup-av26-314</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/android-security-advisory-april-2026-monthly-rollup-av26-314"/><title><![CDATA[Android security advisory – April 2026 monthly rollup (AV26-314)]]></title><updated>2026-04-07T15:15:50Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7509" about="/en/alerts-advisories/android-security-advisory-april-2026-monthly-rollup-av26-314" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-314<br /><strong>Date:</strong> April 7, 2026</p>

<p>On April 6, 2026, Android published a security bulletin to address vulnerabilities affecting Android devices.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://source.android.com/docs/security/bulletin/2026/2026-04-01">Android Security Bulletin</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-313</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-313"/><title><![CDATA[Fortinet security advisory (AV26-313)]]></title><updated>2026-04-07T12:02:51Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7508" about="/en/alerts-advisories/fortinet-security-advisory-av26-313" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-313<br /><strong>Date: </strong>April 7, 2026</p>

<p>On April 4, 2026, Fortinet published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>FortiClientEMS 7.4 – version 7.4.5 to 7.4.6</li>
</ul><p>On April 6, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-35616 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.fortiguard.com/psirt/FG-IR-26-099">API authentication and authorization bypass</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-35616">CISA KEV: CVE-2026-35616</a></li>
	<li><a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">Fortinet PSIRT Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/openssh-security-advisory-av26-312</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/openssh-security-advisory-av26-312"/><title><![CDATA[OpenSSH security advisory (AV26-312)]]></title><updated>2026-04-02T19:53:07Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7507" about="/en/alerts-advisories/openssh-security-advisory-av26-312" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-312<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 2, 2026, OpenSSH published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>OpenSSH - versions prior to 10.3</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.openssh.org/releasenotes.html">OpenSSH 10.3 Release Notes</a></li>
	<li><a href="https://www.openssh.com/">OpenSSH</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cesanta-security-advisory-av26-311</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cesanta-security-advisory-av26-311"/><title><![CDATA[Cesanta security advisory (AV26-311)]]></title><updated>2026-04-02T18:49:23Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7505" about="/en/alerts-advisories/cesanta-security-advisory-av26-311" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-311<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 2, 2026, Cesanta published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Mongoose - versions 7.0 to 7.20</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/cesanta/mongoose">Cesanta Mongoose</a></li>
	<li><a href="https://mongoose.ws/">Mongoose.ws</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-310</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-310"/><title><![CDATA[Progress security advisory (AV26-310)]]></title><updated>2026-04-02T18:37:57Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7504" about="/en/alerts-advisories/progress-security-advisory-av26-310" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-310<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 2, 2026, Progress published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Progress ShareFile - versions prior to v5.12.4 and versions prior to v6</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26 ">Security Vulnerability Fix For ShareFile Storage Zones Controller 5.x (February 2026)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/watchguard-security-advisory-av26-309</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/watchguard-security-advisory-av26-309"/><title><![CDATA[WatchGuard security advisory (AV26-309)]]></title><updated>2026-04-02T15:27:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7503" about="/en/alerts-advisories/watchguard-security-advisory-av26-309" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-309<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 1, 2026, WatchGuard published a security advisory to address a vulnerability in the following products:</p>

<ul><li>
	<p>Fireware OS 2025-1 - versions 2025.1 to 2026.1.2</p>
	</li>
	<li>
	<p>Fireware OS 12.x - versions 12.6.1 to 12.11.8</p>
	</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00009"><span lang="en" xml:lang="en" xml:lang="en">WatchGuard Firebox Arbitrary File Write via Path Traversal in Fireware Web</span> UI</a></li>
	<li><a href="https://www.watchguard.com/wgrd-psirt/advisories"><span lang="en" xml:lang="en" xml:lang="en">WatchGuard Security Advisories</span></a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av26-275</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av26-275"/><title><![CDATA[Apple security advisory (AV26-275) - Update 1]]></title><updated>2026-04-02T15:11:10Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7440" about="/en/alerts-advisories/apple-security-advisory-av26-275" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-275<br /><strong>Date:</strong> March 24, 2026<br /><strong>Updated:</strong> April 2, 2026</p>

