14

New KEV rows · Apr 20–24 window

Sunday Edition — April 26, 2026

Federal KEV
Sprint

Since the April 19 edition’s patch-and-extortion frame: CISA published four separate KEV additions in five days—eight CVEs on April 20 (including three Cisco Catalyst SD-WAN Manager issues), standalone listings for Microsoft Defender and Marimo, and a four-CVE edge bundle on April 24. The same week, AA26-113A reframed how China-nexus actors ride covert SOHO and IoT botnets, the Vercel breach investigation deepened with OAuth IOCs and broader log review, and Iran-nexus reporting highlighted wiper and OT-adjacent pressure on critical infrastructure.

REF · CISA ALERTS 2026-04-20 / 22 / 23 / 24 · AA26-113A · VERCEL KB APR-2026 · HHS OCR PR 2026-04-23

8 KEV adds · single Apr 20 drop
4 Federal KEV bulletins · Apr 20–24
3 Cisco SD-WAN Manager · KEV batch
$1.165M OCR ransomware settlements · combined

Intel-01 / CISA KEV · April 20, 2026

The Eight-Line
Inventory Shock

BOD 22-01 · VENDOR SPREAD · PAPERCUT → CISCO

CISA’s April 20 catalog update is deliberately heterogeneous: PaperCut authentication weakness, JetBrains TeamCity path traversal, Kentico and Quest KACE traversal/auth issues, Zimbra XSS, and a three-CVE Cisco Catalyst SD-WAN Manager cluster. The through-line is not “one vendor had a bad day”—it is that federal due-date machinery now has to parallelize across print servers, CI/CD, CMS, mail, endpoint management, and WAN control planes simultaneously.

CVE-2023-27351 · PaperCut NG/MF · improper authentication
CVE-2024-27199 · JetBrains TeamCity · relative path traversal
CVE-2025-2749 · Kentico Xperience · path traversal
CVE-2025-32975 · Quest KACE SMA · improper authentication
CVE-2025-48700 · Synacor Zimbra Collaboration Suite · cross-site scripting
CVE-2026-20122 · Cisco Catalyst SD-WAN Manager · incorrect use of privileged APIs
CVE-2026-20128 · Cisco Catalyst SD-WAN Manager · recoverable-format password storage
CVE-2026-20133 · Cisco Catalyst SD-WAN Manager · sensitive information exposure

ACTION · Reconcile each new KEV row to owning teams before the BOD calendar compresses remediation into the same sprint as unrelated WAN upgrades—Cisco SD-WAN Manager triples are not “patch Tuesday noise.”

Intel-02 / Microsoft · April 22 KEV solo

Defender:
Granularity Gap

CVE-2026-33825 · INSUFFICIENT ACCESS CONTROL GRANULARITY

A day after the eight-CVE wave, CISA listed CVE-2026-33825 on its own—described in the advisory text as a Microsoft Defender issue involving insufficient granularity of access control. Treat this as a signal that EDR consoles and agent trust boundaries are now first-class KEV material alongside remote-access stacks; validate agent tiers, help-desk roles, and delegated admin scopes as aggressively as you would a VPN concentrator.

Operational read

When security products become KEV entries, incident response playbooks need a fork: attackers may target the control plane to blind sensors or loosen policy, not merely to steal documents from endpoints.

ROW · CVE-2026-33825 · VERIFY DUE DATE IN LIVE KEV

Vendor context

Use Microsoft’s Security Update Guide entry for patch levels and affected builds; pair with CISA’s catalog row for federal remediation clocks and evidence-of-exploitation framing.

Intel-03 / Data science supply chain · April 23 KEV

Marimo:
Notebook RCE

CVE-2026-39987 · REMOTE CODE EXECUTION · RESEARCH ENVIRONMENTS

CISA’s April 23 single-add bulletin lists CVE-2026-39987 as a Marimo remote code execution vulnerability. Interactive notebook stacks often sit adjacent to sensitive analytics warehouses; a KEV-class RCE there is less about “developer convenience” and more about lateral movement into data science IAM roles that were never threat-modeled like production Kubernetes.

Exposure pattern

Inventory internet-reachable Marimo instances tied to shared service accounts; treat notebook servers like CI runners—capable of reading secrets from environment and cloud metadata layers.

Coordinated disclosure surface

Marimo’s GitHub security advisories include a critical pre-auth RCE item; align installed versions with vendor guidance and rotate any API tokens present in notebook-adjacent env files.

