<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><id>https://cyber.gc.ca/api/cccs/atom/v1/get?feed=alerts_advisories&amp;lang=en</id><link rel="self" href="https://cyber.gc.ca/api/cccs/atom/v1/get?feed=alerts_advisories&amp;lang=en"/><title>Alerts and advisories</title><updated>2026-04-23T19:54:03Z</updated><entry><id>https://cyber.gc.ca/en/alerts-advisories/tenable-security-advisory-av26-387</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/tenable-security-advisory-av26-387"/><title><![CDATA[Tenable security advisory (AV26-387)]]></title><updated>2026-04-23T19:54:03Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7597" about="/en/alerts-advisories/tenable-security-advisory-av26-387" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-387<br /><strong>Date:</strong> April 23, 2026</p>

<p class="mrgn-bttm-md">On April 23, 2026, Tenable published a security advisory to address a vulnerability in the following products:</p>

<ul><li>Nessus Agent – versions prior to 11.1.3</li>
	<li>Nessus – versions prior to 10.11.4 and versions prior to 10.12.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.tenable.com/security/tns-2026-12">[R1] Nessus Agent Version 11.1.3 Fixes Arbitrary File Deletion</a></li>
	<li><a href="https://www.tenable.com/security/tns-2026-13">[R1] Nessus Versions 10.11.4 and 10.12.0 Fixes Arbitrary File Deletion</a></li>
	<li><a href="https://www.tenable.com/security">Tenable Product Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-386</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-386"/><title><![CDATA[Spring security advisory (AV26-386)]]></title><updated>2026-04-23T19:41:34Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7596" about="/en/alerts-advisories/spring-security-advisory-av26-386" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-386<br /><strong>Date: </strong>April 23, 2026</p>

<p>On April 23, 2026, Spring published security advisories to address vulnerabilities in multiple products. Included was a critical update for the following:</p>

<ul><li>Spring Boot – 4.0.x versions prior to 4.0.6</li>
	<li>Spring Boot – 3.5.x versions prior to 3.5.14</li>
	<li>Spring Boot – 3.4.x versions prior to 3.4.16</li>
	<li>Spring Boot – 3.3.x versions prior to 3.3.19</li>
	<li>Spring Boot – 2.7.x versions prior to 2.7.33</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://spring.io/security">Spring Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363"/><title><![CDATA[AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices – CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363 – Update 1]]></title><updated>2026-04-23T18:35:01Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6833" about="/en/alerts-advisories/al25-012-vulnerabilities-impacting-cisco-asa-ftd-devices-cve-2025-20333-cve-2025-20362-cve-2025-20363" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Number:</strong> AL25-012<br /><strong>Date:</strong> September 25, 2025<br /><strong>Updated:</strong> April 23, 2026</p>

<h2>Audience</h2>

<p>This Alert is intended for <abbr title="information technology">IT</abbr> professionals and managers of notified organizations.</p>

<h2>Purpose</h2>

<p>An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.</p>

<h2>Details</h2>

<p>The Canadian Centre for Cyber Security (Cyber Centre) is aware of exploitation targeting Cisco Adaptive Security Appliance (ASA) 5500-X Series devices that are running Cisco Secure Firewall ASA Software with VPN web services enabled.</p>

<p>On September 25, 2025, Cisco published security advisories for critical vulnerabilities, CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363, affecting the following ASA and Cisco Secure Firewall Threat Defense (FTD) software release products:</p>

<ul><li>Cisco ASA software release 9.12 – versions prior to 9.12.4.72</li>
	<li>Cisco ASA software release 9.14 – versions prior to 9.14.4.28</li>
	<li>Cisco ASA software release 9.16 – versions prior to 9.16.4.85</li>
	<li>Cisco ASA software release 9.17 – versions prior to 9.17.1.45</li>
	<li>Cisco ASA software release 9.18 – versions prior to 9.18.4.67</li>
	<li>Cisco ASA software release 9.19 – versions prior to 9.19.1.42</li>
	<li>Cisco ASA software release 9.20 – versions prior to 9.20.4.10</li>
	<li>Cisco ASA software release 9.22 – versions prior to 9.22.2.14</li>
	<li>Cisco ASA software release 9.23 – versions prior to 9.23.1.19<br />
	 </li>
	<li>Cisco FTD software release 7.0 – versions prior to 7.0.8.1</li>
	<li>Cisco FTD software release 7.1 – all versions</li>
	<li>Cisco FTD software release 7.2 – versions prior to 7.2.10.2</li>
	<li>Cisco FTD software release 7.3 – all versions</li>
	<li>Cisco FTD software release 7.4 – versions prior to 7.4.2.4</li>
	<li>Cisco FTD software release 7.6 – versions prior to 7.6.2.1</li>
	<li>Cisco FTD software release 7.7 – versions prior to 7.7.10.1</li>
</ul><p>For further details on affected versions and available fixed releases, please refer to the following Cisco advisories<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup><sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup><sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>.</p>

<p>CVE-2025-20333 is a vulnerability affecting the ASA and FTD software, that could allow an authenticated remote threat actor to execute arbitrary code on affected devices<sup id="fn1a-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>CVE-2025-20362 is a vulnerability affecting the ASA and FTD software, that could allow an unauthenticated remote threat actor to access URL endpoints that should otherwise be inaccessible without authentication<sup id="fn2a-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>.</p>

<p>CVE-2025-20363 is a vulnerability affecting the ASA, FTD, Cisco IOS, Cisco IOS XE and Cisco IOS XR software, that could allow an unauthenticated remote threat actor (ASA and FTD) or authenticated remote one (Cisco IOS, IOS XE and IOS XR) with low user privileges to execute arbitrary code on affected devices<sup id="fn3a-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>.</p>

<p>All these vulnerabilities are due to improper validation of user supplied input in HTTP(S) requests.</p>

<p>In response to these vulnerabilities, the Cyber Centre released AV25-619 on September 25<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup>.</p>

<h3>Update 1</h3>

<p>On April 23, 2026, Cisco Talos released a blog post <sup id="fn8-rf"><a class="fn-lnk" href="#fn8"><span class="wb-inv">Footnote </span>8</a></sup> and Cisco published a security advisory <sup id="fn9-rf"><a class="fn-lnk" href="#fn9"><span class="wb-inv">Footnote </span>9</a></sup> identifying a previously unknown persistence method that remains intact even after upgrading to a patched version released in September 2025. The persistence mechanism is embedded in the Cisco Firepower eXtensible Operating System (FXOS) Software base operating system for Cisco Secure Firewall ASA Software and Cisco Secure FTD Software installations on the affected hardware.</p>

<p>The Cybersecurity and Infrastructure Security Agency (CISA) created the Emergency Directive document V1: ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices <sup id="fn10-rf"><a class="fn-lnk" href="#fn10"><span class="wb-inv">Footnote </span>10</a></sup> and along with the United Kingdom National Cyber Security Centre (NCSC), published a FIRESTARTER Backdoor Malware Analysis Report <sup id="fn11-rf"><a class="fn-lnk" href="#fn11"><span class="wb-inv">Footnote </span>11</a></sup> on April 23, 2026.</p>

<p>The Cyber Centre recommends organizations review the Cisco advisory, identify if indicators of compromise are present on their devices, and apply the identified workarounds, including reimaging the device to a known fixed version.</p>

<p>Affected products and versions:</p>

<p>Secure Firewall ASA Software</p>

<ul><li>Cisco ASA software release 9.16 – versions prior to 9.16.4.92</li>
	<li>Cisco ASA software release 9.18 – versions prior to 9.18.4.135</li>
	<li>Cisco ASA software release 9.20 – versions prior to 9.20.4.30</li>
	<li>Cisco ASA software release 9.22 – versions prior to 9.22.3.5</li>
	<li>Cisco ASA software release 9.23 – versions prior to 9.23.1.195</li>
	<li>Cisco ASA software release 9.24 – versions prior to 9.24.1.155</li>
</ul><p>Secure FTD Software</p>

<ul><li>Cisco FTD software release 7.0 – versions prior to 7.0.9 Hotfix FZ-7.0.9.1-3</li>
	<li>Cisco FTD software release 7.2 – versions prior to 7.2.11 Hotfix HI-7.2.11.1-1</li>
	<li>Cisco FTD software release 7.4 – versions prior to 7.4.7</li>
	<li>Cisco FTD software release 7.6 – versions prior to 7.6.4 Hotfix CC-7.6.4.1-1</li>
	<li>Cisco FTD software release 7.7 – versions prior to 7.7.11 Hotfix AE-7.7.11.1-4</li>
	<li>Cisco FTD software release 10 – versions prior to 10.0.0 Hot Fix <strong>(Target 4/30/2026)</strong></li>
</ul><p>Firepower 4100 and 9300 Security Appliance</p>