<p>On March 24, 2026, Apple published security updates to address vulnerabilities in the following products:</p>

<ul><li>iOS – versions prior to 18.7.7 and versions prior to 26.4</li>
	<li>iPadOS – versions prior to 18.7.7 and versions prior to 26.4</li>
	<li>macOS Sequoia – versions prior to 15.7.5</li>
	<li>macOS Sonoma – versions prior to 14.8.5</li>
	<li>macOS Tahoe – versions prior to 26.4</li>
	<li>tvOS – versions prior to 26.4</li>
	<li>visionOS – versions prior to 26.4</li>
	<li>watchOS – versions prior to 26.4</li>
</ul><p><strong>Update 1</strong><br />
On April 1, 2026 Apple expanded the availability of iOS 18.7.7 for more devices to protect from DarkSword iOS exploit kit web attacks.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.apple.com/en-us/126793">About the security content of iOS 18.7.7 and iPadOS 18.7.7</a></li>
	<li><a href="https://support.apple.com/en-us/100100">Apple Security Updates</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-306</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-306"/><title><![CDATA[Google Chrome security advisory (AV26-306) – Update 1]]></title><updated>2026-04-01T20:25:32Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7499" about="/en/alerts-advisories/google-chrome-security-advisory-av26-306" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-306<br /><strong>Date: </strong>April 1, 2026<br /><strong>Updated:</strong> April 1, 2026</p>

<p>On March 31, 2026, Google published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Stable Channel Chrome for Desktop – versions prior to 146.0.7680.177/178 (Windows/Mac) and 146.0.7680.177 (Linux)</li>
</ul><p>Google is aware that an exploit for CVE-2026-5281 exists in the wild.</p>

<h2 class="h3">Update 1</h2>

<p>On April 1, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-5281 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html">Google Chrome Security Advisory</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-5281">CISA KEV: CVE-2026-5281</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/drupal-security-advisory-av26-308</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/drupal-security-advisory-av26-308"/><title><![CDATA[Drupal security advisory (AV26-308)]]></title><updated>2026-04-01T19:43:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7501" about="/en/alerts-advisories/drupal-security-advisory-av26-308" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-308<br /><strong>Date: </strong>April 1, 2026</p>

<p>On April 1, 2026, Drupal published a security advisory to address a critical vulnerability in the following product :</p>

<ul><li>SAML SSO - Service Provider – versions prior to 3.1.4</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.drupal.org/sa-contrib-2026-031">SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031</a></li>
	<li><a href="https://www.drupal.org/security">Drupal Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-307</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-307"/><title><![CDATA[Cisco security advisory (AV26-307)]]></title><updated>2026-04-01T19:28:35Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7500" about="/en/alerts-advisories/cisco-security-advisory-av26-307" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-307<br /><strong>Date:</strong> April 1, 2026</p>

<p>On April 1, 2026, Cisco published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Cisco NFVIS Release – multiple versions</li>
	<li>Cisco IMC Release – multiple versions</li>
	<li>Cisco Telemetry Broker Appliances – version 6.0(2.260044) (M6) and prior</li>
	<li>IEC6400 Edge Compute Appliances – version 4.3(6.260017) (M6) and prior</li>
	<li>Secure Endpoint Private Cloud Appliances – versions 4.3(2.260007) (M5) and 4.3(6.260017) (M6)</li>
	<li>Secure Firewall Management Center Appliances – versions 4.3(2.260007) (M5) and 4.3(6.260017) (M6)</li>
	<li>Secure Malware Analytics Appliances – versions 4.3(2.260007) (M5) and 4.3(6.260017) (M6)</li>
	<li>Secure Network Analytics Appliances – versions 4.3(2.260007) (M5) and 6.0(2.260044) (M6)</li>
	<li>Secure Network Server Appliances – multiple versions</li>
	<li>Cisco SSM On-Prem Release – version 9-202510 and prior</li>
	<li>Cisco EPNM Release – versions 8.0 and prior, version 8.1 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p>

<ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt">Cisco Integrated Management Controller Command Injection and Remote Code Execution Vulnerabilities</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-xRAnOuO8">Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-improp-auth-mUwFWUU3">Cisco Evolved Programmable Network Manager Improper Authorization Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn">Cisco Integrated Management Controller Authentication Bypass Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-cli-execution-cHUcWuNr">Cisco Smart Software Manager On-Prem Arbitrary Command Execution Vulnerability</a></li>
	<li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-305</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-305"/><title><![CDATA[HPE security advisory (AV26-305)]]></title><updated>2026-03-31T18:33:50Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7474" about="/en/alerts-advisories/hpe-security-advisory-av26-305" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-305<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 31, 2026, HPE published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>HPE Telco Network Function Virtualization Orchestrator – version v7.5.0 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05033en_us&amp;docLocale=en_US#hpesbnw05033-rev-1-hpe-telco-network-function-virt-0">HPESBNW05033 rev.1 - HPE Telco Network Function Virtual Orchestrator, Improper Input Validation in the Undertow HTTP Server Core</a></li>
	<li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/symantec-security-advisory-av26-304</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/symantec-security-advisory-av26-304"/><title><![CDATA[Symantec security advisory (AV26-304)]]></title><updated>2026-03-31T18:16:56Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7471" about="/en/alerts-advisories/symantec-security-advisory-av26-304" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-304<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 30, 2026, Symantec published a security advisory to address a vulnerability in the following product:</p>

<ul><li>Symantec Data Loss Prevention (DLP) Windows Endpoint – versions prior to DLP 16.1 MP2 and DLP 25.1 MP1</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37306">Symantec Data Loss Prevention Security Update</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-303</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-303"/><title><![CDATA[[Control systems] ABB security advisory (AV26-303)]]></title><updated>2026-03-31T18:09:53Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7470" about="/en/alerts-advisories/control-systems-abb-security-advisory-av26-303" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-303<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 31, 2026, ABB published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>ABB 800xA History – version 7.0 and prior</li>
	<li>ABB Batch Management – version 6.2 and prior</li>
	<li>ABB Production Response Batch History – version 6.2 and prior</li>
	<li>ABB 800xA for Symphony Plus Harmony – version 6.2 and prior</li>
	<li>ABB 800xA for AC 870P Melody – version 6.2 and prior</li>
	<li>ABB Application Change Management – version 6.2 and prior</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://search.abb.com/library/Download.aspx?DocumentID=7PAA023732&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch">System 800xA affected by 3rd party component Vulnerabilities (PDF)</a></li>
	<li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/nokia-security-advisory-av26-302</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/nokia-security-advisory-av26-302"/><title><![CDATA[Nokia security advisory (AV26-302)]]></title><updated>2026-03-31T13:33:16Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7469" about="/en/alerts-advisories/nokia-security-advisory-av26-302" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-302<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 30, 2026, Nokia published security advisories to address a vulnerability in the following products:</p>

<ul><li>Nokia GX G42, GX G31, GX G32, GX G34 – versions prior to GX r9.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.nokia.com/we-are-nokia/security/product-security-advisory/cve-2026-34485/">CVE-2026-34485 - CLI ACL Bypass in GX G42</a></li>
	<li><a href="https://www.nokia.com/we-are-nokia/security/product-security-advisory/">Nokia Product Security Advisory</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/citrix-security-advisory-av26-267</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/citrix-security-advisory-av26-267"/><title><![CDATA[Citrix security advisory (AV26-267) – Update 1]]></title><updated>2026-03-30T20:20:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7432" about="/en/alerts-advisories/citrix-security-advisory-av26-267" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-267<br /><strong>Date: </strong>March 23, 2026<br /><strong>Updated: </strong>March 30, 2026<br /></p>

<p>On March 23, 2026, Citrix published a security advisory to address critical vulnerabilities in the following products:</p>

<ul><li>NetScaler ADC and NetScaler Gateway 14.1 – versions prior to 14.1-60.58</li>
	<li>NetScaler ADC and NetScaler Gateway 13.1 – versions prior to 13.1-62.23</li>
	<li>NetScaler ADC FIPS and NDcPP – versions prior to 13.1-37.262</li>
</ul><h2 class="h3">
  Update 1
</h2>
<p class="mrgn-bttm-md">On March 30, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-3055 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&amp;articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368">NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368</a></li>
	<li><a href="https://support.citrix.com/support-home/topic-article-list?trendingCategory=20&amp;trendingTopicName=Security%20Bulletin">Citrix Security Advisories</a></li>
  