Intel-04 / CISA KEV · April 24 edge bundle

Signage, Remote
Support, Router Shells

SAMSUNG MAGICINFO · SIMPLEHELP · D-LINK DIR-823X

The April 24 four-add drop stitches together Samsung MagicINFO 9 Server path traversal, two SimpleHelp issues (missing authorization and traversal), and D-Link DIR-823X command injection. It is a concise portrait of how attackers monetize remote-support tooling, digital signage backends, and consumer-grade CPE in the same opportunistic portfolio.

Digital signage CVE-2024-7399

Samsung MagicINFO 9 Server path traversal — treat content-management planes on retail and transit networks as extension of the corporate perimeter.

Remote support CVE-2024-57726

SimpleHelp missing authorization — audit who can spawn unattended sessions and whether agents live on servers with tier-0 access.

Remote support CVE-2024-57728

SimpleHelp path traversal — pair patching with firewall rules that restrict agent callbacks to known support desks only.

Home / SOHO CPE CVE-2025-29635

D-Link DIR-823X command injection — consumer routers remain botnet fodder; segment guest Wi-Fi from management VLANs.

Intel-05 / Joint advisory · AA26-113A

Covert Mesh
Attribution Physics

APRIL 23, 2026 · NCSC-UK CO-SEAL · CISA / FBI / NSA

AA26-113A documents a strategic shift: China-nexus actors routing activity through large-scale networks of compromised SOHO routers, IoT, and smart devices—low-cost, deniable infrastructure that complicates IP-based blocking. The advisory explicitly ties prior reporting on Volt Typhoon and Flax Typhoon to covert-network tradecraft and warns that static malicious IP lists lose effectiveness when any given threat group can emerge from one of many dynamic botnets.

Defender pivot

NCSC and partners recommend baselining VPN and remote-access traffic, favoring allow lists over deny lists for high-risk organizations, and treating covert-network tracking as its own intelligence line item—not a footnote to conventional APT infrastructure.

Pressure points named in advisory

  • SOHO routers and IoT as primary botnet composition
  • Multi-hop proxy behavior across kill-chain phases
  • IOC “extinction” when hundreds of thousands of nodes rotate

Intel-06 / Platform breach follow-on

Vercel × Context.ai:
OAuth Aftershock

APRIL 19–24, 2026 · KB UPDATES · IOC PUBLICATION

Follow-up since last week’s briefing context: Vercel’s April 2026 security bulletin (last updated April 24) now describes expanded log review, a small set of additionally compromised accounts, and separate suspicious activity that does not appear tied to the same incident. Context.ai’s statement confirms OAuth tokens from its deprecated consumer suite were implicated and that unauthorized AWS access was detected and stopped. Third-party analysis frames the chain as a textbook trusted-relationship / OAuth supply path amplified by environment-variable sensitivity defaults.

01

Initial access at vendor — Context.ai documents a security incident affecting legacy consumer systems; Vercel cites compromise of a third-party AI tool’s Google Workspace OAuth integration.

02

Workspace pivot — Attacker leverages OAuth-derived access to move from vendor context into a Vercel employee’s Google Workspace account, then into Vercel internal systems per Vercel’s narrative.

03

Secret plane — Vercel states the actor enumerated and decrypted non-sensitive environment variables; recommendations emphasize rotating anything not marked sensitive, enabling MFA, and reviewing activity logs and deployments.

Intel-07 / Nation-state & OT-adjacent reporting

Iran-Nexus:
Destructive Ladder

WIPERS · PLC / HMI · WATER & ENERGY NARRATIVES

Reporting in late April traces an arc of Iran-linked activity that blends state-sponsored operators, hacktivist fronts, and financially motivated clusters—highlighting data-wiping malware against commercial targets and renewed concern about OT-adjacent intrusions against water and energy providers. Analyst testimony summarized in trade press underscores opportunistic scanning of internet-exposed industrial devices and weak remote-access posture.

April 7, 2026 · Federal advisory window

AA26-097A (April 7, 2026) warns that Iranian-affiliated actors are exploiting Rockwell Automation / Allen-Bradley programmable logic controllers across U.S. critical infrastructure—elevating the priority of HMI integrity checks, mode-switch posture, and remote engineering-workstation governance.

March–April 2026 · Wiper escalation

Unit 42 and other researchers tie Handala-linked wiper activity to high-profile destructive incidents; CISA published hardening guidance urging organizations to review endpoint controls after healthcare-sector wiper cases.

NOTE · OT claims require independent corroboration per site; prioritize vendor PLC backups, mode-switch posture per Rockwell guidance, and segmented engineering access.