<ul><li>Cisco Firepower 4100 and 9300 Security Appliance 2.10 – versions prior to 2.10.1.383</li>
	<li>Cisco Firepower 4100 and 9300 Security Appliance 2.12 – versions prior to 2.12.1.117</li>
	<li>Cisco Firepower 4100 and 9300 Security Appliance 2.14 – versions prior to 2.14.3.125</li>
	<li>Cisco Firepower 4100 and 9300 Security Appliance 2.16 – versions prior to 2.16.2.119</li>
	<li>Cisco Firepower 4100 and 9300 Security Appliance 2.17 – versions prior to 2.17.0.549</li>
	<li>Cisco Firepower 4100 and 9300 Security Appliance 2.18 – versions prior to 2.18.0.535</li>
</ul><p>End of Update 1</p>

<h2>Suggested actions</h2>

<p>The Cyber Centre strongly recommends that organizations running Cisco ASA and FTD products upgrading to a fixed release software version<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>.</p>

<p>Organizations upgrading an ASA 5500-X Series model to 9.12.4.72 or 9.14.4.28 should refer to Cisco’s Bootloader and/or ROMMON Verification Failure procedures<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup>. If the “firmware-update.log” file is found on “disk0:” after upgrading to a fixed release, organizations are encouraged to preserve the log file and notify the Cyber Centre using the contact information below. Instructions regarding transfer of the log file will be provided as part of the follow-up engagement.</p>

<p>In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 IT Security Actions<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup>.</p>

<p>If activity matching the content of this alert is discovered, recipients are encouraged to report via the <a href="https://www.cyber.gc.ca/en/incident-management">My Cyber Portal</a>, or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<h2>References</h2>

<aside class="wb-fnote" role="note"><dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB">Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution Vulnerability</a></p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 2</dt>
	<dd id="fn2">
	<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW">Cisco Secure Firewall Adaptive Security Appliance, Secure Firewall Threat Defense Software, IOS Software, IOS XE Software and IOS XR Software HTTP Server Remote Code Execution Vulnerability</a></p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 3</dt>
	<dd id="fn3">
	<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O">Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Server Unauthorized Access Vulnerability</a></p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 4</dt>
	<dd id="fn4">
	<p><a href="/en/alerts-advisories/cisco-security-advisory-av25-619">AV25-619 Cisco Security Advisory</a></p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 5</dt>
	<dd id="fn5">
	<p><a href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks">Cisco Event Response: Continued Attacks Against Cisco Firewalls</a></p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 6</dt>
	<dd id="fn6">
	<p><a href="https://sec.cloudapps.cisco.com/security/center/resources/detection_guide_for_continued_attacks">Detection Guide for Continued Attacks against Cisco Firewalls by the Threat Actor behind ArcaneDoor</a></p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 7</dt>
	<dd id="fn7">
	<p><a data-entity-substitution="canonical" data-entity-type="node" data-entity-uuid="79b2a2c3-ad1e-49b5-9ca5-5f2f54757b2e" href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT security actions to protect Internet connected networks and information (ITSM.10.089)</a></p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 8</dt>
	<dd id="fn8">
	<p><a href="https://blog.talosintelligence.com/uat-4356-firestarter/">UAT-4356's Targeting of Cisco Firepower Devices</a></p>

	<p class="fn-rtn"><a href="#fn8-rf"><span class="wb-inv">Return to footnote</span>8<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 9</dt>
	<dd id="fn9">
	<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-CISAED25-03">Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense</a></p>

	<p class="fn-rtn"><a href="#fn9-rf"><span class="wb-inv">Return to footnote</span>9<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 10</dt>
	<dd id="fn10">
	<p><a href="https://www.cisa.gov/news-events/directives/v1-ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices">V1: ED 25-03: Identify and Mitigate Potential Compromise of Cisco Devices</a></p>

	<p class="fn-rtn"><a href="#fn10-rf"><span class="wb-inv">Return to footnote</span>10<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl><dl><dt>Footnote 11</dt>
	<dd id="fn11">
	<p><a href="https://www.cisa.gov/news-events/analysis-reports/ar26-113a">CISA – Malware Analysis Report – FIRESTARTER Backdoor</a></p>

	<p class="fn-rtn"><a href="#fn11-rf"><span class="wb-inv">Return to footnote</span>11<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/crowdstrike-security-advisory-av26-384</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/crowdstrike-security-advisory-av26-384"/><title><![CDATA[CrowdStrike security advisory (AV26-384)]]></title><updated>2026-04-23T16:03:35Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7595" about="/en/alerts-advisories/crowdstrike-security-advisory-av26-384" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-384<br /><strong>Date:</strong> April 23, 2026</p>

<p><strong>CrowdStrike security</strong><strong> advisory (AV26-384)</strong></p>

<p class="mrgn-bttm-md">On April 21, 2026, CrowdStrike published a security advisory to address a critical vulnerability in the following products:</p>

<ul><li>LogScale Self-Hosted – GA versions 1.224.0 to 1.234.0 (inclusive)</li>
	<li>LogScale Self-Hosted LTS – versions 1.228.0 and 1.228.1</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.crowdstrike.com/en-us/security-advisories/cve-2026-40050/">CVE-2026-40050 — CrowdStrike LogScale Unauthenticated Path Traversal</a></li>
	<li><a href="https://www.crowdstrike.com/en-us/security-advisories/">Crowdstrike Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/github-security-advisory-av26-383</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/github-security-advisory-av26-383"/><title><![CDATA[GitHub security advisory (AV26-383)]]></title><updated>2026-04-23T15:52:03Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7594" about="/en/alerts-advisories/github-security-advisory-av26-383" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-383<br /><strong>Date:</strong> April 23, 2026</p>

<p class="mrgn-bttm-md">On April 21, 2026, GitHub published security advisories to address vulnerabilities in the following products:</p>

<ul><li>GitHub Enterprise Server – versions 3.20.x prior to 3.20.1</li>
	<li>GitHub Enterprise Server – versions 3.19.x prior to 3.19.5</li>
	<li>GitHub Enterprise Server – versions 3.18.x prior to 3.18.8</li>
	<li>GitHub Enterprise Server – versions 3.17.x prior to 3.17.14</li>
	<li>GitHub Enterprise Server – versions 3.16.x prior to 3.16.17</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="#https://docs.github.com/en/enterprise-server@3.20/admin/release-notes">Enterprise Server 3.20.1</a></li>
	<li><a href="#https://docs.github.com/en/enterprise-server@3.19/admin/release-notes">Enterprise Server 3.19.5</a></li>
	<li><a href="#https://docs.github.com/en/enterprise-server@3.18/admin/release-notes">Enterprise Server 3.18.8</a></li>
	<li><a href="#https://docs.github.com/en/enterprise-server@3.17/admin/release-notes">Enterprise Server 3.17.14</a></li>
	<li><a href="#https://docs.github.com/en/enterprise-server@3.16/admin/release-notes">Enterprise Server 3.16.17</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-382</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-382"/><title><![CDATA[Google Chrome security advisory (AV26-382)]]></title><updated>2026-04-23T14:55:13Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7593" about="/en/alerts-advisories/google-chrome-security-advisory-av26-382" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-382<br /><strong>Date:</strong> April 23, 2026</p>

<p class="mrgn-bttm-md">On April 22, 2026, Google published a security advisory to address vulnerabilities in the following product:</p>

<ul><li><span lang="en" xml:lang="en" xml:lang="en">Stable Channel Chrome for Desktop</span> – versions prior to 147.0.7727.116/117 (Windows/Mac) and 147.0.7727.116 (Linux)</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="#https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_22.html">Google Chrome Security Advisory</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-april-2026-monthly-rollup-av26-352</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-april-2026-monthly-rollup-av26-352"/><title><![CDATA[Microsoft security advisory – April 2026 monthly rollup (AV26-352) - Update 2]]></title><updated>2026-04-22T19:51:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7557" about="/en/alerts-advisories/microsoft-security-advisory-april-2026-monthly-rollup-av26-352" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-352<br /><strong>Date: </strong>April 14, 2026<br /><strong>Updated: </strong>April 22, 2026</p>

<p>On April 14, 2026, Microsoft published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following products:</p>

