<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en"><id>https://cyber.gc.ca/api/cccs/atom/v1/get?feed=alerts_advisories&amp;lang=en</id><link rel="self" href="https://cyber.gc.ca/api/cccs/atom/v1/get?feed=alerts_advisories&amp;lang=en"/><title>Alerts and advisories</title><updated>2026-04-02T19:53:07Z</updated><entry><id>https://cyber.gc.ca/en/alerts-advisories/openssh-security-advisory-av26-312</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/openssh-security-advisory-av26-312"/><title><![CDATA[OpenSSH security advisory (AV26-312)]]></title><updated>2026-04-02T19:53:07Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7507" about="/en/alerts-advisories/openssh-security-advisory-av26-312" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-312<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 2, 2026, OpenSSH published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>OpenSSH - versions prior to 10.3</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.openssh.org/releasenotes.html">OpenSSH 10.3 Release Notes</a></li>
	<li><a href="https://www.openssh.com/">OpenSSH</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cesanta-security-advisory-av26-311</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cesanta-security-advisory-av26-311"/><title><![CDATA[Cesanta security advisory (AV26-311)]]></title><updated>2026-04-02T18:49:23Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7505" about="/en/alerts-advisories/cesanta-security-advisory-av26-311" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-311<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 2, 2026, Cesanta published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Mongoose - versions 7.0 to 7.20</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/cesanta/mongoose">Cesanta Mongoose</a></li>
	<li><a href="https://mongoose.ws/">Mongoose.ws</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-310</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-310"/><title><![CDATA[Progress security advisory (AV26-310)]]></title><updated>2026-04-02T18:37:57Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7504" about="/en/alerts-advisories/progress-security-advisory-av26-310" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-310<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 2, 2026, Progress published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Progress ShareFile - versions prior to v5.12.4 and versions prior to v6</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://docs.sharefile.com/en-us/storage-zones-controller/5-0/security-vulnerability-feb26 ">Security Vulnerability Fix For ShareFile Storage Zones Controller 5.x (February 2026)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/watchguard-security-advisory-av26-309</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/watchguard-security-advisory-av26-309"/><title><![CDATA[WatchGuard security advisory (AV26-309)]]></title><updated>2026-04-02T15:27:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7503" about="/en/alerts-advisories/watchguard-security-advisory-av26-309" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-309<br /><strong>Date:</strong> April 2, 2026</p>

<p>On April 1, 2026, WatchGuard published a security advisory to address a vulnerability in the following products:</p>

<ul><li>
	<p>Fireware OS 2025-1 - versions 2025.1 to 2026.1.2</p>
	</li>
	<li>
	<p>Fireware OS 12.x - versions 12.6.1 to 12.11.8</p>
	</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00009"><span lang="en" xml:lang="en" xml:lang="en">WatchGuard Firebox Arbitrary File Write via Path Traversal in Fireware Web</span> UI</a></li>
	<li><a href="https://www.watchguard.com/wgrd-psirt/advisories"><span lang="en" xml:lang="en" xml:lang="en">WatchGuard Security Advisories</span></a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av26-275</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av26-275"/><title><![CDATA[Apple security advisory (AV26-275) - Update 1]]></title><updated>2026-04-02T15:11:10Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7440" about="/en/alerts-advisories/apple-security-advisory-av26-275" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number:</strong> AV26-275<br /><strong>Date:</strong> March 24, 2026<br /><strong>Updated:</strong> April 2, 2026</p>

<p>On March 24, 2026, Apple published security updates to address vulnerabilities in the following products:</p>

<ul><li>iOS – versions prior to 18.7.7 and versions prior to 26.4</li>
	<li>iPadOS – versions prior to 18.7.7 and versions prior to 26.4</li>
	<li>macOS Sequoia – versions prior to 15.7.5</li>
	<li>macOS Sonoma – versions prior to 14.8.5</li>
	<li>macOS Tahoe – versions prior to 26.4</li>
	<li>tvOS – versions prior to 26.4</li>
	<li>visionOS – versions prior to 26.4</li>
	<li>watchOS – versions prior to 26.4</li>
</ul><p><strong>Update 1</strong><br />
On April 1, 2026 Apple expanded the availability of iOS 18.7.7 for more devices to protect from DarkSword iOS exploit kit web attacks.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.apple.com/en-us/126793">About the security content of iOS 18.7.7 and iPadOS 18.7.7</a></li>
	<li><a href="https://support.apple.com/en-us/100100">Apple Security Updates</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-306</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-306"/><title><![CDATA[Google Chrome security advisory (AV26-306) – Update 1]]></title><updated>2026-04-01T20:25:32Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7499" about="/en/alerts-advisories/google-chrome-security-advisory-av26-306" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-306<br /><strong>Date: </strong>April 1, 2026<br /><strong>Updated:</strong> April 1, 2026</p>

<p>On March 31, 2026, Google published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Stable Channel Chrome for Desktop – versions prior to 146.0.7680.177/178 (Windows/Mac) and 146.0.7680.177 (Linux)</li>
</ul><p>Google is aware that an exploit for CVE-2026-5281 exists in the wild.</p>

<h2 class="h3">Update 1</h2>

<p>On April 1, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-5281 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html">Google Chrome Security Advisory</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2026-5281">CISA KEV: CVE-2026-5281</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/drupal-security-advisory-av26-308</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/drupal-security-advisory-av26-308"/><title><![CDATA[Drupal security advisory (AV26-308)]]></title><updated>2026-04-01T19:43:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7501" about="/en/alerts-advisories/drupal-security-advisory-av26-308" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-308<br /><strong>Date: </strong>April 1, 2026</p>

<p>On April 1, 2026, Drupal published a security advisory to address a critical vulnerability in the following product :</p>

<ul><li>SAML SSO - Service Provider – versions prior to 3.1.4</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.drupal.org/sa-contrib-2026-031">SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031</a></li>
	<li><a href="https://www.drupal.org/security">Drupal Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-307</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-307"/><title><![CDATA[Cisco security advisory (AV26-307)]]></title><updated>2026-04-01T19:28:35Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7500" about="/en/alerts-advisories/cisco-security-advisory-av26-307" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-307<br /><strong>Date:</strong> April 1, 2026</p>

<p>On April 1, 2026, Cisco published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Cisco NFVIS Release – multiple versions</li>
	<li>Cisco IMC Release – multiple versions</li>
	<li>Cisco Telemetry Broker Appliances – version 6.0(2.260044) (M6) and prior</li>
	<li>IEC6400 Edge Compute Appliances – version 4.3(6.260017) (M6) and prior</li>
	<li>Secure Endpoint Private Cloud Appliances – versions 4.3(2.260007) (M5) and 4.3(6.260017) (M6)</li>
	<li>Secure Firewall Management Center Appliances – versions 4.3(2.260007) (M5) and 4.3(6.260017) (M6)</li>
	<li>Secure Malware Analytics Appliances – versions 4.3(2.260007) (M5) and 4.3(6.260017) (M6)</li>
	<li>Secure Network Analytics Appliances – versions 4.3(2.260007) (M5) and 6.0(2.260044) (M6)</li>
	<li>Secure Network Server Appliances – multiple versions</li>
	<li>Cisco SSM On-Prem Release – version 9-202510 and prior</li>
	<li>Cisco EPNM Release – versions 8.0 and prior, version 8.1 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p>

<ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt">Cisco Integrated Management Controller Command Injection and Remote Code Execution Vulnerabilities</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-xRAnOuO8">Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-improp-auth-mUwFWUU3">Cisco Evolved Programmable Network Manager Improper Authorization Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn">Cisco Integrated Management Controller Authentication Bypass Vulnerability</a></li>
	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-cli-execution-cHUcWuNr">Cisco Smart Software Manager On-Prem Arbitrary Command Execution Vulnerability</a></li>
	<li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-305</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-305"/><title><![CDATA[HPE security advisory (AV26-305)]]></title><updated>2026-03-31T18:33:50Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7474" about="/en/alerts-advisories/hpe-security-advisory-av26-305" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-305<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 31, 2026, HPE published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>HPE Telco Network Function Virtualization Orchestrator – version v7.5.0 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05033en_us&amp;docLocale=en_US#hpesbnw05033-rev-1-hpe-telco-network-function-virt-0">HPESBNW05033 rev.1 - HPE Telco Network Function Virtual Orchestrator, Improper Input Validation in the Undertow HTTP Server Core</a></li>
	<li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/symantec-security-advisory-av26-304</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/symantec-security-advisory-av26-304"/><title><![CDATA[Symantec security advisory (AV26-304)]]></title><updated>2026-03-31T18:16:56Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7471" about="/en/alerts-advisories/symantec-security-advisory-av26-304" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-304<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 30, 2026, Symantec published a security advisory to address a vulnerability in the following product:</p>

<ul><li>Symantec Data Loss Prevention (DLP) Windows Endpoint – versions prior to DLP 16.1 MP2 and DLP 25.1 MP1</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37306">Symantec Data Loss Prevention Security Update</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-303</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-303"/><title><![CDATA[[Control systems] ABB security advisory (AV26-303)]]></title><updated>2026-03-31T18:09:53Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7470" about="/en/alerts-advisories/control-systems-abb-security-advisory-av26-303" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-303<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 31, 2026, ABB published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>ABB 800xA History – version 7.0 and prior</li>
	<li>ABB Batch Management – version 6.2 and prior</li>
	<li>ABB Production Response Batch History – version 6.2 and prior</li>
	<li>ABB 800xA for Symphony Plus Harmony – version 6.2 and prior</li>
	<li>ABB 800xA for AC 870P Melody – version 6.2 and prior</li>
	<li>ABB Application Change Management – version 6.2 and prior</li>
</ul><p>The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://search.abb.com/library/Download.aspx?DocumentID=7PAA023732&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch">System 800xA affected by 3rd party component Vulnerabilities (PDF)</a></li>
	<li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/nokia-security-advisory-av26-302</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/nokia-security-advisory-av26-302"/><title><![CDATA[Nokia security advisory (AV26-302)]]></title><updated>2026-03-31T13:33:16Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7469" about="/en/alerts-advisories/nokia-security-advisory-av26-302" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-302<br /><strong>Date: </strong>March 31, 2026</p>

<p>On March 30, 2026, Nokia published security advisories to address a vulnerability in the following products:</p>

<ul><li>Nokia GX G42, GX G31, GX G32, GX G34 – versions prior to GX r9.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.nokia.com/we-are-nokia/security/product-security-advisory/cve-2026-34485/">CVE-2026-34485 - CLI ACL Bypass in GX G42</a></li>
	<li><a href="https://www.nokia.com/we-are-nokia/security/product-security-advisory/">Nokia Product Security Advisory</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/citrix-security-advisory-av26-267</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/citrix-security-advisory-av26-267"/><title><![CDATA[Citrix security advisory (AV26-267) – Update 1]]></title><updated>2026-03-30T20:20:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7432" about="/en/alerts-advisories/citrix-security-advisory-av26-267" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-267<br /><strong>Date: </strong>March 23, 2026<br /><strong>Updated: </strong>March 30, 2026<br /></p>

<p>On March 23, 2026, Citrix published a security advisory to address critical vulnerabilities in the following products:</p>

<ul><li>NetScaler ADC and NetScaler Gateway 14.1 – versions prior to 14.1-60.58</li>
	<li>NetScaler ADC and NetScaler Gateway 13.1 – versions prior to 13.1-62.23</li>
	<li>NetScaler ADC FIPS and NDcPP – versions prior to 13.1-37.262</li>
</ul><h2 class="h3">
  Update 1
</h2>
<p class="mrgn-bttm-md">On March 30, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-3055 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&amp;articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368">NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368</a></li>
	<li><a href="https://support.citrix.com/support-home/topic-article-list?trendingCategory=20&amp;trendingTopicName=Security%20Bulletin">Citrix Security Advisories</a></li>
  
  	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-3055">CISA KEV: CVE-2026-3055</a></li>
  
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/docker-security-advisory-av26-301</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/docker-security-advisory-av26-301"/><title><![CDATA[Docker security advisory (AV26–301)]]></title><updated>2026-03-30T15:39:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7468" about="/en/alerts-advisories/docker-security-advisory-av26-301" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-301<br /><strong>Date: </strong>March 30, 2026</p>

<p>On March 30, 2026, Docker published a security advisory to address a vulnerability in the following product:</p>

<ul><li>Docker Desktop – versions prior to 4.67.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://docs.docker.com/security/security-announcements/#docker-desktop-4670-security-update-cve-2026-33990">Docker Desktop 4.67.0 security update: CVE-2026-33990</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/roundcube-security-advisory-av26-300</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/roundcube-security-advisory-av26-300"/><title><![CDATA[Roundcube security advisory (AV26-300)]]></title><updated>2026-03-30T15:26:13Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7465" about="/en/alerts-advisories/roundcube-security-advisory-av26-300" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-300<br /><strong>Date: </strong>March 30, 2026</p>

<p>On March 29, 2026, Roundcube published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Webmail – versions prior to 1.6.15</li>
	<li>Webmail – versions prior to 1.5.15</li>
	<li>Webmail – versions prior to 1.7 RC6</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/roundcube/roundcubemail/releases/tag/1.6.15">Roundcube Webmail 1.6.15</a></li>
	<li><a href="https://github.com/roundcube/roundcubemail/releases/tag/1.5.15">Roundcube Webmail 1.5.15</a></li>
	<li><a href="https://github.com/roundcube/roundcubemail/releases/tag/1.7-rc6">Roundcube Webmail 1.7 RC6</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-299</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-299"/><title><![CDATA[Hitachi security advisory (AV26-299)]]></title><updated>2026-03-30T15:20:43Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7467" about="/en/alerts-advisories/hitachi-security-advisory-av26-299" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-299<br /><strong>Date:</strong> March 30, 2026</p>

<p class="mrgn-bttm-md">On March 27, 2026, Hitachi published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Hitachi Disk Array Systems – multiple versions and models</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.hitachi.com/products/it/storage-solutions/sec_info/2026/2026_307.html">Security information for Hitachi Disk Array Systems</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/index.html">Hitachi Vulnerability Information</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-298</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/red-hat-security-advisory-av26-298"/><title><![CDATA[Red Hat security advisory (AV26-298)]]></title><updated>2026-03-30T15:18:59Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7466" about="/en/alerts-advisories/red-hat-security-advisory-av26-298" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-298<br /><strong>Date: </strong>March 30, 2026</p>

<p class="mrgn-bttm-md">Between March 23 and 29, 2026, Red Hat published security advisories to address vulnerabilities in multiple products. Included were updates to address vulnerabilities in the Linux kernel for the following products:</p>