  	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3055">CISA KEV: CVE-2026-3055</a></li>
  
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/docker-security-advisory-av26-301</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/docker-security-advisory-av26-301"/><title><![CDATA[Docker security advisory (AV26–301)]]></title><updated>2026-03-30T15:39:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7468" about="/en/alerts-advisories/docker-security-advisory-av26-301" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-301<br /><strong>Date: </strong>March 30, 2026</p>

<p>On March 30, 2026, Docker published a security advisory to address a vulnerability in the following product:</p>

<ul><li>Docker Desktop – versions prior to 4.67.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://docs.docker.com/security/security-announcements/#docker-desktop-4670-security-update-cve-2026-33990">Docker Desktop 4.67.0 security update: CVE-2026-33990</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/roundcube-security-advisory-av26-300</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/roundcube-security-advisory-av26-300"/><title><![CDATA[Roundcube security advisory (AV26-300)]]></title><updated>2026-03-30T15:26:13Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7465" about="/en/alerts-advisories/roundcube-security-advisory-av26-300" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-300<br /><strong>Date: </strong>March 30, 2026</p>

<p>On March 29, 2026, Roundcube published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Webmail – versions prior to 1.6.15</li>
	<li>Webmail – versions prior to 1.5.15</li>
	<li>Webmail – versions prior to 1.7 RC6</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/roundcube/roundcubemail/releases/tag/1.6.15">Roundcube Webmail 1.6.15</a></li>
	<li><a href="https://github.com/roundcube/roundcubemail/releases/tag/1.5.15">Roundcube Webmail 1.5.15</a></li>
	<li><a href="https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc6">Roundcube Webmail 1.7 RC6</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-299</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-299"/><title><![CDATA[Hitachi security advisory (AV26-299)]]></title><updated>2026-03-30T15:20:43Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7467" about="/en/alerts-advisories/hitachi-security-advisory-av26-299" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-299<br /><strong>Date:</strong> March 30, 2026</p>

<p class="mrgn-bttm-md">On March 27, 2026, Hitachi published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Hitachi Disk Array Systems – multiple versions and models</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.hitachi.com/products/it/storage-solutions/sec_info/2026/2026_307.html">Security information for Hitachi Disk Array Systems</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/index.html">Hitachi Vulnerability Information</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-298</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-298"/><title><![CDATA[Red Hat security advisory (AV26-298)]]></title><updated>2026-03-30T15:18:59Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7466" about="/en/alerts-advisories/red-hat-security-advisory-av26-298" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-298<br /><strong>Date: </strong>March 30, 2026</p>

<p class="mrgn-bttm-md">Between March 23 and 29, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products:</p>

<ul><li>Red Hat CodeReady Linux Builder – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux Server – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux for Real Time – multiple versions and platforms</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-297</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-297"/><title><![CDATA[[Control systems] CISA ICS security advisories (AV26-297)]]></title><updated>2026-03-30T15:17:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7464" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-297" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-297<br /><strong>Date: </strong>March 30, 2026</p>

<p class="mrgn-bttm-md">Between March 23 and 29, 2026, CISA published ICS advisories to address vulnerabilities in the following products:</p>

<ul><li>Grassroots DICOM (GDCM) – version 3.2.2</li>
	<li>Pharos Controls Mosaic Show Controller – firmware version 2.15.3</li>
	<li>OpenCode Systems OC Messaging and USSD Gateway – version 6.32.2</li>
	<li>PTC Windchill Product Lifecycle Management – multiple versions and models</li>
	<li>Schneider Electric EcoStruxure Foxboro DCS – versions prior to CS8.1</li>
	<li>Schneider Electric Plant iT/Brewmaxx – version 9.60_and_above</li>
	<li>WAGO GmbH &amp; Co. KG Industrial Managed Switches – multiple firmware version</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p>

<ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-296</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-296"/><title><![CDATA[Ubuntu security advisory (AV26-296)]]></title><updated>2026-03-30T15:09:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7463" about="/en/alerts-advisories/ubuntu-security-advisory-av26-296" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-296<br /><strong>Date: </strong>March 30, 2026</p>

<p>Between March 23 and 29, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products:</p>

<ul><li>Ubuntu 14.04 LTS</li>
	<li>Ubuntu 16.04 LTS</li>
	<li>Ubuntu 18.04 LTS</li>
	<li>Ubuntu 20.04 LTS</li>
	<li>Ubuntu 22.04 LTS</li>
	<li>Ubuntu 24.04 LTS</li>
	<li>Ubuntu 25.10</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web link provided and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055"/><title><![CDATA[AL26-006 - Vulnerability impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2026-3055]]></title><updated>2026-03-30T15:06:04Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7460" about="/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Number:</strong> AL26-006<br /><strong>Date:</strong> March 30, 2026</p>

<h2>Audience</h2>

<p>This Alert is intended for <abbr title="information technology">IT</abbr> professionals and managers.</p>

<h2>Purpose</h2>

<p>An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.</p>

<h2>Details</h2>

<p>The Cyber Centre is aware of a critical vulnerability impacting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>NetScaler ADC is an application delivery and security platform designed to optimize the performance, security, and scalability of applications.</p>

<p>NetScaler Gateway is a secure remote access solution developed by Citrix that provides single sign-on (SSO) capabilities for applications, enhancing user experience and security.</p>

<p>In response to the vendor advisory released on March 23, 2026, the Cyber Centre released AV26-267 on March 23, <span class="nowrap">2026<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>.</span></p>

<p>Tracked as CVE-2026-3055<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>, this vulnerability is an insufficient input validation vulnerability (CWE-125)<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup> leading to a memory overread allowing a remote, unauthenticated attacker to access sensitive information stored in memory. Pre-conditions for this vulnerability are that the NetScaler ADC or NetScaler Gateway must be configured as a SAML IdP (Security Assertion Markup Language Identity Provider).</p>

<p>Further information about the impacted configurations of your appliance can be found in the Citrix advisory<sup id="fn1a-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>This Alert only applies to customer-managed NetScaler ADC and NetScaler Gateway. The Citrix Cloud Software Group has already upgraded Citrix-managed cloud services and Citrix-managed Adaptive Authentication instances with the necessary software updates related to these vulnerabilities.</p>

<p>The Cyber Centre has observed open-source reporting indicating that the vulnerability is being exploited in the wild since March 27, 2026<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>.</p>

<h2>Suggested actions</h2>

<p>The Cyber Centre recommends that organizations using Citrix NetScaler ADC and NetScaler Gateway appliances (particularly for SAML IDP-configured appliances), review the Citrix security bulletin<sup id="fn1b-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> and update or upgrade the affected systems to the following versions:</p>

<ul><li>NetScaler ADC and NetScaler Gateway 14.1-60.58 and later releases of 14.1</li>
	<li>NetScaler ADC and NetScaler Gateway 13.1-62.23 and later releases of 13.1</li>
	<li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.262 and later releases of 13.1-FIPS and 13.1-NDcPP</li>
</ul><p>Citrix has provided steps to take if NetScaler ADC or NetScaler Gateway are suspected to be compromised<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup>, which includes:</p>

<ul><li>Preserve evidence.</li>
	<li>If possible, avoid switching off the machine in order to preserve the traces needed for investigations.</li>
	<li>Completely isolate the machine concerned from the network, both from the Internet and from the internal network, in order to limit the risk of further unauthorized access and lateral movement.</li>
	<li>Revoke credentials and access.</li>
	<li>Examine all servers and systems to which the NetScaler ADC had connected for signs of compromise.</li>
	<li>Rebuild and restore.</li>
	<li>Rotate restored secrets.</li>
	<li>Harden the device.</li>
</ul><p>In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 <abbr title="information technology">IT</abbr> Security Actions with an emphasis on the following topics<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup>.</p>