<ul><li>.NET 10.0 installed on Linux</li>
	<li>.NET 10.0 installed on Mac OS</li>
	<li>.NET 10.0 installed on Windows</li>
	<li>.NET 8.0 installed on Linux</li>
	<li>.NET 8.0 installed on Mac OS</li>
	<li>.NET 8.0 installed on Windows</li>
	<li>.NET 9.0 installed on Linux</li>
	<li>.NET 9.0 installed on Mac OS</li>
	<li>.NET 9.0 installed on Windows</li>
	<li>Azure Logic Apps</li>
	<li>Azure Monitor Agent</li>
	<li>Microsoft .NET Framework</li>
	<li>Microsoft .NET Framework 3.5 AND 4.8.1</li>
	<li>Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2</li>
	<li>Microsoft 365 Apps for Enterprise</li>
	<li>Microsoft Defender Antimalware Platform</li>
	<li>Microsoft Dynamics 365</li>
	<li>Microsoft Excel 2016</li>
	<li>Microsoft HPC Pack 2019</li>
	<li>Microsoft Office 2016</li>
	<li>Microsoft Office 2019</li>
	<li>Microsoft Office LTSC 2021</li>
	<li>Microsoft Office LTSC 2024</li>
	<li>Microsoft Office LTSC for Mac 2021</li>
	<li>Microsoft Office LTSC for Mac 2024</li>
	<li>Microsoft Power Apps</li>
	<li>Microsoft PowerPoint 2016</li>
	<li>Microsoft SQL Server 2016</li>
	<li>Microsoft SQL Server 2017</li>
	<li>Microsoft SQL Server 2019</li>
	<li>Microsoft SQL Server 2022</li>
	<li>Microsoft SQL Server 2025</li>
	<li>Microsoft SharePoint Enterprise Server 2016</li>
	<li>Microsoft SharePoint Server 2019</li>
	<li>Microsoft SharePoint Server Subscription Edition</li>
	<li>Microsoft Visual Studio 2022</li>
	<li>Microsoft Visual Studio Code CoPilot Chat Extension</li>
	<li>Office Online Server</li>
	<li>PowerShell</li>
	<li>Remote Desktop client for Windows Desktop</li>
	<li>Windows 10</li>
	<li>Windows 11</li>
	<li>Windows Admin Center</li>
	<li>Windows App Client for Windows Desktop</li>
	<li>Windows Server 2012</li>
	<li>Windows Server 2012 R2</li>
	<li>Windows Server 2016</li>
	<li>Windows Server 2019</li>
	<li>Windows Server 2022</li>
	<li>Windows Server 2025</li>
</ul><p>Microsoft has received reports that CVE-2026-32201 has been exploited.</p>

<p>On April 14, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-32201 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<h2 class="h3">Update 1</h2>

<p>Open-source reporting indicates that the CVE-2026-33825 vulnerability is being exploited in the wild.</p>

<h2 class="h3">Update 2</h2>

<p>On April 22, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-33825 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Apr">April 2026 Security Updates</a></li>
	<li><a href="https://msrc.microsoft.com/update-guide/en-us">Security Update Guide</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-32201">CISA KEV: CVE-2026-32201</a></li>
	<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825">CVE-2026-33825 Detail</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33825">CISA KEV: CVE-2026-33825</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av26-381</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av26-381"/><title><![CDATA[Apple security advisory (AV26-381)]]></title><updated>2026-04-22T19:30:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7591" about="/en/alerts-advisories/apple-security-advisory-av26-381" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-381<br /><strong>Date:</strong> April 22, 2026</p>

<p>On April 22, 2026, Apple published security updates to address vulnerabilities in the following products:</p>

<ul><li>iOS and iPadOS – versions prior to 18.7.8 and versions prior to 26.4.2</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.apple.com/en-us/127002">About the security content of iOS 26.4.2 and iPadOS 26.4.2</a></li>
	<li><a href="https://support.apple.com/en-us/127003">About the security content of iOS 18.7.8 and iPadOS 18.7.8</a></li>
	<li><a href="https://support.apple.com/en-us/100100">Apple Security Updates</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/oracle-security-advisory-april-2026-quarterly-rollup-av26-380</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/oracle-security-advisory-april-2026-quarterly-rollup-av26-380"/><title><![CDATA[Oracle security advisory – April 2026 quarterly rollup (AV26-380)]]></title><updated>2026-04-22T17:50:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7589" about="/en/alerts-advisories/oracle-security-advisory-april-2026-quarterly-rollup-av26-380" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-380<br /><strong>Date:</strong> April 22, 2026</p>

<p class="mrgn-bttm-md">On April 21, 2026, Oracle published a security advisory to address vulnerabilities in multiple products. Included were critical updates for the following:</p>

<ul><li>MySQL Enterprise Backup</li>
	<li>MySQL Server</li>
	<li>MySQL Workbench</li>
	<li>Oracle Advanced Inbound Telephony</li>
	<li>Oracle Banking Origination</li>
	<li>Oracle Business Intelligence Enterprise Edition</li>
	<li>Oracle Communications Cloud Native Core Network Exposure Function</li>
	<li>Oracle Communications EAGLE</li>
	<li>Oracle Communications EAGLE Application Processor</li>
	<li>Oracle Communications EAGLE LNP Application Processor</li>
	<li>Oracle Communications LSMS</li>
	<li>Oracle Communications Messaging Serve</li>
	<li>Oracle Communications Operations Monitor</li>
	<li>Oracle Communications Policy Management</li>
	<li>Oracle Communications Unified Assurance</li>
	<li>Oracle Managed File Transfer</li>
	<li>Oracle Tuxedo</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.oracle.com/security-alerts/cpuapr2026.html"><span lang="en" xml:lang="en" xml:lang="en">Oracle Critical Patch Update Advisory – April</span> 2026</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/n8n-security-advisory-av26-379</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/n8n-security-advisory-av26-379"/><title><![CDATA[n8n security advisory (AV26-379)]]></title><updated>2026-04-22T17:45:00Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7590" about="/en/alerts-advisories/n8n-security-advisory-av26-379" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-379<br /><strong>Date: </strong>April 22, 2026</p>

<p>On April 22, 2026, n8n published security advisories to address vulnerabilities, including some critical ones, in the following products:</p>

<ul><li>n8n (MCP Client Registration) – multiple versions</li>
	<li>n8n (dynamic-node-parameters) – multiple versions</li>
	<li>n8n (XML Node Prototype Pollution) – multiple versions</li>
	<li>n8n (XML Webhook) – multiple versions</li>
	<li>n8n (SQL Mode of Merge Node) – multiple versions</li>
	<li>n8n (MCP OAuth client) – multiple versions</li>
	<li>n8n (Python Task Runner) - multiple versions</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://github.com/n8n-io/n8n/security">n8n Security</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-phoenix-contact-security-advisory-av26-378</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-phoenix-contact-security-advisory-av26-378"/><title><![CDATA[[Control Systems] Phoenix Contact Security Advisory (AV26-378)]]></title><updated>2026-04-22T16:28:53Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7588" about="/en/alerts-advisories/control-systems-phoenix-contact-security-advisory-av26-378" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Number:</strong> AV26-378<br /><strong>Date:</strong> April 22, 2026</p>

<p class="mrgn-bttm-md">On April 22, 2026, Phoenix Contact published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>AXC – multiple versions</li>
	<li>BCP – multiple versions</li>
	<li>CATAN C1 EN – versions prior to1.12.3</li>
	<li>CELLULINK – versions prior to 2025.6.3</li>
	<li>CHARX SEC-3XXX – versions prior to 1.9.0</li>
	<li>CLOUD CLIENT 101T-TX/TX –versions prior to 3.7.8</li>
	<li>Energy AXC PU – – versions prior to V04.27.00.00</li>
	<li>FL MGUARD – versions prior to 10.6.0</li>
	<li>FL NAT – multiple versions</li>
	<li>FL SWITCH – multiple versions</li>
	<li>FL TIMESERVER NTP – versions prior to 5.0.71.101</li>
	<li>FL WLAN – multiple versions</li>
	<li>GTC – multiple versions</li>
	<li>ILC 2xxx – multiple versions</li>
	<li>NFC – multiple versions</li>
	<li>PLCnext Control – versions prior to 3.53</li>
	<li>RFC – multiple versions</li>
	<li>SMART RTU AXC – – multiple versions</li>
	<li>TC CLOUD CLIENT – multiple versions</li>
	<li>TC ROUTER – multiple versions</li>
	<li>TC TIMESERVER NTP – versions prior to 5.0.71.101</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates, once available.</p>

<ul class="list-unstyled"><li><a href="https://assets.phoenixcontact.com/file/929de711-0bf5-461d-8560-b918341524cd/media/original?pcsa-2026-00001_vde-2026-023.pdf">VDE-2026-023: Several products are affected by vulnerabilities found in OpenSSL</a></li>
	<li><a href="https://www.phoenixcontact.com/en-pc/service-and-support/psirt">Phoenix Contact Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-av26-377</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-security-advisory-av26-377"/><title><![CDATA[Microsoft security advisory (AV26-377)]]></title><updated>2026-04-22T14:16:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7587" about="/en/alerts-advisories/microsoft-security-advisory-av26-377" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-377<br /><strong>Date: </strong>April 22, 2026</p>