<ul><li>Red Hat CodeReady Linux Builder – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux Server – multiple versions and platforms</li>
	<li>Red Hat Enterprise Linux for Real Time – multiple versions and platforms</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://access.redhat.com/security/security-updates/security-advisories">Red Hat Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-297</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-297"/><title><![CDATA[[Control systems] CISA ICS security advisories (AV26-297)]]></title><updated>2026-03-30T15:17:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7464" about="/en/alerts-advisories/control-systems-cisa-ics-security-advisories-av26-297" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-297<br /><strong>Date: </strong>March 30, 2026</p>

<p class="mrgn-bttm-md">Between March 23 and 29, 2026, CISA published ICS advisories to address vulnerabilities in the following products:</p>

<ul><li>Grassroots DICOM (GDCM) – version 3.2.2</li>
	<li>Pharos Controls Mosaic Show Controller – firmware version 2.15.3</li>
	<li>OpenCode Systems OC Messaging and USSD Gateway – version 6.32.2</li>
	<li>PTC Windchill Product Lifecycle Management – multiple versions and models</li>
	<li>Schneider Electric EcoStruxure Foxboro DCS – versions prior to CS8.1</li>
	<li>Schneider Electric Plant iT/Brewmaxx – version 9.60_and_above</li>
	<li>WAGO GmbH &amp; Co. KG Industrial Managed Switches – multiple firmware version</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates if available.</p>

<ul class="list-unstyled"><li><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA ICS Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-296</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ubuntu-security-advisory-av26-296"/><title><![CDATA[Ubuntu security advisory (AV26-296)]]></title><updated>2026-03-30T15:09:27Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7463" about="/en/alerts-advisories/ubuntu-security-advisory-av26-296" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-296<br /><strong>Date: </strong>March 30, 2026</p>

<p>Between March 23 and 29, 2026, Ubuntu published security notices to address vulnerabilities in the Linux kernel affecting the following products:</p>

<ul><li>Ubuntu 14.04 LTS</li>
	<li>Ubuntu 16.04 LTS</li>
	<li>Ubuntu 18.04 LTS</li>
	<li>Ubuntu 20.04 LTS</li>
	<li>Ubuntu 22.04 LTS</li>
	<li>Ubuntu 24.04 LTS</li>
	<li>Ubuntu 25.10</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web link provided and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://ubuntu.com/security/notices">Ubuntu Security Notices</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055"/><title><![CDATA[AL26-006 - Vulnerability impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2026-3055]]></title><updated>2026-03-30T15:06:04Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7460" about="/en/alerts-advisories/al26-006-vulnerability-impacting-citrix-netscaler-adc-netscaler-gateway-cve-2026-3055" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Number:</strong> AL26-006<br /><strong>Date:</strong> March 30, 2026</p>

<h2>Audience</h2>

<p>This Alert is intended for <abbr title="information technology">IT</abbr> professionals and managers.</p>

<h2>Purpose</h2>

<p>An Alert is used to raise awareness of a recently identified cyber threat that may impact cyber information assets, and to provide additional detection and mitigation advice to recipients. The Canadian Centre for Cyber Security ("Cyber Centre") is also available to provide additional assistance regarding the content of this Alert to recipients as requested.</p>

<h2>Details</h2>

<p>The Cyber Centre is aware of a critical vulnerability impacting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway)<sup id="fn1-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>NetScaler ADC is an application delivery and security platform designed to optimize the performance, security, and scalability of applications.</p>

<p>NetScaler Gateway is a secure remote access solution developed by Citrix that provides single sign-on (SSO) capabilities for applications, enhancing user experience and security.</p>

<p>In response to the vendor advisory released on March 23, 2026, the Cyber Centre released AV26-267 on March 23, <span class="nowrap">2026<sup id="fn2-rf"><a class="fn-lnk" href="#fn2"><span class="wb-inv">Footnote </span>2</a></sup>.</span></p>

<p>Tracked as CVE-2026-3055<sup id="fn3-rf"><a class="fn-lnk" href="#fn3"><span class="wb-inv">Footnote </span>3</a></sup>, this vulnerability is an insufficient input validation vulnerability (CWE-125)<sup id="fn4-rf"><a class="fn-lnk" href="#fn4"><span class="wb-inv">Footnote </span>4</a></sup> leading to a memory overread allowing a remote, unauthenticated attacker to access sensitive information stored in memory. Pre-conditions for this vulnerability are that the NetScaler ADC or NetScaler Gateway must be configured as a SAML IdP (Security Assertion Markup Language Identity Provider).</p>

<p>Further information about the impacted configurations of your appliance can be found in the Citrix advisory<sup id="fn1a-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup>.</p>

<p>This Alert only applies to customer-managed NetScaler ADC and NetScaler Gateway. The Citrix Cloud Software Group has already upgraded Citrix-managed cloud services and Citrix-managed Adaptive Authentication instances with the necessary software updates related to these vulnerabilities.</p>

<p>The Cyber Centre has observed open-source reporting indicating that the vulnerability is being exploited in the wild since March 27, 2026<sup id="fn5-rf"><a class="fn-lnk" href="#fn5"><span class="wb-inv">Footnote </span>5</a></sup>.</p>

<h2>Suggested actions</h2>

<p>The Cyber Centre recommends that organizations using Citrix NetScaler ADC and NetScaler Gateway appliances (particularly for SAML IDP-configured appliances), review the Citrix security bulletin<sup id="fn1b-rf"><a class="fn-lnk" href="#fn1"><span class="wb-inv">Footnote </span>1</a></sup> and update or upgrade the affected systems to the following versions:</p>

<ul><li>NetScaler ADC and NetScaler Gateway 14.1-60.58 and later releases of 14.1</li>
	<li>NetScaler ADC and NetScaler Gateway 13.1-62.23 and later releases of 13.1</li>
	<li>NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.262 and later releases of 13.1-FIPS and 13.1-NDcPP</li>
</ul><p>Citrix has provided steps to take if NetScaler ADC or NetScaler Gateway are suspected to be compromised<sup id="fn6-rf"><a class="fn-lnk" href="#fn6"><span class="wb-inv">Footnote </span>6</a></sup>, which includes:</p>

<ul><li>Preserve evidence.</li>
	<li>If possible, avoid switching off the machine in order to preserve the traces needed for investigations.</li>
	<li>Completely isolate the machine concerned from the network, both from the Internet and from the internal network, in order to limit the risk of further unauthorized access and lateral movement.</li>
	<li>Revoke credentials and access.</li>
	<li>Examine all servers and systems to which the NetScaler ADC had connected for signs of compromise.</li>
	<li>Rebuild and restore.</li>
	<li>Rotate restored secrets.</li>
	<li>Harden the device.</li>
</ul><p>In addition, the Cyber Centre strongly recommends that organizations review and implement the Cyber Centre’s Top 10 <abbr title="information technology">IT</abbr> Security Actions with an emphasis on the following topics<sup id="fn7-rf"><a class="fn-lnk" href="#fn7"><span class="wb-inv">Footnote </span>7</a></sup>.</p>

<ul><li>Patch operating systems and applications</li>
	<li>Harden operating systems and applications</li>
	<li>Isolate web-facing applications</li>
</ul><p>Should activity matching the content of this alert be discovered, recipients are encouraged to report via <a href="/en/incident-management">My Cyber Portal</a> or email <a href="mailto:contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>

<h2>References</h2>

<aside class="wb-fnote" role="note"><dl><dt>Footnote 1</dt>
	<dd id="fn1">
	<p><a href="https://support.citrix.com/external/article/CTX696300/netscaler-adc-and-netscaler-gateway-secu.html">NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368</a></p>