<ul><li>Patch operating systems and applications</li>
	<li>Harden operating systems and applications</li>
	<li>Isolate web-facing applications</li>
</ul><p>Should activity matching the content of this alert be discovered, recipients are encouraged to report via <a href="/en/incident-management">My Cyber Portal</a> or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<h2>References</h2>

<aside class="wb-fnote" role="note"><dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p><a href="https://support.citrix.com/external/article/CTX696300/netscaler-adc-and-netscaler-gateway-secu.html">NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368</a></p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p><a href="/en/alerts-advisories/citrix-security-advisory-av26-267">AV26-267 – Citrix security advisory</a></p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3055">CVE-2026-3055 Detail</a></p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p><a href="https://cwe.mitre.org/data/definitions/125.html">CWE-125: Out-of-bounds Read</a></p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p><a href="https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2/">Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)</a></p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694799">Citrix – Steps to Take if NetScaler ADC is Suspected to be Compromised</a></p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 <abbr title="information technology">IT</abbr> security actions to protect Internet connected networks and information (ITSM.10.089)</a></p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-295</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-295"/><title><![CDATA[Dell security advisory (AV26-295)]]></title><updated>2026-03-30T14:59:12Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7462" about="/en/alerts-advisories/dell-security-advisory-av26-295" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-295<br /><strong>Date: </strong>March 30, 2026</p>

<p>Between March 23 and 29, 2026, Dell published security advisories to address vulnerabilities in multiple products:</p>

<ul><li>APEX Cloud Platform for Red Hat OpenShift – multiple versions</li>
<li>APEX Cloud Platforms Solution Offerings – multiple versions</li>
<li>APEX – multiple versions</li>
<li>Dell Secure Connect Gateway Appliance – versions prior to 5.34.00.16</li>
<li>Dell Storage Monitoring and Reporting – versions prior to 6.0.0.2</li>
<li>Dell Storage Resource Manager – versions prior to 6.0.0.2</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.dell.com/support/kbdoc/en-ca/000443243/dsa-2026-152-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities">DSA-2026-152: Dell Secure Connect Gateway Security Update for Multiple Third-Party Component Vulnerabilities.</a></li>
	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000443791/dsa-2026-111-dell-storage-resource-manager-srm-and-dell-storage-monitoring-and-reporting-smr-security-update-for-multiple-third-party-component-vulnerabilities">DSA-2026-111: Dell Storage Resource Manager (SRM) and Dell Storage Monitoring and Reporting (SMR) Security Update for Multiple Third-Party Component Vulnerabilities</a></li>
  	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000444451/dsa-2026-151-security-update-for-dell-apex-cloud-platform-for-red-hat-openshift-for-multiple-third-party-component-vulnerabilities">DSA-2026-151: Security Update for Dell APEX Cloud Platform for Red Hat OpenShift for Multiple Third-Party Component Vulnerabilities</a></li>
	<li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-294</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-294"/><title><![CDATA[IBM security advisory (AV26-294)]]></title><updated>2026-03-30T14:38:59Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7461" about="/en/alerts-advisories/ibm-security-advisory-av26-294" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-294<br /><strong>Date: </strong>March 30, 2026</p>

<p>Between March 23 and 29, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p>