<p>On April 21, 2026, Microsoft published an out-of-band (OOB) security update to address a critical vulnerability in the following product:</p>

<ul><li>.NET 10.0.0 – versions 10.0.0 to 10.0.6</li>
</ul><p>The Cyber Centre encourages users and administrators to review the web links provided and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://devblogs.microsoft.com/dotnet/dotnet-10-0-7-oob-security-update/">.NET 10.0.7 Out-of-Band Security Update</a></li>
	<li><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372">ASP.NET Core Elevation of Privilege Vulnerability - CVE-2026-40372</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av26-376</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av26-376"/><title><![CDATA[GitLab security advisory (AV26-376)]]></title><updated>2026-04-22T14:03:15Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7586" about="/en/alerts-advisories/gitlab-security-advisory-av26-376" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-376<br /><strong>Date: </strong>April 22, 2026</p>

<p>On April 22, 2026, GitLab published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>GitLab Community Edition (CE) – versions prior to 18.11.1, 18.10.4 and 18.9.6</li>
	<li>GitLab Enterprise Edition (EE) – versions prior to 18.11.1, 18.10.4 and 18.9.6</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://docs.gitlab.com/releases/patches/patch-release-gitlab-18-11-1-released/">GitLab Patch Release: 18.11.1, 18.10.4, 18.9.6</a></li>
	<li><a href="https://about.gitlab.com/releases/categories/releases/">GitLab Releases</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/atlassian-security-advisory-av26-375</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/atlassian-security-advisory-av26-375"/><title><![CDATA[Atlassian security advisory (AV26-375)]]></title><updated>2026-04-21T20:38:05Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7585" about="/en/alerts-advisories/atlassian-security-advisory-av26-375" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-375<br /><strong>Date:</strong> April 21, 2026</p>

<p>On April 21, 2026, Atlassian published a security advisory to address vulnerabilities, including some critical ones, in the following products:</p>

<ul><li>Bamboo Data Center and Server – multiple versions</li>
	<li>Bitbucket Data Center and Server – multiple versions</li>
	<li>Confluence Data Center and Server – multiple versions</li>
	<li>Jira Data Center and Server – multiple versions</li>
	<li>Jira Service Management Data Center and Server – multiple versions</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://confluence.atlassian.com/security/security-bulletin-april-21-2026-1770913890.html">Security Bulletin – April 21 2026</a></li>
	<li><a href="https://www.atlassian.com/trust/security/advisories">Atlassian Security Advisories and Bulletins</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/fortra-security-advisory-av26-374</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/fortra-security-advisory-av26-374"/><title><![CDATA[Fortra security advisory (AV26-374)]]></title><updated>2026-04-21T19:14:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7584" about="/en/alerts-advisories/fortra-security-advisory-av26-374" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-374<br /><strong>Date:</strong> April 21, 2026</p>

<p>On April 21, 2026, Fortra published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Fortra's GoAnywhere MFT – versions prior to 7.10.0</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.fortra.com/security/advisories/product-security/fi-2026-002">FI-2026-002 - GoAnywhere MFT SFTP Service Login Vulnerable to Brute Force Attack Under Certain Circumstances</a></li>
	<li><a href="https://www.fortra.com/security/advisories/product-security/fi-2026-004">FI-2026-004 - GoAnywhere MFT SFTP Service Login Vulnerable to Brute Force Attack Under Certain Circumstances</a></li>
	<li><a href="https://www.fortra.com/security/advisories/product-security">Fortra Product CVEs</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-373</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-373"/><title><![CDATA[Spring security advisory (AV26-373)]]></title><updated>2026-04-21T19:07:06Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7583" about="/en/alerts-advisories/spring-security-advisory-av26-373" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-373<br /><strong>Date:</strong> April 21, 2026</p>

<p class="mrgn-bttm-md">Between April 9 and 21, 2026, Spring published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Spring Cloud Gateway – version 4.2.0</li>
	<li>Spring Security – versions 5.7.0 to 5.7.22, 5.8.0 to 5.8.24, 6.3.0 to 6.3.15, 6.4.0 to 6.4.15, 6.5.0 to 6.5.9 and 7.0.0 to 7.0.4</li>
	<li>Spring Authorization Server – versions 1.3.0 to 1.3.10, 1.4.0 to 1.4.9 and 1.5.0 to 1.5.6</li>
	<li>Spring Framework – versions 5.3.0 to 5.3.47, 6.1.0 to 6.1.26, 6.2.0 to 6.2.17 and 7.0.0 to 7.0.6</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://spring.io/security">Spring Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av26-372</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av26-372"/><title><![CDATA[Mozilla security advisory (AV26-372)]]></title><updated>2026-04-21T15:22:50Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7582" about="/en/alerts-advisories/mozilla-security-advisory-av26-372" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-372<br /><strong>Date:</strong> April 21, 2026</p>

<p class="mrgn-bttm-md">On April 21, 2026, Mozilla published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Firefox – versions prior to 150</li>
	<li>Firefox ESR – versions prior to 35</li>
	<li>Firefox ESR – versions prior to 10</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-32/">Security Vulnerabilities fixed in Firefox ESR 140.10</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-31/">Security Vulnerabilities fixed in Firefox ESR 115.35</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/">Security Vulnerabilities fixed in Firefox 150</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/">Mozilla Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-166</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-166"/><title><![CDATA[Cisco security advisory (AV26-166) – Update 3]]></title><updated>2026-04-20T19:43:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7325" about="/en/alerts-advisories/cisco-security-advisory-av26-166" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p class="mrgn-bttm-md"><strong>Serial number: </strong>AV26-166<br /><strong>Date:</strong> February 25, 2026<br /><strong>Updated:</strong> April 20, 2026</p>

<p>On February 25, 2026, Cisco published security advisories to address critical vulnerabilities in the following products:</p>

<ul><li>Cisco Catalyst SD-WAN Controller – multiple versions</li>
	<li>Cisco Catalyst SD-WAN Manager – multiple versions</li>
	<li>Cisco Nexus 3600 and 9500-R Switching Platform – multiple versions</li>
	<li>Cisco Nexus 9000 Series Fabric Switches – multiple versions</li>
	<li>Cisco UCS Software (UCS Manager Mode) – versions prior to 4.3(6e)</li>
	<li>Cisco UCS Software (Intersight Managed Mode) – versions prior to 4.3(6.260003)</li>
</ul><p>Cisco has indicated that CVE-2026-20127 has been exploited.</p>

<h2 class="h3">Update 1</h2>

<p>On February 25, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-20127 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<h2 class="h3">Update 2</h2>

<p>Cisco has indicated that CVE-2026-20128 and CVE-2026-20122 are being actively exploited.</p>

<h2 class="h3">Update 3</h2>

<p>On April 20, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p>

<ul class="list-unstyled"><li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk">Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v">Cisco Catalyst SD-WAN Vulnerabilities</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ether-dos-Kv8YNWZ4">Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-dsnmp-cNN39Uh">Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cpdos-qLsv6pFD">Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k_aci_lldp_dos-NdgRrrA3">Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-20127">CISA KEV : CVE-2026-20127</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20122">CISA KEV: CVE-2026-20122</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20128">CISA KEV: CVE-2026-20128</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20133">CISA KEV: CVE-2026-20133</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-366</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-366"/><title><![CDATA[Dell security advisory (AV26-366)]]></title><updated>2026-04-20T18:44:11Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7574" about="/en/alerts-advisories/dell-security-advisory-av26-366" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><b>Serial number:</b> AV26-366<br /><b>Date:</b> April 20, 2026</p>

<p class="mrgn-bttm-md">Between April 13 and 19, 2026, Dell published security advisories to address vulnerabilities in multiple products:</p>

<ul><li>Connectrix Switches and Directors – multiple versions</li>
	<li>Dell AMD-based PowerEdge Server – multiple versions and models</li>
	<li>Dell Command| Update – versions prior to 5.7.0</li>
	<li>Dell PowerProtect Data Domain – multiple versions and models</li>
	<li>Dell Storage Manager - Replay Manager for Microsoft Servers – versions prior to 8.0.3</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.dell.com/support/kbdoc/en-ca/000452216/dsa-2026-041-security-update-for-dell-amd-based-poweredge-server-vulnerability">DSA-2026-041: Security Update for Dell AMD-based PowerEdge Server Vulnerability</a></li>
	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000453015/dsa-2026-171-security-update-for-dell-connectrix-b-series-sannav-vulnerabilities">DSA-2026-171: Security Update for Dell Connectrix B-Series SANnav Vulnerabilities</a></li>
	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000453020/dsa-2026-058-security-update-for-dell-storage-manager---replay-manager-for-microsoft-servers-vulnerabilities">DSA-2026-058: Security Update for Dell Storage Manager - Replay Manager for Microsoft Servers Vulnerabilities</a></li>
	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000451008/dsa-2026-190-security-update-for-dell-command-update-for-a-revenera-installshield-vulnerability">DSA-2026-190: Security Update for Dell Command | Update for a Revenera InstallShield Vulnerability</a></li>
	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000450699/dsa-2026-060-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities">DSA-2026-060: Security Update for Dell PowerProtect Data Domain Multiple Vulnerabilities</a></li>
	<li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-371</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-371"/><title><![CDATA[Progress security advisory (AV26-371)]]></title><updated>2026-04-20T18:13:25Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7579" about="/en/alerts-advisories/progress-security-advisory-av26-371" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-371<br /><strong>Date: </strong>April 20, 2026</p>

