REF · CISA ALERT 2026-04-28 · CISA ALERT 2026-05-01 · MSRC CVE-2026-32202
KEV

Sunday Edition — May 3, 2026

Incomplete
Patch
Horizon

Since the April 26 briefing’s KEV sprint: CISA returned with a dual-row April 28 catalog drop pairing legacy ConnectWise ScreenConnect path traversal (CVE-2024-1708) with a Windows Shell protection-mechanism failure (CVE-2026-32202) tied to post-patch coercion research. May Day brought a Linux kernel KEV addition (CVE-2026-31431), agencies published OT zero-trust joint guidance, and ICS advisories surfaced end-of-life tooling alongside IEC 61850 denial-of-service class risk—while travel and fitness-sector notifications and an edtech Salesforce-surface leak kept identity and fraud teams busy in parallel.

3New federal KEV rows · Apr 28 + May 1
2CVEs in single Apr 28 bulletin
5Agencies on OT zero-trust PDF seal

Intel-01 / CISA KEV · April 28, 2026

Dual Listing:
Remote Access Meets Shell

The April 28 alert adds CVE-2024-1708 (ConnectWise ScreenConnect path traversal) and CVE-2026-32202 (Microsoft Windows protection mechanism failure). The pairing reads like a composite risk picture: persistent remote-support planes that historically fed ransomware initial access, plus a desktop trust-boundary flaw elevated after exploitation evidence.

Intel-02 / Zero-day aftermath

CVE-2026-32202:
Trust After the Fix

Microsoft’s Security Update Guide marks CVE-2026-32202 as a Windows Shell spoofing issue with exploitation detected. Independent analysis frames the flaw as stemming from an incomplete remediation of the APT28-linked CVE-2026-21510 chain—highlighting how icon-render and namespace parsing paths can still authenticate clients to attacker infrastructure even when execution gates move.

REF · MSRC CVE-2026-32202 · REVISION 2026-04-27 (EXPLOITABILITY INDEX CORRECTION)

Intel-03 / Nation-state chain

APT28 · LNK
December 2025 Window

CERT-UA public reporting describes Russian APT28 activity leveraging CVE-2026-21510 alongside an LNK-related flaw in campaigns against Ukraine and EU states—supplying governmental attribution context for why Windows shell hardening and patch completeness are now diplomatic-tier priorities, not desktop hygiene alone.

Dec 2025

CERT-UA bulletin on APT28 exploitation chain

Feb 2026

Microsoft Patch Tuesday addresses CVE-2026-21510 family

Apr 2026

CVE-2026-32202 KEV listing after further exploitation evidence

Intel-04 / Remote access stack

ScreenConnect
Path Traversal

CVE-2024-1708 remains a textbook example of why self-hosted support tools sit in ransomware pre-positioning playbooks: ConnectWise’s February 2024 bulletin documents CWE-22 path traversal paired with the authentication bypass class CVE-2024-1709, mandatory 23.9.8+ upgrade messaging, and incident-response IOCs for on-prem partners.

CWE-22Improper limitation of pathname to restricted directory
REMEDIATIONCloud tenants remediated per vendor; on-prem ≥ 23.9.8 per bulletin

Intel-05 / CISA KEV · May 1, 2026

Kernel Row:
CVE-2026-31431

CISA’s May 1 alert lists CVE-2026-31431 as a Linux kernel “incorrect resource transfer between spheres” vulnerability—language that usually maps to privilege boundary failures in core scheduling or memory management paths. Federal teams must reconcile this with long-term stable kernel backport trains common in container hosts and network appliances.

Intel-06 / Regulatory-adjacent posture

Zero Trust
Written for OT

On April 29, CISA—with the Department of War, Department of Energy, FBI, and Department of State—released Adapting Zero Trust Principles to Operational Technology, a joint PDF aimed at owners balancing legacy inertia, safety constraints, and IT–OT convergence. The guidance stresses asset visibility, supply-chain assurance, and layered segmentation rather than copy-pasting enterprise SaaS zero-trust playbooks onto the plant floor.