	<p class="fn-rtn"><a href="#fn1-rf"><span class="wb-inv">Return to footnote</span>1<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 2</dt>
	<dd id="fn2">
	<p><a href="/en/alerts-advisories/citrix-security-advisory-av26-267">AV26-267 – Citrix security advisory</a></p>

	<p class="fn-rtn"><a href="#fn2-rf"><span class="wb-inv">Return to footnote</span>2<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 3</dt>
	<dd id="fn3">
	<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-3055">CVE-2026-3055 Detail</a></p>

	<p class="fn-rtn"><a href="#fn3-rf"><span class="wb-inv">Return to footnote</span>3<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 4</dt>
	<dd id="fn4">
	<p><a href="https://cwe.mitre.org/data/definitions/125.html">CWE-125: Out-of-bounds Read</a></p>

	<p class="fn-rtn"><a href="#fn4-rf"><span class="wb-inv">Return to footnote</span>4<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 5</dt>
	<dd id="fn5">
	<p><a href="https://labs.watchtowr.com/please-we-beg-just-one-weekend-free-of-appliances-citrix-netscaler-cve-2026-3055-memory-overread-part-2/">Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)</a></p>

	<p class="fn-rtn"><a href="#fn5-rf"><span class="wb-inv">Return to footnote</span>5<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 6</dt>
	<dd id="fn6">
	<p><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694799">Citrix – Steps to Take if NetScaler ADC is Suspected to be Compromised</a></p>

	<p class="fn-rtn"><a href="#fn6-rf"><span class="wb-inv">Return to footnote</span>6<span class="wb-inv"> referrer</span></a></p>
	</dd>
	<dt>Footnote 7</dt>
	<dd id="fn7">
	<p><a href="/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 <abbr title="information technology">IT</abbr> security actions to protect Internet connected networks and information (ITSM.10.089)</a></p>

	<p class="fn-rtn"><a href="#fn7-rf"><span class="wb-inv">Return to footnote</span>7<span class="wb-inv"> referrer</span></a></p>
	</dd>
</dl></aside></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-295</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/dell-security-advisory-av26-295"/><title><![CDATA[Dell security advisory (AV26-295)]]></title><updated>2026-03-30T14:59:12Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7462" about="/en/alerts-advisories/dell-security-advisory-av26-295" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-295<br /><strong>Date: </strong>March 30, 2026</p>

<p>Between March 23 and 29, 2026, Dell published security advisories to address vulnerabilities in multiple products:</p>

<ul><li>APEX Cloud Platform for Red Hat OpenShift – multiple versions</li>
<li>APEX Cloud Platforms Solution Offerings – multiple versions</li>
<li>APEX – multiple versions</li>
<li>Dell Secure Connect Gateway Appliance – versions prior to 5.34.00.16</li>
<li>Dell Storage Monitoring and Reporting – versions prior to 6.0.0.2</li>
<li>Dell Storage Resource Manager – versions prior to 6.0.0.2</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.dell.com/support/kbdoc/en-ca/000443243/dsa-2026-152-dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities">DSA-2026-152: Dell Secure Connect Gateway Security Update for Multiple Third-Party Component Vulnerabilities.</a></li>
	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000443791/dsa-2026-111-dell-storage-resource-manager-srm-and-dell-storage-monitoring-and-reporting-smr-security-update-for-multiple-third-party-component-vulnerabilities">DSA-2026-111: Dell Storage Resource Manager (SRM) and Dell Storage Monitoring and Reporting (SMR) Security Update for Multiple Third-Party Component Vulnerabilities</a></li>
  	<li><a href="https://www.dell.com/support/kbdoc/en-ca/000444451/dsa-2026-151-security-update-for-dell-apex-cloud-platform-for-red-hat-openshift-for-multiple-third-party-component-vulnerabilities">DSA-2026-151: Security Update for Dell APEX Cloud Platform for Red Hat OpenShift for Multiple Third-Party Component Vulnerabilities</a></li>
	<li><a href="https://www.dell.com/support/security/en-ca">Dell Security advisories and notices</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-294</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ibm-security-advisory-av26-294"/><title><![CDATA[IBM security advisory (AV26-294)]]></title><updated>2026-03-30T14:38:59Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7461" about="/en/alerts-advisories/ibm-security-advisory-av26-294" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-294<br /><strong>Date: </strong>March 30, 2026</p>

<p>Between March 23 and 29, 2026, IBM published security advisories to address vulnerabilities in multiple products. Included were critical updates for the following:</p>

<ul><li>Communications Server for AIX – version 6.4</li>
<li>Communications Server for Data Center Deployment – versions 7.0 to 7.1</li>
<li>Communications Server for Linux on System z – version 6.4</li>
<li>Communications Server for Linux – version 6.4</li>
<li>DataPower Operations Dashboard – versions 1.0.23.1 to 1.0.23.2</li>
<li>DataStage on Cloud Pak for Data – version 5.3.1</li>
<li>IBM App Connect Enterprise Certified Containers Operands – multiple versions</li>
<li>IBM App Connect Enterprise – versions 12.0.1.0 to 12.0.12.23</li>
<li>IBM App Connect Enterprise – versions 13.0.1.0 to 13.0.6.2</li>
<li>IBM App Connect Operator – multiple versions</li>
<li>IBM CICS TX Standard – version 11.1</li>
<li>IBM Common Licensing – multiple versions</li>
<li>IBM DevOps Release – versions 7.0.0 to 7.0.0.5</li>
<li>IBM Event Endpoint Management – versions 11.0.0 to 11.7.2</li>
<li>IBM Industry Solutions Workbench – version 5.0.0.0 and 5.1.0.0</li>
<li>IBM InfoSphere Optim Archive Viewer – versions 11.7 FixPack09 to 11.7 FixPack12</li>
<li>IBM Knowledge Catalog Standard Cartridge – multiple versions</li>
<li>IBM MQ Operator – multiple versions</li>
<li>IBM Security QRadar Log Management AQL Plugin – versions 1.0.0 to 1.1.3</li>
<li>IBM SPSS Modeler – multiple versions</li>
<li>IBM Storage Protect Operations Center – version 8.2.0</li>
<li>IBM WebSphere Automation – versions 1.11.0 to 1.11.1</li>
<li>IBM supplied MQ Advanced container images – multiple versions</li>
<li>IBM watsonx Code Assistant On Prem – multiple versions</li>
<li>IBM webMethods BPM – version 11.1 and 10.15</li>
<li>InfoSphere Information Server – versions 11.7.0.0 to 11.7.1.6</li>
<li>SOAR App Host – multiple versions</li>
<li>Sterling Connect:Direct FTP+ – versions 1.3.0.0 to 1.3.0.3</li>
<li>UCB - IBM UrbanCode Build – version 6.1.7 to 6.1.7.9</li>
<li>UCR - IBM UrbanCode Release – versions 6.2.5 to 6.2.5.11</li>
<li>WebSphere Extreme Scale – version 8.6.1.0 to 8.6.1</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.ibm.com/support/pages/bulletin/">IBM Product Security Incident Response</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-096</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av26-096"/><title><![CDATA[Fortinet security advisory (AV26-096) – Update 1]]></title><updated>2026-03-30T13:46:32Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7248" about="/en/alerts-advisories/fortinet-security-advisory-av26-096" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-096<br /><strong>Date: </strong>February 9, 2026<br /><strong>Updated: </strong>March 30, 2026</p>

<p>On February 6, 2026, Fortinet published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>FortiClientEMS 7.4 – version 7.4.4</li>
</ul><h2 class="h3">Update 1</h2>