<p>On April 20, 2026, Progress published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Progress Kemp LoadMaster – version GA v7.2.62.2 and prior</li>
	<li>Progress Kemp LoadMaster – version LTSF v7.2.54.16 and prior</li>
	<li>Progress MOVEit WAF – version GA v7.2.62.2 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://community.progress.com/s/article/LoadMaster-Security-Vulnerabilites-CVE-2026-3517-CVE-2026-3518-CVE-2026-3519-CVE-2026-4048-CVE-2026-21876">LoadMaster Security Vulnerabilites: CVE-2026-3517 / CVE-2026-3518 / CVE-2026-3519 / CVE-2026-4048 / CVE-2026-21876</a></li>
	<li><a href="https://community.progress.com/s/article/MOVEit-WAF-Critical-Security-Bulletin-April-2026-CVE-2026-3517-CVE-2026-3518-CVE-2026-3519-CVE-2026-4048-CVE-2026-21876">MOVEit WAF Critical Security Bulletin – April 2026 – (CVE-2026-3517, CVE-2026-3518, CVE-2026-3519, CVE-2026-4048, CVE-2026-21876)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-moxa-security-advisory-av26-370</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-moxa-security-advisory-av26-370"/><title><![CDATA[[Control Systems] Moxa security advisory (AV26-370)]]></title><updated>2026-04-20T14:53:59Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7578" about="/en/alerts-advisories/control-systems-moxa-security-advisory-av26-370" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-370</p>

<p><strong>Date: </strong>April<strong> </strong>20, 2026</p>

<p class="mrgn-bttm-md">On April 20, 2026, Moxa published a security advisory to address a vulnerability in the following products:</p>

<ul><li>PT-508 Series – firmware version 3.8 and prior</li>
	<li>PT-510 Series – firmware version 3.8 and prior</li>
	<li>PT-7528 Series – firmware version 5.0 and prior</li>
	<li>PT-7728 Series – firmware version 3.9 and prior</li>
	<li>PT-7828 Series – firmware version 4.0 and prior</li>
	<li>PT-G503 Series – firmware version 5.3 and prior</li>
	<li>PT-G510 Series – firmware version 6.5 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258681-cve-2020-11868-ntp-vulnerability-in-ethernet-switches">CVE-2020-11868: NTP Vulnerability in Ethernet Switches – MPSA-258681</a></li>
	<li><a href="https://www.moxa.com/en/support/product-support/security-advisory">Moxa Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-369</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-369"/><title><![CDATA[Red Hat security advisory (AV26-369)]]></title><updated>2026-04-20T14:29:00Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7577" about="/en/alerts-advisories/red-hat-security-advisory-av26-369" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-369<br /><strong>Date: </strong>April 20, 2026</p>

<p>Between April 13 and 19, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products:</p>

<ul><li>Red Hat CodeReady Linux Builder – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux Server – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux for Real Time – multiple versions and platforms</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-368</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-368"/><title><![CDATA[[Control systems] CISA ICS security advisories (AV26-368)]]></title><updated>2026-04-20T14:11:48Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7576" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-368" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-368<br /><strong>Date: </strong>April 20, 2026</p>

<p>Between April 13 and 19, 2026, CISA published ICS advisories to address vulnerabilities in the following products:</p>

<ul><li>AVEVA Pipeline Simulation – version 2025_SP1_build_7.1.9497.6351 and prior</li>
	<li>Anviz Multiple Products CX2 Lite Firmware/CX7 Firmware/CrossChex Standard – all versions</li>
	<li>Delta Electronics ASDA-Soft – version V7.2.2.0 and prior</li>
	<li>Horner Automation Cscape – version v10.0</li>
	<li>Horner Automation XL4 PLC – version v15.60</li>
	<li>Horner Automation XL7 PLC – version v16.32.0</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p>

<ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-367</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-367"/><title><![CDATA[Ubuntu security advisory (AV26-367)]]></title><updated>2026-04-20T13:55:19Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7575" about="/en/alerts-advisories/ubuntu-security-advisory-av26-367" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-367<br /><strong>Date:</strong> April 20, 2026</p>

<p>Between April 13 and 19, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products:</p>

<ul><li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 14.04 LTS</li>
	<li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 16.04 LTS</li>
	<li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 18.04 LTS</li>
	<li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 20.04 LTS</li>
	<li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 22.04 LTS</li>
	<li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 24.04 LTS</li>
	<li><span lang="en" xml:lang="en" xml:lang="en">Ubuntu</span> 25.10</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web link provided and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-365</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-365"/><title><![CDATA[IBM security advisory (AV26-365)]]></title><updated>2026-04-20T13:05:43Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7573" about="/en/alerts-advisories/ibm-security-advisory-av26-365" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-365<br /><strong>Date:</strong> April 20, 2026</p>

<p class="mrgn-bttm-md">Between April 13 and 19, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p>

<ul><li>API Connect - versions V10.0.8.0 to V10.0.8.7</li>
	<li>Aspera Faspex 5 - versions 5.0.0 to 5.0.15</li>
	<li>DevOps Test Performance - versions 11.0 to 11.0.7</li>
	<li>IBM App Connect Enterprise - multiple versions</li>
	<li>IBM Aspera Console - versions 3.3.0 to 3.4.9</li>
	<li>IBM Aspera Orchestrator - versions 3.0.0 to 4.1.3</li>
	<li>IBM Business Automation Manager Open Editions - versions 8.0.0 to 8.0.8</li>
	<li>IBM Data Product Hub - versions 5.0.0 to 5.3.1</li>
	<li>IBM Event Processing - versions 1.0.0 to 1.4.7</li>
	<li>IBM Guardium Data Protection - versions 12.0, 12.1 and 12.2</li>
	<li>IBM Maximo Application Suite - Monitor Component - multiple versions</li>
	<li>IBM Netezza Appliance - versions 1.0.0.0 and 1.0.0.1</li>
	<li>IBM SPSS Modeler - multiple versions</li>
	<li>IBM Tivoli Network Configuration Manager (ITNCM) - versions 6.4.2 to 6.4.2 Fix Pack 23</li>
	<li>IBM Watson Speech Services Cartridge - versions 4.0.0 to 5.3.1</li>
	<li>IBM watsonx Orchestrate Cartridge for IBM Cloud Pak for Data - multiple versions</li>
	<li>Performance Tester (RPT) - versions 11.0 to 11.0.7</li>
	<li>Rational Performance Tester - multiple versions</li>
	<li>SPSS Collaboration and Deployment Services - version 9.0.0.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/">IBM Product Security Incident Response</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/jetbrains-security-advisory-av26-364</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/jetbrains-security-advisory-av26-364"/><title><![CDATA[JetBrains security advisory (AV26-364)]]></title><updated>2026-04-17T13:30:37Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7571" about="/en/alerts-advisories/jetbrains-security-advisory-av26-364" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-364<br /><strong>Date: </strong>April 17, 2026</p>

<p>On April 17, 2026, JetBrains published a security advisory to address a vulnerability in the following product:</p>

<ul><li>JetBrains Youtrack – versions prior to 2025.3.131383</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.jetbrains.com/privacy-security/issues-fixed/">JetBrains – Fixed security issues</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hashicorp-security-advisory-av26-363</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hashicorp-security-advisory-av26-363"/><title><![CDATA[HashiCorp security advisory (AV26-363)]]></title><updated>2026-04-17T13:20:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7570" about="/en/alerts-advisories/hashicorp-security-advisory-av26-363" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-363<br /><strong>Date: </strong>April 17, 2026</p>

<p>On April 16, 2026, HashiCorp published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Vault Community Edition – multiple versions</li>
	<li>Vault Enterprise Edition – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://discuss.hashicorp.com/t/hcsec-2026-05-vault-kvv2-metadata-and-secret-deletion-policy-bypass-denial-of-service/77342">HCSEC-2026-05 - Vault KVv2 Metadata and Secret Deletion Policy Bypass Denial-of-Service</a></li>
	<li><a href="https://discuss.hashicorp.com/t/hcsec-2026-06-vault-vulnerable-to-server-side-request-forgery-in-acme-challenge-validation-via-attacker-controlled-dns/77343">HCSEC-2026-06 - Vault Vulnerable to Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS</a></li>
	<li><a href="https://discuss.hashicorp.com/c/security/52">HashiCorp Security</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-362</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-362"/><title><![CDATA[Microsoft Edge security advisory (AV26-362)]]></title><updated>2026-04-17T13:06:02Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7569" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-362" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-362<br /><strong>Date: </strong>April 17, 2026</p>