<ul><li>Communications Server for AIX – version 6.4</li>
<li>Communications Server for Data Center Deployment – versions 7.0 to 7.1</li>
<li>Communications Server for Linux on System z – version 6.4</li>
<li>Communications Server for Linux – version 6.4</li>
<li>DataPower Operations Dashboard – versions 1.0.23.1 to 1.0.23.2</li>
<li>DataStage on Cloud Pak for Data – version 5.3.1</li>
<li>IBM App Connect Enterprise Certified Containers Operands – multiple versions</li>
<li>IBM App Connect Enterprise – versions 12.0.1.0 to 12.0.12.23</li>
<li>IBM App Connect Enterprise – versions 13.0.1.0 to 13.0.6.2</li>
<li>IBM App Connect Operator – multiple versions</li>
<li>IBM CICS TX Standard – version 11.1</li>
<li>IBM Common Licensing – multiple versions</li>
<li>IBM DevOps Release – versions 7.0.0 to 7.0.0.5</li>
<li>IBM Event Endpoint Management – versions 11.0.0 to 11.7.2</li>
<li>IBM Industry Solutions Workbench – version 5.0.0.0 and 5.1.0.0</li>
<li>IBM InfoSphere Optim Archive Viewer – versions 11.7 FixPack09 to 11.7 FixPack12</li>
<li>IBM Knowledge Catalog Standard Cartridge – multiple versions</li>
<li>IBM MQ Operator – multiple versions</li>
<li>IBM Security QRadar Log Management AQL Plugin – versions 1.0.0 to 1.1.3</li>
<li>IBM SPSS Modeler – multiple versions</li>
<li>IBM Storage Protect Operations Center – version 8.2.0</li>
<li>IBM WebSphere Automation – versions 1.11.0 to 1.11.1</li>
<li>IBM supplied MQ Advanced container images – multiple versions</li>
<li>IBM watsonx Code Assistant On Prem – multiple versions</li>
<li>IBM webMethods BPM – version 11.1 and 10.15</li>
<li>InfoSphere Information Server – versions 11.7.0.0 to 11.7.1.6</li>
<li>SOAR App Host – multiple versions</li>
<li>Sterling Connect:Direct FTP+ – versions 1.3.0.0 to 1.3.0.3</li>
<li>UCB - IBM UrbanCode Build – version 6.1.7 to 6.1.7.9</li>
<li>UCR - IBM UrbanCode Release – versions 6.2.5 to 6.2.5.11</li>
<li>WebSphere Extreme Scale – version 8.6.1.0 to 8.6.1</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/">IBM Product Security Incident Response</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-096</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-096"/><title><![CDATA[Fortinet security advisory (AV26-096) – Update 1]]></title><updated>2026-03-30T13:46:32Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7248" about="/en/alerts-advisories/fortinet-security-advisory-av26-096" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-096<br /><strong>Date: </strong>February 9, 2026<br /><strong>Updated: </strong>March 30, 2026</p>

<p>On February 6, 2026, Fortinet published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>FortiClientEMS 7.4 – version 7.4.4</li>
</ul><h2 class="h3">Update 1</h2>

<p class="mrgn-bttm-md">Open-source reporting indicates that CVE-2026-21643 is being exploited in the wild.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.fortiguard.com/psirt/FG-IR-25-1142">SQLi in administrative interface – FG-IR-25-1142 (CVE-2026-21643)</a></li>
	<li><a href="https://cwe.mitre.org/data/definitions/89.html">CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')</a></li>
	<li><a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">Fortinet PSIRT Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/f5-security-advisory-av25-669</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/f5-security-advisory-av25-669"/><title><![CDATA[F5 security advisory (AV25-669) - Update 1]]></title><updated>2026-03-27T19:56:34Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6893" about="/en/alerts-advisories/f5-security-advisory-av25-669" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV25-669<br /><strong>Date: </strong>October 15, 2025<br /><strong>Updated: </strong>March 27, 2026</p>

<p>On October 15, 2025, F5 published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>BIG-IP (all modules) – versions 17.5.0 to 17.5.1, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP AFM – version 17.5.0, versions 17.1.0 to 17.1.2, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP APM – versions 17.5.0 to 17.5.1, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP APM, APM with SWG, SSL Orchestrator, SSL Orchestrator with SWG – version 17.5.0, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP ASM – versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.5</li>
	<li>BIG-IP Advanced WAF/ASM – versions 17.5.0 to 17.5.1, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP Next CNF – versions 2.0.0 to 2.1.0, versions 1.1.0 to 1.4.1</li>
	<li>BIG-IP Next SPK – versions 2.0.0 to 2.1.0, versions 1.7.0 to 1.9.2</li>
	<li>BIG-IP Next for Kubernetes – versions 2.0.0 to 2.1.0</li>
	<li>BIG-IP PEM – version 17.5.0, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP SSL Orchestrator – version 17.5.0, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.5, versions 15.1.0 to 15.1.10</li>
	<li>F5OS-A – versions 1.8.0 to 1.8.1, versions 1.5.1 to 1.5.3</li>
	<li>F5OS-C – version 1.8.0 to 1.8.1, versions 1.6.0 to 1.6.2</li>
	<li>NGINX App Protect WAF – versions 4.5.0 to 4.6.0</li>
</ul><p>On October 15, 2025, F5 also published security incident K000154696 advising that threat actors exfiltrated files from BIG-IP products and they are not aware of active exploitation of any undisclosed F5 vulnerabilities.</p>