<p class="mrgn-bttm-md">Open-source reporting indicates that CVE-2026-21643 is being exploited in the wild.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.fortiguard.com/psirt/FG-IR-25-1142">SQLi in administrative interface – FG-IR-25-1142 (CVE-2026-21643)</a></li>
	<li><a href="https://cwe.mitre.org/data/definitions/89.html">CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')</a></li>
	<li><a href="https://www.fortiguard.com/psirt?filter=1&amp;version=&amp;severity=5&amp;severity=4&amp;severity=3&amp;severity=2">Fortinet PSIRT Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/f5-security-advisory-av25-669</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/f5-security-advisory-av25-669"/><title><![CDATA[F5 security advisory (AV25-669) - Update 1]]></title><updated>2026-03-27T19:56:34Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6893" about="/en/alerts-advisories/f5-security-advisory-av25-669" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV25-669<br /><strong>Date: </strong>October 15, 2025<br /><strong>Updated: </strong>March 27, 2026</p>

<p>On October 15, 2025, F5 published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>BIG-IP (all modules) – versions 17.5.0 to 17.5.1, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP AFM – version 17.5.0, versions 17.1.0 to 17.1.2, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP APM – versions 17.5.0 to 17.5.1, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP APM, APM with SWG, SSL Orchestrator, SSL Orchestrator with SWG – version 17.5.0, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP ASM – versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.5</li>
	<li>BIG-IP Advanced WAF/ASM – versions 17.5.0 to 17.5.1, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP Next CNF – versions 2.0.0 to 2.1.0, versions 1.1.0 to 1.4.1</li>
	<li>BIG-IP Next SPK – versions 2.0.0 to 2.1.0, versions 1.7.0 to 1.9.2</li>
	<li>BIG-IP Next for Kubernetes – versions 2.0.0 to 2.1.0</li>
	<li>BIG-IP PEM – version 17.5.0, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.6, versions 15.1.0 to 15.1.10</li>
	<li>BIG-IP SSL Orchestrator – version 17.5.0, versions 17.1.0 to 17.1.2, versions 16.1.0 to 16.1.5, versions 15.1.0 to 15.1.10</li>
	<li>F5OS-A – versions 1.8.0 to 1.8.1, versions 1.5.1 to 1.5.3</li>
	<li>F5OS-C – version 1.8.0 to 1.8.1, versions 1.6.0 to 1.6.2</li>
	<li>NGINX App Protect WAF – versions 4.5.0 to 4.6.0</li>
</ul><p>On October 15, 2025, F5 also published security incident K000154696 advising that threat actors exfiltrated files from BIG-IP products and they are not aware of active exploitation of any undisclosed F5 vulnerabilities.</p>

<h2 class="h3">Update 1</h2>

<p>F5 indicates that CVE-2025-53521 has been exploited.</p>

<p>On March 27, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-53521 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-tp-lg">The Cyber Centre encourages users/administrators to review the links provided below, to identify F5 BIG-IP products, evaluate and address any potential compromise on any networked managed interface exposed to the public internet and apply F5 security updates.</p>

<ul class="list-unstyled"><li><a href="https://my.f5.com/manage/s/article/K000156741">K000156741: BIG-IP APM vulnerability CVE-2025-53521</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K000160486">K000160486: Indicators of Compromise for c05d5254</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53521">CISA KEV: CVE-2025-53521</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K000154696">K000154696: F5 Security Incident</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K53108777">K53108777: Hardening your F5 system</a></li>
	<li><a href="https://my.f5.com/manage/s/article/K000156572">F5 Quarterly Security Notification (October 2025)</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-293</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-293"/><title><![CDATA[Microsoft Edge security advisory (AV26-293)]]></title><updated>2026-03-27T18:20:56Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7458" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-293" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-293<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 26, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p>

<ul><li>Microsoft Edge Stable Channel – versions prior to 146.0.3856.84</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#march-26-2026">Microsoft Edge Stable Channel Release Notes</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ericsson-security-advisory-av26-292</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ericsson-security-advisory-av26-292"/><title><![CDATA[Ericsson security advisory (AV26-292)]]></title><updated>2026-03-27T14:54:54Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7457" about="/en/alerts-advisories/ericsson-security-advisory-av26-292" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-292<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 25, 2026, Ericsson published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Ericsson Indoor Connect 8855 – versions prior to 2025.Q3</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates if available.</p>

<ul class="list-unstyled"><li><a href="https://www.ericsson.com/en/about-us/security/psirt/security-bulletin-indoorconnect-march-2026">Security Bulletin – Ericsson Indoor Connect 8855, March, 2026</a></li>
	<li><a href="https://www.ericsson.com/en/about-us/security/security-bulletins">Ericsson Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-291</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-291"/><title><![CDATA[FreeBSD security advisory (AV26-291)]]></title><updated>2026-03-27T14:50:17Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7456" about="/en/alerts-advisories/freebsd-security-advisory-av26-291" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-291<br /><strong>Date: </strong>March 27, 2026</p>

<p>Between March 25 and 26, 2026, FreeBSD published security advisories to address vulnerabilities in the following products:</p>

<ul><li>FreeBSD – version 14.x</li>
	<li>FreeBSD – version 15.0</li>
	<li>FreeBSD – version 13.5</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:06.tcp.asc">TCP: remotely exploitable DoS vector (mbuf leak) (CVE-2026-4247)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:07.nvmf.asc">Remote denial of service via null pointer dereference (CVE-2026-4652)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc">Remote code execution via RPCSEC_GSS packet validation (CVE-2026-4747)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-26:09.pf.asc">pf silently ignores certain rules (CVE-2026-4748)</a></li>
	<li><a href="https://www.freebsd.org/security/advisories/">FreeBSD Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av26-290</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-siemens-security-advisory-av26-290"/><title><![CDATA[[Control systems] Siemens security advisory (AV26-290) ]]></title><updated>2026-03-27T14:44:21Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7455" about="/en/alerts-advisories/control-systems-siemens-security-advisory-av26-290" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-290<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 26, 2026, Siemens published a security advisory to address vulnerabilities in the following products. Included were updates for the following products:</p>

<ul><li>CPCI85 Central Processing/Communication – versions prior to V26.10</li>
	<li>RTUM85 RTU Base – versions prior to V26.10</li>
	<li>SICORE Base system – versions prior to V26.10.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the web links provided, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://cert-portal.siemens.com/productcert/html/ssa-246443.html">SSA-246443: Multiple Vulnerabilities in SICAM 8 Products</a></li>
	<li><a href="https://www.siemens.com/global/en/products/services/cert.html#SecurityPublications">Siemens Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/watchguard-security-advisory-av26-289</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/watchguard-security-advisory-av26-289"/><title><![CDATA[WatchGuard security advisory (AV26-289)]]></title><updated>2026-03-27T14:39:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7454" about="/en/alerts-advisories/watchguard-security-advisory-av26-289" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-289<br /><strong>Date: </strong>March 27, 2026</p>

<p>On March 26, 2026, WatchGuard published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Fireware OS – versions prior to 2026.2</li>
	<li>Fireware OS – versions prior to 12.12</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2026-00007">WatchGuard Firebox Insecure Deserialization in Fireware Access Portal (CVE-2026-4266)</a></li>
	<li><a href="https://www.watchguard.com/wgrd-psirt/advisories">WatchGuard Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-288</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/spring-security-advisory-av26-288"/><title><![CDATA[Spring security advisory (AV26-288)]]></title><updated>2026-03-26T20:05:49Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7453" about="/en/alerts-advisories/spring-security-advisory-av26-288" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-288<br /><strong>Date: </strong>March 26, 2026</p>