Intel-08 / Regulatory enforcement

OCR:
Ransomware Settlements Stack

HHS PRESS RELEASE · APRIL 23, 2026 · HIPAA SECURITY RULE

HHS’s Office for Civil Rights announced four separate ransomware-related settlements on April 23, collectively covering more than 427,000 individuals and $1,165,000 in payments—with each resolution agreement tied to alleged failures around risk analysis, timely notification, or impermissible disclosure. The announcement frames ransomware as the dominant large-breach category OCR sees and doubles down on proactive Security Rule compliance as the best mitigation lever.

Regional Women’s Health Group (Axia) — ransomware breach 37,989 $320k
Assured Imaging — server ransomware 244,813 $375k
Consociate Health — business associate / phishing origin 136,539 $225k
Star Group Health Plan — ransomware + exfiltration 9,316 $245k

Intel-09 / Ransomware ecosystem · Research

The Gentlemen &
SystemBC Telemetry

APRIL 2026 REPORTING · PROXY MALWARE · SCALE

Independent reporting on The Gentlemen ransomware operation highlights how SystemBC proxy malware can centralize access to a large victim pool—press and research coverage describes more than 1,500 corporate networks observed through a single C2 lens. Treat this as a reminder that RaaS backend hygiene occasionally gives defenders rare visibility into affiliate operational security failures, not as a complete census of affiliate victims.

1,570+Corporate networks · reported C2 exposure

Defenders should map SOCKS proxy and remote-desktop bridging tools in their baselines—SystemBC-class implants often sit between initial access brokers and ransomware deployment teams.

Pair technical IOCs with identity hygiene: many affiliate operations still succeed via credential reuse and exposed remote-support tools—the same edge classes CISA added to KEV on April 24.

Intel-10 / npm supply chain · April 20 CISA alert

Axios:
CI/CD Hunt Orders

COMPROMISED SEMVERS · PLAIN-CRYPTO-JS · ROTATE PIPELINE SECRETS

The same April 20 window that brought the eight-CVE KEV wave also produced a standalone CISA alert on the Axios npm supply chain compromise—calling out malicious axios@1.14.1 and axios@0.30.4 builds, the plain-crypto-js dependency chain, and concrete actions: scrub CI caches, revert to known-good semver pins, rotate VCS and cloud keys, and monitor for anomalous child processes during npm install.

14
Distinct KEV CVEs · Apr 20–24 federal drops
15+
Intl. co-sealers · AA26-113A partner list
427k+
Individuals · OCR ransomware settlements
200k+
Raptor Train scale · AA26-113A cited context

Intel-11 / Forward intelligence

The Week Ahead:
April 27 – May 3

PATCH WINDOWS · VENDOR BRIEFINGS · SECTOR CONFERENCES

Use the next seven days to close the loop on April’s KEV sprint, re-audit OAuth grants tied to AI vendors, and rehearse OT incident comms against the backdrop of elevated Iran-nexus reporting. Dates below are planning anchors—validate vendor calendars and live KEV rows before binding change-control.

April 28–30, 2026

DEF CON Singapore — main program

Marina Bay Sands hosts the regional flagship; expect social-engineering spikes around badge pickup and hotel Wi-Fi captive portals.

April 5–8, 2027

RSAC 2027 — San Francisco runway

RSA Conference has published its 2027 dates; use the gap after RSAC 2026 to reset vendor embargo calendars and speaker submission timelines for next year’s briefing cycle.

April 30, 2026 (rolling)

CISA KEV due-date reconciliation

Continue importing Apr 20–24 KEV rows into GRC; several entries carry distinct BOD clocks—do not assume a single fleet-wide deadline.

May 1, 2026

Weekend broker & edge rescan

Re-run external attack surface discovery for SimpleHelp, MagicINFO, D-Link SOHO classes, and any Marimo endpoints accidentally published to zero-trust gaps.

May 2–3, 2026

npm / CI cache hygiene

Keep CISA’s axios supply-chain guidance wired into pipeline scanners; purge cached artifacts if compromised semver ranges ever landed in build agents.

August 1–6, 2026

Black Hat USA — Las Vegas runway

Trainings open August 1 ahead of briefing days; align executive disclosure expectations for “released at Vegas” vulnerability marketing.

August 6–9, 2026

DEF CON 34 — Las Vegas

Official program dates at LVCC; pre-registration pricing windows typically close late July—useful for vendor embargo planning.

May 13, 2026 (expected)

Microsoft Patch Tuesday (planning)

Second Tuesday cadence; pre-stage Defender and Windows servicing stacks given recurring KEV attention on security products.

Rolling

Oracle Critical Patch Update follow-through

Enterprise Java and middleware shops should track Oracle’s quarterly CPU remediation trains in parallel with federal KEV priorities.

What is Cyber Threat Intel Brief?