<h2 class="h3">Update 1</h2>

<p>F5 indicates that CVE-2025-53521 has been exploited.</p>

<p>On March 27, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-53521 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-tp-lg">The Cyber Centre encourages users/administrators to review the links provided below, to identify F5 BIG-IP products, evaluate and address any potential compromise on any networked managed interface exposed to the public internet and apply F5 security updates.</p>

<ul class="list-unstyled"><li><a href="https://my.f5.com/manage/s/article/K000156741">K000156741: BIG-IP APM vulnerability CVE-2025-53521</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K000160486">K000160486: Indicators of Compromise for c05d5254</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521">CISA KEV: CVE-2025-53521</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K000154696">K000154696: F5 Security Incident</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K53108777">K53108777: Hardening your F5 system</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K000156572">F5 Quarterly Security Notification (October 2025)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-293</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-293"/><title><![CDATA[Microsoft Edge security advisory (AV26-293)]]></title><updated>2026-03-27T18:20:56Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7458" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-293" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-293<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 26, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p>

<ul><li>Microsoft Edge Stable Channel – versions prior to 146.0.3856.84</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#march-26-2026">Microsoft Edge Stable Channel Release Notes</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ericsson-security-advisory-av26-292</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ericsson-security-advisory-av26-292"/><title><![CDATA[Ericsson security advisory (AV26-292)]]></title><updated>2026-03-27T14:54:54Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7457" about="/en/alerts-advisories/ericsson-security-advisory-av26-292" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-292<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 25, 2026, Ericsson published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Ericsson Indoor Connect 8855 – versions prior to 2025.Q3</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates if available.</p>

<ul class="list-unstyled"><li><a href="https://www.ericsson.com/en/about-us/security/psirt/security-bulletin-indoorconnect-march-2026">Security Bulletin – Ericsson Indoor Connect 8855, March, 2026</a></li>
	<li><a href="https://www.ericsson.com/en/about-us/security/security-bulletins">Ericsson Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-291</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-291"/><title><![CDATA[FreeBSD security advisory (AV26-291)]]></title><updated>2026-03-27T14:50:17Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7456" about="/en/alerts-advisories/freebsd-security-advisory-av26-291" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-291<br /><strong>Date: </strong>March 27, 2026</p>

<p>Between March 25 and 26, 2026, FreeBSD published security advisories to address vulnerabilities in the following products:</p>

<ul><li>FreeBSD – version 14.x</li>
	<li>FreeBSD – version 15.0</li>
	<li>FreeBSD – version 13.5</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:06.tcp.asc">TCP: remotely exploitable DoS vector (mbuf leak) (CVE-2026-4247)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:07.nvmf.asc">Remote denial of service via null pointer dereference (CVE-2026-4652)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc">Remote code execution via RPCSEC_GSS packet validation (CVE-2026-4747)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:09.pf.asc">pf silently ignores certain rules (CVE-2026-4748)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/">FreeBSD Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av26-290</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av26-290"/><title><![CDATA[[Control systems] Siemens security advisory (AV26-290) ]]></title><updated>2026-03-27T14:44:21Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7455" about="/en/alerts-advisories/control-systems-siemens-security-advisory-av26-290" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-290<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 26, 2026, Siemens published a security advisory to address vulnerabilities in the following products. Included were updates for the following products:</p>

<ul><li>CPCI85 Central Processing/Communication – versions prior to V26.10</li>
	<li>RTUM85 RTU Base – versions prior to V26.10</li>
	<li>SICORE Base system – versions prior to V26.10.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web links provided, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://cert-portal.siemens.com/productcert/html/ssa-246443.html">SSA-246443: Multiple Vulnerabilities in SICAM 8 Products</a></li>
	<li><a href="https://www.siemens.com/global/en/products/services/cert.html#SecurityPublications">Siemens Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry></feed>