<p>Between March 23 and 26, 2026, Spring published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Spring Cloud Config – versions prior to 3.1.3, 4.1.9, 4.2.6, 4.3.2 and 5.0.2</li>
	<li>Spring AI – versions prior to 1.0.5 and 1.1.4</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://spring.io/security/cve-2026-22739">CVE-2026-22739: Spring Cloud Config Profile Substitution Can Allow Unintended Access To Files And Enable SSRF Attacks</a></li>
	<li><a href="https://spring.io/security/cve-2026-22743">CVE-2026-22743: Server-Side Request Forgery via Filter Expression Keys in Neo4jVectorStore</a></li>
	<li><a href="https://spring.io/security/cve-2026-22744">CVE-2026-22744: RediSearch Query via Unescaped TAG Filter Values in RedisVectorStore</a></li>
	<li><a href="https://spring.io/security/cve-2026-22742">CVE-2026-22742: Server-Side Request Forgery in BedrockProxyChatModel via Unvalidated Media URL Fetching</a></li>
	<li><a href="https://spring.io/security/cve-2026-22738">CVE-2026-22738: SpEL Injection via Unescaped Filter Key in SimpleVectorStore Leads to Remote Code Execution</a></li>
	<li><a href="https://spring.io/security">Spring Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-287</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hpe-security-advisory-av26-287"/><title><![CDATA[HPE security advisory (AV26-287)]]></title><updated>2026-03-26T19:59:55Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7452" about="/en/alerts-advisories/hpe-security-advisory-av26-287" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-287<br /><strong>Date: </strong>March 26, 2026</p>

<p>On March 26, 2026, HPE published a security advisory to address a vulnerability in the following product:</p>

<ul><li>HPE Telco Service Orchestrator – versions prior to v5.5.1</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05031en_us&amp;docLocale=en_US">HPESBNW05031 rev.1 - HPE Telco Service Orchestrator, Multiple Vulnerabilities </a></li>
	<li><a href="https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US">HPE Security Bulletin Library</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-286</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-abb-security-advisory-av26-286"/><title><![CDATA[ [Control systems] ABB security advisory (AV26-286)]]></title><updated>2026-03-26T19:48:24Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7451" about="/en/alerts-advisories/control-systems-abb-security-advisory-av26-286" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-286<br /><strong>Date: </strong>March 26, 2026</p>

<p>On March 26, 2026, ABB published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>ABB Ability Camera Connect – version 2.0.0.42 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and perform the suggested mitigations.</p>

<ul class="list-unstyled"><li><a href="https://search.abb.com/library/Download.aspx?DocumentID=4HZM000604&amp;LanguageCode=en&amp;DocumentPartId=PDF&amp;Action=Launch">ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (SQLite 3.2.4)</a></li>
	<li><a href="https://global.abb/group/en/technology/cyber-security/alerts-and-notifications">ABB Cyber security alerts and notifications</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/grafana-security-advisory-av26-285</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/grafana-security-advisory-av26-285"/><title><![CDATA[Grafana security advisory (AV26-285)]]></title><updated>2026-03-26T19:34:03Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7450" about="/en/alerts-advisories/grafana-security-advisory-av26-285" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><!--CUT & PASTE the French version info -->
<p><strong>Serial number: </strong>AV26-285<br /><strong>Date: </strong>March 26, 2026</p>

<p class="mrgn-bttm-md">On March 25, 2026, Grafana published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>Grafana – versions prior to 12.4.2, 12.3.6, 12.2.8, 12.1.10 and 11.6.14</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://grafana.com/blog/grafana-security-release-critical-and-high-severity-security-fixes-for-cve-2026-27876-and-cve-2026-27880/">Grafana security release: Critical and high severity security fixes for CVE-2026-27876 and CVE-2026-27880 </a></li>
	<li><a href="https://grafana.com/blog/">Grafana Blog</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/aqua-security-security-advisory-av26-283</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/aqua-security-security-advisory-av26-283"/><title><![CDATA[Aqua Security security advisory (AV26-283) – Update 1]]></title><updated>2026-03-26T19:20:45Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7448" about="/en/alerts-advisories/aqua-security-security-advisory-av26-283" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-283<br /><strong>Date: </strong>March 26, 2026<br /><strong>Updated:</strong> March 26, 2026</p>

<p>On March 22, 2026, Aqua Security published a security advisory to address a critical vulnerability in the following products:</p>

<ul><li>trivy – version v0.69.4</li>
	<li>trivy dockerhub images – versions v0.69.5 and v0.69.6</li>
	<li>setup-trivy – versions prior to v0.2.6</li>
	<li>trivy-action – versions prior to v0.35.0</li>
</ul><p>Open-source reporting indicates that CVE-2026-33634 has been exploited.</p>

<h2>Update 1</h2>

<p>On 26 March 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026‑33634 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23">Trivy ecosystem supply chain temporarily compromised</a></li>
	<li><a href="https://github.com/aquasecurity/trivy/security/advisories/">Aqua Security Advisories</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-33634">CISA KEV:CVE-2026-33634</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/squid-security-advisory-av26-284</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/squid-security-advisory-av26-284"/><title><![CDATA[Squid security advisory (AV26-284)]]></title><updated>2026-03-26T19:14:49Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7449" about="/en/alerts-advisories/squid-security-advisory-av26-284" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-284<br /><strong>Date: </strong>March 26, 2026</p>

<p>On March 25, 2026, Squid published security advisories to address vulnerabilities in the following product:</p>

<ul><li>Squid – versions prior to 7.5</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://github.com/squid-cache/squid/security/advisories/GHSA-hpfx-h48q-gvwg">SQUID-2026:1 Denial of Service in ICP Request handling</a></li>
	<li><a href="https://github.com/squid-cache/squid/security/advisories/GHSA-f9p7-3jqg-hhvq">SQUID-2026:2 Denial of Service in ICP Request handling</a></li>
	<li><a href="https://github.com/squid-cache/squid/security/advisories/GHSA-84p4-hcx7-jj7c">SQUID-2026:3 Out of Bounds Read in ICP message handling</a></li>
	<li><a href="https://github.com/squid-cache/squid/security/advisories/">Squid Security Advisories</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/ptc-security-advisory-av26-282</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/ptc-security-advisory-av26-282"/><title><![CDATA[PTC security advisory (AV26-282)]]></title><updated>2026-03-26T15:50:00Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7447" about="/en/alerts-advisories/ptc-security-advisory-av26-282" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-282<br /><strong>Date: </strong>March 26, 2026</p>

<p>On March 23, 2026, PTC published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>PTC Windchill PDMLink – multiple versions</li>
	<li>PTC FlexPLM – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates, once available.</p>

<ul class="list-unstyled"><li><a href="https://www.ptc.com/en/about/trust-center/advisory-center/active-advisories/windchill-flexplm-critical-vulnerability?srsltid=AfmBOop3e7Nthx5-BsrjKdpZi50wL6l6Bt21Fz0gUub2cIPgdPGV5bNl">Critical RCE vulnerability reported in Windchill</a></li>
	<li><a href="https://www.ptc.com/en/about/trust-center/advisory-center/">PTC Advisory Center</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-281</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/cisco-security-advisory-av26-281"/><title><![CDATA[Cisco security advisory (AV26-281)]]></title><updated>2026-03-25T19:11:31Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7446" about="/en/alerts-advisories/cisco-security-advisory-av26-281" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-281<br /><strong>Date: </strong>March 25, 2026</p>