<p>On April 16, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p>

<ul><li>Microsoft Edge Stable Channel – versions prior to 147.0.3912.72</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-16-2026">Microsoft Edge Stable Channel Release Notes</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/apache-activemq-security-advisory-av26-330</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/apache-activemq-security-advisory-av26-330"/><title><![CDATA[Apache ActiveMQ security advisory (AV26-330) - Update 1]]></title><updated>2026-04-16T17:59:30Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7529" about="/en/alerts-advisories/apache-activemq-security-advisory-av26-330" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-330<br /><strong>Date:</strong> April 8, 2026<br /><strong>Update:</strong> April 16, 2026</p>

<p class="mrgn-bttm-md">On April 8, 2026, Apache published a security advisory to address a vulnerability in the following products:</p>

<ul><li>Apache ActiveMQ Broker - versions prior to 5.19.4</li>
	<li>Apache ActiveMQ Broker - 6.0.0 versions prior to 6.2.3</li>
</ul><h2 class="h3">Update 1</h2>

<p>On April 16, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-34197 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt">CVE-2026-34197</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-34197">CISA KEV: CVE-2026-34197</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-361</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-361"/><title><![CDATA[HPE security advisory (AV26-361)]]></title><updated>2026-04-16T17:46:04Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7568" about="/en/alerts-advisories/hpe-security-advisory-av26-361" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-361<br /><strong>Date: </strong>April 16, 2026</p>

<p>On April 16, 2026, HPE published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>HPE Cray Supercomputing EX420 Compute Blade – versions prior to 1.91</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr05043en_us&amp;docLocale=en_US#hpesbcr05043-rev-1-hpe-cray-supercomputing-ex-serv-0">HPESBCR05043 rev.1 - HPE Cray Supercomputing EX Servers Using Intel Processors, INTEL-SA-01397, 2026.1 IPU, Intel Trust Domain Extensions (Intel TDX) module Advisory, Multiple Vulnerabilities</a></li>
	<li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/nginx-ui-security-advisory-av26-360</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/nginx-ui-security-advisory-av26-360"/><title><![CDATA[Nginx UI security advisory (AV26-360)]]></title><updated>2026-04-16T15:06:47Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7567" about="/en/alerts-advisories/nginx-ui-security-advisory-av26-360" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-360<br /><strong>Date: </strong>April 16, 2026</p>

<p>On April 10, 2026, Nginx UI published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>Nginx UI – version v2.3.5 and prior</li>
</ul><p>Open-source reporting indicates that the CVE-2026-33032 vulnerability is being exploited in the wild.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="https://github.com/0xJacky/nginx-ui/releases/tag/v2.3.6">Nginx UI - CVE-2026-33032</a></li>
	<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33032">NVD - CVE-2026-33032 Detail</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/drupal-security-advisory-av26-359</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/drupal-security-advisory-av26-359"/><title><![CDATA[Drupal security advisory (AV26-359)]]></title><updated>2026-04-16T12:48:41Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7566" about="/en/alerts-advisories/drupal-security-advisory-av26-359" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-359<br /><strong>Date: </strong>April 16, 2026</p>

<p>On April 15, 2026, Drupal published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>Drupal core – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates or perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://www.drupal.org/sa-core-2026-001">Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001</a></li>
	<li><a href="https://www.drupal.org/security">Drupal Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-358</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-358"/><title><![CDATA[Google Chrome security advisory (AV26-358)]]></title><updated>2026-04-15T19:39:20Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7565" about="/en/alerts-advisories/google-chrome-security-advisory-av26-358" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-358<br /><strong>Date: </strong>April 15, 2026</p>

<p>On April 15, 2026, Google published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Stable Channel Chrome for Desktop – versions prior to 147.0.7727.101/102 (Windows/Mac) and 147.0.7727.101 (Linux)</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html">Google Chrome Security Advisory</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-357</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-357"/><title><![CDATA[Cisco security advisory (AV26-357)]]></title><updated>2026-04-15T17:26:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7564" about="/en/alerts-advisories/cisco-security-advisory-av26-357" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-357<br /><strong>Date: </strong>April 15, 2026</p>

<p>On April 15, 2026, Cisco published security advisories to address vulnerabilities in the following products. Included were critical updates for the following:</p>

<ul><li>Cisco Identity Services Engine (ISE) – multiple versions</li>
  <li>Cisco ISE Passive Identity Connector (ISE-PIC) – multiple versions</li>
<li>Cisco Webex Services (cloud-based, configured to use SSO integration with Control Hub)</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p>

<ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ">Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv">Cisco Identity Services Engine Remote Code Execution Vulnerabilities</a></li>
  	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL">Cisco Webex Services Certificate Validation Vulnerability</a></li>
	<li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/splunk-security-advisory-av26-356</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/splunk-security-advisory-av26-356"/><title><![CDATA[Splunk security advisory (AV26-356)]]></title><updated>2026-04-15T16:27:08Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7563" about="/en/alerts-advisories/splunk-security-advisory-av26-356" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-356<br /><strong>Date: </strong>April 15, 2026</p>

<p>On April 15, 2026, Splunk published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Splunk Operator for Kubernetes Add-on – versions prior to 3.1.0</li>
<li>Splunk MCP Server – versions prior to 1.0.3</li>
<li>Splunk IT Service Intelligence (ITSI) – versions prior to 4.21.2</li>
<li>Splunk Enterprise – multiple versions</li>
<li>Splunk Cloud Platform – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://advisory.splunk.com/advisories">Splunk Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/amd-security-advisory-av26-355</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/amd-security-advisory-av26-355"/><title><![CDATA[AMD security advisory (AV26-355)]]></title><updated>2026-04-15T16:17:44Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7562" about="/en/alerts-advisories/amd-security-advisory-av26-355" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-355<br /><strong>Date: </strong>April 15, 2026</p>

<p>On April 14, 2026, AMD published security advisories to address vulnerabilities in the following products:</p>

<ul><li>AMD EPYC Processors – multiple versions and models</li>
	<li>AMD Ryzen Processors – multiple versions and models</li>
	<li>AMD Ryzen Embedded Processors – multiple versions and models</li>
	<li>AMD EPYC Embedded Processors – multiple versions and models</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web links provided and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7054.html">Incorrect use of LocateProtocol Service of the EFI_BOOT_Services table in SMI Handler - AMD-SB-7054</a></li>
	<li><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3016.html">IOMMU Write Buffer Vulnerability - AMD-SB-3016</a></li>
	<li><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3034.html">SEV-SNP Routing Misconfiguration - AMD-SB-3034</a></li>
	<li><a href="https://www.amd.com/en/resources/product-security.html">AMD Product Security</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/tenable-security-advisory-av26-354</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/tenable-security-advisory-av26-354"/><title><![CDATA[Tenable security advisory (AV26-354)]]></title><updated>2026-04-14T19:51:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7560" about="/en/alerts-advisories/tenable-security-advisory-av26-354" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-354<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 14, 2026, Tenable published a security advisory to address critical vulnerabilities in the following product:</p>

<ul><li>Tenable Identity Exposure – versions prior to 3.77.17</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.tenable.com/security/tns-2026-11">[R2] Tenable Identity Exposure Version 3.77.17 Fixes Multiple Vulnerabilities</a></li>
	<li><a href="https://www.tenable.com/security">Tenable Product Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/adobe-security-advisory-av26-353</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/adobe-security-advisory-av26-353"/><title><![CDATA[Adobe security advisory (AV26-353)]]></title><updated>2026-04-14T18:57:46Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7558" about="/en/alerts-advisories/adobe-security-advisory-av26-353" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-353<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 14, 2026, Adobe published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Acrobat 2024 – version Win: 24.001.30362 and prior, Mac: 24.001.30360 and prior</li>
	<li>Acrobat DC – version 26.001.21411 and prior</li>
	<li>Acrobat Reader DC – version 26.001.21411 and prior</li>
	<li>Adobe Bridge – version 15.1.4 (LTS) and prior, version 16.0.2 and prior</li>
	<li>Adobe Connect Desktop Application – version 2025.3 and prior</li>
	<li>Adobe Connect – version 12.10 and prior</li>
	<li>Adobe DNG Software Development Kit (SDK) – versions DNG SDK 1.7.1 build 2502 and prior</li>
	<li>Adobe Experience Manager (AEM) Screens – version 6.5 Service Pack 24 and prior, version Feature Pack 11.7 and prior</li>
	<li>Adobe FrameMaker – version 2022 Release Update 8 and prior</li>
	<li>Adobe InCopy – version 21.2 and prior, version 20.5.2 and prior</li>
	<li>Adobe InDesign – version ID21.22 and prior, version ID20.5.2 and prior</li>
	<li>ColdFusion 2023 – version Update 18 and prior</li>
	<li>ColdFusion 2025 – version Update 6 and prior</li>
	<li>Illustrator 2025 – version 29.8.5 and prior</li>
	<li>Illustrator 2026 – version 30.2 and prior</li>
	<li>Photoshop 2026 – version 27.4 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://helpx.adobe.com/security.html">Adobe Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-351</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-351"/><title><![CDATA[Fortinet security advisory (AV26-351)]]></title><updated>2026-04-14T17:48:58Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7556" about="/en/alerts-advisories/fortinet-security-advisory-av26-351" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-351<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 14, 2026, Fortinet published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p>