“Eliminate implicit trust and require continuously validating access based on identity, context, and risk.” — CISA publication summary, 2026-04-29

Intel-07 / ICS advisory · ICSA-26-118-01

GRASSMARLIN
XML & EOL

CISA’s April 28 advisory ICSA-26-118-01 covers NSA GRASSMARLIN CVE-2026-6807, an XXE-class issue in session parsing. NSA indicates the project reached end-of-life in 2017 with no patches planned—a sharp reminder that ICS-adjacent research tools sometimes linger in lab VLANs years after maintainers walk away.

Intel-08 / ICS advisory · ICSA-26-120-01

ABB · IEC 61850
Fault & Reset

Republication ICSA-26-120-01 details CVE-2025-3756 in ABB’s IEC 61850 MMS client stack: a crafted packet can push PM 877 / CI850 / CI868 modules into fault state requiring manual restart, or disrupt the 61850 driver on S+ Operations nodes. ABB stresses process networks must not face the internet—an evergreen control that still fails red-team tests worldwide.

Intel-09 / Consumer sector breach

Booking.com:
Fraud Aftermath

April reporting documents Booking.com confirming unauthorized third-party access to customer reservation and contact data—with downstream reservation-hijack phishing campaigns exploiting the specificity of travel timelines. The incident is a case study in post-breach social engineering rather than card-data volume alone.

Intel-10 / Fitness sector · EU footprint

Basic-Fit:
Bank-Grade Exposure

Reuters quotes Basic-Fit stating roughly one million members impacted across six countries, including bank account details, names, and birth dates—detected and contained within minutes per the company, but still a high-value identity pool for follow-on account takeover and direct-debit fraud workflows.

Intel-11 / Edtech · SaaS perimeter

McGraw Hill:
Salesforce Surface

Investigative reporting ties McGraw Hill to a 13.5 million-record exposure allegedly rooted in a misconfigured Salesforce-hosted page, with extortion listings referencing ShinyHunters. Have I Been Pwned corroborates classes of fields in circulation—underscoring that OAuth integrations and hosted-page sprawl remain systemic cloud risks distinct from classic database exfiltration.

Intel-12 / Windows threat surface

Leaked Zero-Day
Cluster (Press)

Separate from the KEV rows above, trade press continues to track actively exploited Windows issues disclosed outside coordinated release windows—useful as a red-team prioritization signal even when official catalog rows lag.

ADVISORY_IDS ICSA-26-118-01 ICSA-26-120-01 BOD-22-01 CERT-UA-6287250 JOINT-ZT-OT-2026-04
3Catalog rows · Apr 28 + May 1 window
~1MMembers cited · Basic-Fit incident
13.5MRecords cited · McGraw Hill reporting
5Co-sealing agencies · OT ZT guide

Intel-13 / Forward intelligence

The Week Ahead:
May 4 – May 10, 2026

Stage May Patch Tuesday rehearsals, validate Linux stable backports against new CVE-2026-31431 KEV due clocks, and run travel-sector phishing simulations while IEC 61850 segmentation rules are re-checked before summer maintenance windows.

May 12, 2026 (expected)

Microsoft Patch Tuesday

Second-Tuesday cadence; prioritize Windows Shell and Defender-adjacent rows given recurring incomplete-patch narratives and KEV attention.

May 12, 2026 (reported)

Federal CVE-2026-32202 clock

Trade reporting tied FCEB remediation expectations to the May 12 window alongside BOD 22-01—reconcile against the live KEV JSON before binding change control.

Rolling · Q2 2026

ABB firmware tracks

ICSA-26-120-01 lists planned firmware branches for CI850 / PM 877—align OT change windows with vendor Q2 milestones.

August 1–6, 2026

Black Hat USA trainings

Las Vegas training block opens ahead of briefing days; prep executive comms for “shown at Black Hat” disclosures.

August 6–9, 2026

DEF CON 34

LVCC program window; synchronize badge pickup and hotel-network hardening guidance for traveling staff.

Rolling

CISA KEV due-date import

Import Apr 28 and May 1 rows into GRC; confirm per-CVE BOD 22-01 clocks in the live JSON feed—not a single fleet deadline.

What is Cyber Threat Intel Brief?