<p>On March 25, 2026, Cisco published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>Cisco Catalyst 9300 Series Switches</li>
	<li>Cisco Catalyst 9200 Series Switches</li>
	<li>Cisco Catalyst 9000 Series Switches</li>
	<li>Cisco Catalyst ESS9300 Embedded Series Switches</li>
	<li>Cisco IOS Software</li>
	<li>Cisco IOS XE Software</li>
	<li>Cisco Secure Firewall ASA Software</li>
	<li>Cisco Secure FTD Software</li>
	<li>Cisco Catalyst IE9310 and IE9320 Rugged Series Switches</li>
	<li>Cisco IE3500 and IE3505 Rugged Series Switches</li>
	<li>Cisco Catalyst CW9800H Wireless Controllers</li>
	<li>Cisco Catalyst CW9800M Wireless Controllers</li>
	<li>Cisco Catalyst CW9800H1 Wireless Controllers</li>
	<li>Cisco Meraki MS390</li>
	<li>Cisco Catalyst SD-WAN Manager</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested recommendations, and apply the necessary updates when available.</p>

<ul class="list-unstyled"><li><a href="https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75297">Cisco Event Response: March 2026 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication</a></li>
	<li><a href="https://tools.cisco.com/security/center/publicationListing.x">Cisco Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/isc-bind-security-advisory-av26-280</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/isc-bind-security-advisory-av26-280"/><title><![CDATA[ISC BIND security advisory (AV26-280)]]></title><updated>2026-03-25T18:23:28Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7445" about="/en/alerts-advisories/isc-bind-security-advisory-av26-280" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-280<br /><strong>Date: </strong>March 25, 2026</p>

<p>On March 25, 2026, ISC published security advisories to address vulnerabilities in the following products:</p>

<ul><li>ISC BIND 9 – versions 9.11.0 to 9.16.50</li>
	<li>ISC BIND 9 – versions 9.18.0 to 9.18.46</li>
	<li>ISC BIND 9 – versions 9.20.0 to 9.20.20</li>
	<li>ISC BIND 9 – versions 9.21.0 to 9.21.19</li>
	<li>BIND Supported Preview Edition – versions 9.11.3-S1 to 9.16.50-S1</li>
	<li>BIND Supported Preview Edition – versions 9.18.11-S1 to 9.18.46-S1</li>
	<li>BIND Supported Preview Edition – versions 9.20.9-S1 to 9.20.20-S1</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://kb.isc.org/docs/cve-2026-1519">CVE-2026-1519: Excessive NSEC3 iterations cause high CPU load during insecure delegation validation</a></li>
	<li><a href="https://kb.isc.org/docs/cve-2026-3104">CVE-2026-3104: Memory leak in code preparing DNSSEC proofs of non-existence</a></li>
	<li><a href="https://kb.isc.org/docs/cve-2026-3119">CVE-2026-3119: Authenticated query containing a TKEY record may cause named to terminate unexpectedly</a></li>
	<li><a href="https://kb.isc.org/docs/cve-2026-3591">CVE-2026-3591: A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass</a></li>
	<li><a href="https://kb.isc.org/docs/aa-00913">BIND 9 Security Vulnerability Matrix</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-279</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/hitachi-security-advisory-av26-279"/><title><![CDATA[Hitachi security advisory (AV26-279) ]]></title><updated>2026-03-25T18:14:51Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7444" about="/en/alerts-advisories/hitachi-security-advisory-av26-279" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-279<br /><strong>Date: </strong>March 25, 2026</p>

<p>On March 25, 2026, Hitachi published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Hitachi Ops Center Administrator (Linux) – versions 10.2.0 to versions prior to 11.0.8</li>
	<li>Hitachi Infrastructure Analytics Advisor (English version, Linux) – all versions</li>
	<li>Hitachi Ops Center Analyzer (English version, Linux) – versions 10.0.0-00 to versions prior to 11.0.5-00</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-113/index.html">Open Redirect Vulnerability in Hitachi Ops Center Administrator (CVE-2026-1166)</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-114/index.html">Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer (CVE-2026-2072)</a></li>
	<li><a href="https://www.hitachi.com/products/it/software/security/index.html">Hitachi Vulnerability Information</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/n8n-security-advisory-av26-278</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/n8n-security-advisory-av26-278"/><title><![CDATA[n8n security advisory (AV26-278)]]></title><updated>2026-03-25T16:26:02Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7443" about="/en/alerts-advisories/n8n-security-advisory-av26-278" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-278<br /><strong>Date: </strong>March 25, 2026</p>


<p>On March 25, 2026, n8n published security updates to address vulnerabilities in the following products:</p>

<ul><li>n8n (Merge Node) – multiple versions</li>
<li>n8n (Community Edition) – multiple versions</li>
<li>n8n (Binary Data Inline HTML Rendering) – multiple versions</li>
<li>n8n (GSuiteAdmin Node) – multiple versions</li>
<li>n8n (Form Trigger/Chat Trigger Nodes) – multiple versions</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://github.com/n8n-io/n8n/security">n8n Security</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/nodejs-security-advisory-av26-277</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/nodejs-security-advisory-av26-277"/><title><![CDATA[Nodejs security advisory (AV26-277)]]></title><updated>2026-03-25T16:12:16Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7442" about="/en/alerts-advisories/nodejs-security-advisory-av26-277" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-277<br /><strong>Date: </strong>March 25, 2026</p>

<p>On March 24, 2026, Nodejs published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Node.js 20 – versions prior to v20.20.2 (LTS)</li>
<li>Node.js 22 – versions prior to v22.22.2 (LTS)</li>
    <li>Node.js 24 – versions prior to v24.14.1 (LTS)</li>
<li>Node.js 25 – versions prior to v25.8.2 (Current)</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://nodejs.org/en/blog/release/v20.20.2">Node.js 20.20.2 (LTS)</a></li>
	<li><a href="https://nodejs.org/en/blog/release/v22.22.2">Node.js 22.22.2 (LTS)</a></li>
  	<li><a href="https://nodejs.org/en/blog/release/v24.14.1">Node.js 24.14.1 (LTS)</a></li>
	<li><a href="https://nodejs.org/en/blog/release/v25.8.2">Node.js 25.8.2 (Current)</a></li>
	<li><a href="https://nodejs.org/en/blog/release/">Nodejs Releases</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av26-276</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/gitlab-security-advisory-av26-276"/><title><![CDATA[GitLab security advisory (AV26-276)]]></title><updated>2026-03-25T16:02:41Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7441" about="/en/alerts-advisories/gitlab-security-advisory-av26-276" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-276<br /><strong>Date: </strong>March 25, 2026</p>

<p>On March 25, 2026, GitLab published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>GitLab Community Edition (CE) – versions prior to 18.10.1, 18.9.3 and 18.8.7</li>
<li>GitLab Enterprise Edition (EE) – versions prior to 18.10.1, 18.9.3 and 18.8.7</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://about.gitlab.com/releases/2026/03/25/patch-release-gitlab-18-10-1-released/">GitLab Patch GitLab Patch Release: 18.10.1, 18.9.3, 18.8.7</a></li>
	<li><a href="https://about.gitlab.com/releases/categories/releases/">GitLab Releases</a></li>
</ul><!--CUT & PASTE the French version info --></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/control-systems-helmholz-security-advisory-av26-274</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/control-systems-helmholz-security-advisory-av26-274"/><title><![CDATA[[Control systems] Helmholz security advisory (AV26-274) ]]></title><updated>2026-03-24T16:22:48Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7439" about="/en/alerts-advisories/control-systems-helmholz-security-advisory-av26-274" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-274<br /><strong>Date: </strong>March 24, 2026</p>