<ul><li>FortiSandbox 4.4 – versions 4.4.0 to 4.4.8</li>
	<li>FortiSandbox 5.0 – versions 5.0.0 to 5.0.5</li>
	<li>FortiAnalyzer Cloud 7.6 – versions 7.6.2 to 7.6.4</li>
	<li>FortiManager Cloud 7.6 – versions 7.6.2 to 7.6.4</li>
	<li>FortiDDoS-F 7.2 – versions 7.2.1 to 7.2.2</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-100">OS Command Injection through API endpoint</a></li>
	<li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-112">Unauthenticated Authentication bypass and Privilege escalation in FortiSandbox</a></li>
	<li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-121">Heap-based buffer overflow in oftpd daemon</a></li>
	<li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-26-119">SQL Injection via API</a></li>
	<li><a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">Fortinet PSIRT Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-schneider-electric-security-advisory-av26-350</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-schneider-electric-security-advisory-av26-350"/><title><![CDATA[[Control systems] Schneider Electric security advisory (AV26-350) ]]></title><updated>2026-04-14T17:28:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7555" about="/en/alerts-advisories/control-systems-schneider-electric-security-advisory-av26-350" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-350<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 14, 2026, Schneider Electric published advisories to address vulnerabilities in the following products:</p>

<ul><li>Easergy MiCOM Px40 Series – multiple versions and models</li>
	<li>Connexium Managed Switches TCSESM – all versions</li>
	<li>Modicon Managed Switches MCSESM, MCSESP – all versions</li>
	<li>Modicon Redundancy Switches MCSESR – all versions</li>
	<li>PowerChute Serial Shutdown – version 1.4 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-104-03&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-104-03.pdf">Use of Hard-coded Credentials vulnerability on Easergy MiCOM Px40 Series (PDF)</a></li>
	<li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-104-02&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-104-02.pdf">Third-Party vulnerability on Modicon Networking Managed Switches (PDF)</a></li>
	<li><a href="https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-104-01&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2026-104-01.pdf">Multiple Vulnerabilities on PowerChute™ Serial Shutdown (PDF)</a></li>
	<li><a href="https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp">Schneider Electric Security Notifications</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/sap-security-advisory-april-2026-monthly-rollup-av26-349</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/sap-security-advisory-april-2026-monthly-rollup-av26-349"/><title><![CDATA[SAP security advisory – April 2026 monthly rollup (AV26-349)]]></title><updated>2026-04-14T14:06:43Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7552" about="/en/alerts-advisories/sap-security-advisory-april-2026-monthly-rollup-av26-349" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-349<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 14, 2026, SAP published security advisories to address vulnerabilities in multiple products. Included were updates for the following:</p>

<ul><li>SAP Business Planning and Consolidation and SAP Business Warehouse – versions HANABPC 810, BPC4HANA 300, SAP_BW 750, 752, 753, 754, 755, 756, 757, 758 and 816</li>
	<li>SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise) – versions SAP_FIN 618, 720, 730, EA-FIN 617, 700, SAPSCORE 135, S4CORE 102, 103, 104, 105, 106, 107, 108, 109, EA-APPL 600, 602, 603, 604, 605 and 606</li>
	<li>SAP BusinessObjects Business Intelligence Platform – versions ENTERPRISE 430, 2025 and 2027</li>
	<li>SAP Human Capital Management for SAP S/4HANA – versions S4HCMRXX 100, 101, 102, SAP_HRRXX 600, 604 and 608</li>
	<li>SAP Business Analytics and SAP Content Management – versions S4HCMRXX 100, 101, 102, SAP_HRRXX 600, 604 and 608</li>
	<li>SAP S/4HANA OData Service (Manage Reference Equipment) – version S4CORE 109</li>
	<li>SAP S/4HANA Backend OData Service (Manage Reference Structures) – version S4CORE 109</li>
	<li>SAP S/4HANA Frontend OData Service (Manage Reference Structures) – version UIS4H 109</li>
	<li>SAP Supplier Relationship Management (SICF Handler in SRM Catalog) – versions SRM_SERVER 702, 713 and 714</li>
	<li>SAP NetWeaver Application Server Java (Web Dynpro Java) – version WD-RUNTIME 7.50</li>
	<li>SAP NetWeaver Application Server ABAP – versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 and SAP_BASIS 816</li>
	<li>SAP HANA Cockpit and HANA Database Explorer – version SAP_HANA_COCKPIT 2.0</li>
	<li>SAP S/4HANA (Private Cloud and On-Premise) – versions S4CORE 105, 106, 107, 108, 109, FI-CA 606, 616, 617 and 618</li>
	<li>Material Master Application – versions S4CORE 102, 103, 104, 105, 106, 107, 108, 109, SCM_BASIS 700, SCM_BASIS 701, SCM_BASIS 702, SCM_BASIS 712, SCM_BASIS 713 and SCM_BASIS 714</li>
	<li>SAP S/4HANA OData Service (Manage Technical Object Structures) – version S4CORE 109</li>
	<li>SAP S4CORE (Manage Journal Entries) – versions S4CORE 104, 105, 106, 107 and 108</li>
	<li>SAP BusinessObjects Business Intelligence Platform – versions ENTERPRISE 430, 2025 and 2027</li>
	<li>SAP NetWeaver Application Server ABAP – versions SAP_UI 758 and 816</li>
	<li>SAP Landscape Transformation – versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020, S4CORE 102, 103, 104, 105, 106, 107, 108 and 109</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations, and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2026.html">SAP Security Patch Day - April 2026</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/samsung-mobile-security-advisory-av26-348</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/samsung-mobile-security-advisory-av26-348"/><title><![CDATA[Samsung mobile security advisory (AV26-348)]]></title><updated>2026-04-14T13:54:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7551" about="/en/alerts-advisories/samsung-mobile-security-advisory-av26-348" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-348<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 7, 2026, Samsung published a security update to address vulnerabilities in the following product:</p>

<ul><li>Samsung mobile devices – versions prior to SMR-APR-2026 Release 1</li>
</ul><p>The most recent security update resolves multiple identified vulnerabilities.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://security.samsungmobile.com/securityUpdate.smsb?year=2026&amp;month=04">Samsung Security Updates</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av26-347</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av26-347"/><title><![CDATA[[Control systems] Siemens security advisory (AV26-347)]]></title><updated>2026-04-14T13:44:28Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7550" about="/en/alerts-advisories/control-systems-siemens-security-advisory-av26-347" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-347<br /><strong>Date: </strong>April 14, 2026</p>

<p>On April 14, 2026, Siemens published a security advisory to address vulnerabilities in the following products. Included were updates for the following products:</p>

<ul><li>Siemens Software Center – versions prior to V3.5.8.2</li>
	<li>Simcenter 3D – versions prior to V2506.6000</li>
	<li>Simcenter Femap – versions prior to V2506.0002</li>
	<li>Simcenter STAR-CCM+ – versions prior to V2602</li>
	<li>Solid Edge SE2025 – versions prior to V225.0 Update 13</li>
	<li>Solid Edge SE2026 – versions prior to V226.0 Update 04</li>
	<li>Tecnomatix Plant Simulation – versions prior to V2504.0008</li>
	<li>SINEC NMS – versions prior to V4.0 SP3 with UMC</li>
	<li>RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) – versions prior to V5.8</li>
	<li>SIPROTEC 5 - CP300 Devices – multiple versions and models</li>
	<li>SIPROTEC 5 Communication Modules – multiple versions and models</li>
	<li>SIPROTEC 5 Compact 7SX800 (CP050) – versions V8.70 to V9.30</li>
	<li>SIMATIC CN 4100 – hardware versions prior to FS 05</li>
	<li>SIMATIC Field PG – all versions</li>
	<li>SIMATIC IPC family – all versions</li>
	<li>SIMATIC IPC MD-57A – versions prior to V30.01.10</li>
	<li>SIMATIC ITP1000 – all versions</li>
	<li>Industrial Edge Management Pro V1 – versions V1.7.6 to V1.15.17</li>
	<li>Industrial Edge Management Pro V2 – versions V2.0.0 to V2.1.1</li>
	<li>Industrial Edge Management Virtual – versions V2.2.0 to V2.8.0</li>
	<li>SINEC NMS – versions prior to V4.0 SP3</li>
	<li>RUGGEDCOM CROSSBOW Station Access Controller (SAC) – versions prior to V5.8</li>
	<li>SCALANCE W-700 IEEE 802.11n family – versions prior to V6.6.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web link provided, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.siemens.com/global/en/products/services/cert.html#SecurityPublications">Siemens Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-346</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-346"/><title><![CDATA[[Control systems] ABB security advisory (AV26-346)]]></title><updated>2026-04-13T19:44:04Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7548" about="/en/alerts-advisories/control-systems-abb-security-advisory-av26-346" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-346<br /><strong>Date: </strong>April 13, 2026</p>

<p>On April 13, 2026, ABB published security advisories to address vulnerabilities in the following product:</p>

<ul><li>ABB CI868 AC800M product line (System 800xA) for IEC 61850 - multiple firmware versions</li>
	<li>ABB CI850 Symphony Plus SD Series product line for IEC 61850 - multiple firmware versions</li>
	<li>ABB PM 877 Symphony Plus MR (Melody Rack) product line for IEC 61850 – firmware version 3.10 to 3.52</li>
	<li>ABB S+ Operations using IEC 61850 - multiple versions</li>
	<li>ABB Ability Symphony Plus – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://search.abb.com/library/Download.aspx?DocumentID=7PAA020125&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch">Denial of Service Vulnerabilities in System 800xA, Symphony Plus IEC 61850 communication stack CVE ID: CVE-2025-3756 </a></li>
	<li><a href="https://search.abb.com/library/Download.aspx?DocumentID=7PAA017341&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch">PostgreSQL vulnerabilities in ABB Ability Symphony Plus Engineering CVE ID: CVE-2023-5869, CVE-2023-39417, CVE-2024-7348, CVE-2024-0985 </a></li>
	<li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-345</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-345"/><title><![CDATA[Microsoft Edge security advisory (AV26-345)]]></title><updated>2026-04-13T19:28:22Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7547" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-345" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-345<br /><strong>Date: </strong>April 13, 2026</p>

<p>On April 10, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p>

<ul><li>Microsoft Edge Stable Channel – versions prior to 147.0.3912.60</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#april-10-2026">Microsoft Edge Stable Channel Release Notes</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/adobe-acrobat-security-advisory-av26-340</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/adobe-acrobat-security-advisory-av26-340"/><title><![CDATA[Adobe Acrobat security advisory (AV26-340) – Update 1]]></title><updated>2026-04-13T18:56:15Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7541" about="/en/alerts-advisories/adobe-acrobat-security-advisory-av26-340" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-340<br /><strong>Date: </strong>April 13, 2026</p>

<p>On April 12, 2026, Adobe published a security advisory to address a critical vulnerability in the following products:</p>

<ul><li>Acrobat Mac – versions prior to 24.001.30360</li>
	<li>Acrobat Windows – versions prior to 24.001.30362</li>
	<li>Acrobat DC – versions prior to 26.001.21411</li>
	<li>Acrobat Reader DC – versions prior to 26.001.21411</li>
</ul><p>Adobe is aware of CVE-2026-34621 being exploited in the wild.</p>

<h2 class="h3">
  Update 1
</h2>

<p>
  On April 13, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-34621 to their Known Exploited Vulnerabilities (KEV) Database.
</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html">Security update available for Adobe Acrobat Reader - APSB26-43</a></li>
	<li><a href="https://helpx.adobe.com/security.html">Adobe Security Advisories</a></li>
  
  <li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-34621">CISA KEV: CVE-2026-34621</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-096</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-096"/><title><![CDATA[Fortinet security advisory (AV26-096) – Update 2]]></title><updated>2026-04-13T18:50:26Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7248" about="/en/alerts-advisories/fortinet-security-advisory-av26-096" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-096<br /><strong>Date: </strong>February 9, 2026<br /><strong>Updated: </strong>April 13, 2026</p>

<p>On February 6, 2026, Fortinet published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>FortiClientEMS 7.4 – version 7.4.4</li>
</ul><h2 class="h3">Update 1</h2>

<p class="mrgn-bttm-md">Open-source reporting indicates that CVE-2026-21643 is being exploited in the wild.</p>

<h2 class="h3">Update 2</h2>

<p class="mrgn-bttm-md">On April 13, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-21643 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.fortiguard.com/psirt/FG-IR-25-1142">SQLi in administrative interface – FG-IR-25-1142 (CVE-2026-21643)</a></li>
	<li><a href="https://cwe.mitre.org/data/definitions/89.html">CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')</a></li>
	<li><a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">Fortinet PSIRT Advisories</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-21643">CISA KEV: CVE-2026-21643</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/tenable-security-advisory-av26-336</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/tenable-security-advisory-av26-336"/><title><![CDATA[Tenable security advisory (AV26-336) – Update 1]]></title><updated>2026-04-13T17:57:21Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7536" about="/en/alerts-advisories/tenable-security-advisory-av26-336" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-336<br /><strong>Date:</strong> April 9, 2026<br /><strong>Updated:</strong> April 13, 2026</p>

<p class="mrgn-bttm-md">On April 9, 2026, Tenable published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Tenable Security Center – version 6.5.0 to 6.8.0</li>
</ul><p><strong>Update 1</strong><br />
On April 13, 2026, Tenable updated affected products reflected above.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.tenable.com/security/tns-2026-10">[R2] Stand-alone Security Patch Available for Tenable Security Center Versions 6.5.1, 6.6.0, 6.7.2 and 6.8.0: SC202604.1</a></li>
	<li><a href="https://www.tenable.com/security">Tenable Product Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/wolfssl-security-advisory-av26-344</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/wolfssl-security-advisory-av26-344"/><title><![CDATA[wolfSSL security advisory (AV26-344)]]></title><updated>2026-04-13T17:32:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7546" about="/en/alerts-advisories/wolfssl-security-advisory-av26-344" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-344<br /><strong>Date: </strong>April 13, 2026</p>

<p>On April 9, 2026, wolfSSL published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>wolfSSL – versions 3.12.0 to versions prior to 5.9.1</li>
</ul><p>CVE-2026-5194 is listed as critical with a CVSS score of 9.3.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/wolfSSL/wolfssl/releases">wolfssl</a></li>
	<li><a href="https://github.com/advisories/GHSA-f5h9-5q52-qrx7">Missing hash/digest size and OID checks allow digests...</a></li>
	<li><a href="https://cwe.mitre.org/data/definitions/295.html">CWE-295 Improper Certificate Validation</a></li>
	<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-5194">CVE-2026-5194</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-343</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-343"/><title><![CDATA[Dell security advisory (AV26-343)]]></title><updated>2026-04-13T17:24:32Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7545" about="/en/alerts-advisories/dell-security-advisory-av26-343" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-343<br /><strong>Date: </strong>April 13, 2026</p>

<p>Between April 6 and 12, 2026, Dell published security advisories to address vulnerabilities in multiple products:</p>

<ul><li>Connectrix Switches and Directors – versions prior to sannav_ova_9x_os_02_2026</li>
	<li>Data Protection Advisor – versions 19.9 to 19.12 SP2</li>
	<li>Dell AX System – multiple versions and models</li>
	<li>Dell Data Protection Central – versions 19.9 to 19.12 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1</li>
	<li>Dell EMC Isilon OneFS – versions 8.2.2 and prior</li>
	<li>Dell EMC PowerScale – version 9.0.0</li>
	<li>Dell Integrated System for Microsoft Azure Stack Hub 16G – versions prior to 2603</li>
	<li>Dell Networking OS10 – versions prior to 10.6.1.1</li>
	<li>Dell PowerProtect DP Series Appliance – versions prior to 2.7.9 with Data Protection Central OS Update prior to dpc-osupdate-1.1.26-1</li>
	<li>Dell PowerScale OneFS – multiple versions</li>
	<li>Elastic Cloud Storage – versions prior to 3.8.1.7</li>
	<li>ObjectScale - versions prior to 4.1.0.3 and 4.2.00</li>
	<li>PowerSwitch Z9664F-ON – versions prior to 3.54.5.1-11</li>
	<li>PowerSwitch S5448F-ON – versions prior to 3.54.5.1-14</li>
	<li>PowerSwitch S9664F-ON – versions prior to 3.54.5.1-11</li>
	<li>PowerSwitch E3200-ON – versions prior to 3.57.5.1-6</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry></feed>