<p>On March 23, 2026, CERT@VDE published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>Helmholz myREX24V2 – firmware versions 2.19.3 and prior</li>
	<li>Helmholz myREX24V2.virtual – firmware versions 2.19.3 and prior</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://certvde.com/en/advisories/VDE-2026-025/">Helmholz: Multiple Vulnerabilities in myREX24V2 / myREX24V2.virtual</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/f5-security-advisory-av26-273</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/f5-security-advisory-av26-273"/><title><![CDATA[F5 security advisory (AV26-273)]]></title><updated>2026-03-24T16:11:18Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7438" about="/en/alerts-advisories/f5-security-advisory-av26-273" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-273<br /><strong>Date: </strong>March 24, 2026</p>

<p>On March 24, 2026, F5 published a security advisory to address vulnerabilities in the following products:</p>

<ul><li>NGINX Plus – versions R32 to R36</li>
	<li>NGINX Open Source – versions 1.0.0 to 1.29.6 and 0.5.13 to 0.9.7</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://my.f5.com/manage/s/article/K000160336">K000160336: Out-of-band Security Notification (March 24, 2026) </a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av26-272</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av26-272"/><title><![CDATA[VMware security advisory (AV26-272)]]></title><updated>2026-03-24T16:01:17Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7437" about="/en/alerts-advisories/vmware-security-advisory-av26-272" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-272<br /><strong>Date: </strong>March 24, 2026</p>

<p>On March 24, 2026, VMware published a security advisory to address critical vulnerabilities in the following products:</p>

<ul><li>VMware Tanzu for Postgres – versions prior to 18.3.0</li>
	<li>VMware Tanzu for Postgres – versions prior to 17.9.0</li>
	<li>VMware Tanzu for Postgres – versions prior to 16.13.0</li>
	<li>VMware Tanzu for Postgres – versions prior to 15.17.0</li>
	<li>VMware Tanzu for Postgres – versions prior to 14.22.0</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37294">Product Release Advisory - VMware Tanzu for Postgres 18.3.0, 17.9.0, 16.13.0, 15.17.0, 14.22.0</a></li>
	<li><a href="https://support.broadcom.com/web/ecx/security-advisory?segment=VT">Security Advisories – Tanzu</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av26-271</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/mozilla-security-advisory-av26-271"/><title><![CDATA[Mozilla security advisory (AV26-271)]]></title><updated>2026-03-24T15:54:34Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7436" about="/en/alerts-advisories/mozilla-security-advisory-av26-271" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-271<br /><strong>Date: </strong>March 24, 2026</p>

<p>On March 24, 2026, Mozilla published security advisories to address vulnerabilities in the following products:</p>

<ul><li>Firefox – versions prior to 149</li>
	<li>Firefox ESR – versions prior to 115.34</li>
	<li>Firefox ESR – versions prior to 140.9</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/">Security Vulnerabilities fixed in Firefox 149</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-21/">Security Vulnerabilities fixed in Firefox ESR 115.34</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-22/">Security Vulnerabilities fixed in Firefox ESR 140.9</a></li>
	<li><a href="https://www.mozilla.org/en-US/security/advisories/">Mozilla Security Advisories</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-270</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/google-chrome-security-advisory-av26-270"/><title><![CDATA[Google Chrome security advisory (AV26-270)]]></title><updated>2026-03-24T15:49:08Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7435" about="/en/alerts-advisories/google-chrome-security-advisory-av26-270" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-270<br /><strong>Date: </strong>March 24, 2026</p>

<p>On March 23, 2026, Google published a security advisory to address vulnerabilities in the following product:</p>

<ul><li>Stable Channel Chrome for Desktop – versions prior to 146.0.7680.164/165 (Windows/Mac) and 146.0.7680.164 (Linux)</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html">Google Chrome Security Advisory</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av26-269</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/vmware-security-advisory-av26-269"/><title><![CDATA[VMware security advisory (AV26-269)]]></title><updated>2026-03-23T14:47:04Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7434" about="/en/alerts-advisories/vmware-security-advisory-av26-269" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-269<br /><strong>Date: </strong>March 23, 2026</p>

<p>On March 20, 2026, VMware published security advisories to address vulnerabilities in multiple Tanzu products.</p>

<p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link, perform the suggested mitigations and apply the necessary updates.</p>

<ul class="list-unstyled"><li><a href="https://support.broadcom.com/web/ecx/security-advisory?segment=VT">Security Advisories - Tanzu</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-268</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av26-268"/><title><![CDATA[Microsoft Edge security advisory (AV26-268)]]></title><updated>2026-03-23T14:36:39Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="7433" about="/en/alerts-advisories/microsoft-edge-security-advisory-av26-268" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV26-268<br /><strong>Date: </strong>March 23, 2026</p>

<p>On March 20, 2026, Microsoft published a security update to address vulnerabilities in the following product:</p>

<ul><li>Microsoft Edge Stable Channel – versions prior to 146.0.3856.72</li>
</ul><p class="mrgn-bttm-md">The Cyber Centre encourages users and administrators to review the provided web link and apply the necessary update.</p>

<ul class="list-unstyled"><li><a href="https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#march-20-2026">Microsoft Edge Stable Channel Release Notes</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry><entry><id>https://cyber.gc.ca/en/alerts-advisories/craft-cms-security-advisory-av25-300</id><link rel="alternate" href="https://cyber.gc.ca/en/alerts-advisories/craft-cms-security-advisory-av25-300"/><title><![CDATA[Craft CMS security advisory (AV25-300) – Update 1]]></title><updated>2026-03-23T14:35:40Z</updated><summary><![CDATA[]]></summary><content><![CDATA[<article data-history-node-id="6393" about="/en/alerts-advisories/craft-cms-security-advisory-av25-300" class="cccs-threats full clearfix">

  
    

  
  <div class="content">
      <div class="layout layout--onecol">
    <div  class="layout__region layout__region--content">
      
<div data-block-plugin-id="extra_field_block:node:cccs_threats:links" class="block block-layout-builder block-extra-field-blocknodecccs-threatslinks clearfix">
  
    

      
  </div>

<div data-block-plugin-id="field_block:node:cccs_threats:body" class="block block-layout-builder block-field-blocknodecccs-threatsbody clearfix">
  
    

      
            <div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p><strong>Serial number: </strong>AV25-300<br /><strong>Date: </strong>May 28, 2025<br /><strong>Updated:</strong> March 23, 2026</p>

<p>On April 7, 2025, Craft CMS published a security advisory to address a critical vulnerability in the following product:</p>

<ul><li>Craft CMS – versions prior to 9.15, 4.14.15 and 5.6.17</li>
</ul><p>Craft CMS has received reports that CVE-2025‑32432 has been exploited.</p>

<h2>Update 1</h2>

<p>On March 20, 2026, Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025‑32432 to their Known Exploited Vulnerabilities (KEV) Database.</p>

<p>The Cyber Centre encourages users and administrators to review the provided web links and apply the necessary updates, when available.</p>

<ul class="list-unstyled"><li><a href="https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432">Craft CMS and CVE-2025‑32432</a></li>
	<li><a href="https://craftcms.com/knowledge-base/security">Craft CMS Security Articles</a></li>
	<li><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32432">CISA KEV: CVE-2025‑32432</a></li>
</ul></div>
      
  </div>

    </div>
  </div>

  </div>

</article>
]]></content><author><name><![CDATA[Canadian Centre for Cyber Security]]></name></author></entry></feed>