network security

  1. CVE-2026-20182 KEV Alert: Cisco SD-WAN Authentication Bypass Now Actively Exploited

    On May 14, 2026, CISA added CVE-2026-20182, a Cisco Catalyst SD-WAN Controller authentication bypass vulnerability, to its Known Exploited Vulnerabilities Catalog after evidence showed the flaw is being actively exploited in the wild. The move is not just another entry in a federal spreadsheet...
  2. CVE-2026-32209 Patch Tuesday: WFP Security Feature Bypass Explained

    Microsoft disclosed CVE-2026-32209 on May 12, 2026, as a Windows Filtering Platform security feature bypass vulnerability in its May Patch Tuesday release, with public reporting so far confirming the CVE’s existence but offering little public detail about the underlying flaw. That is the story...
  3. Windows Update Fails When Proxies, Firewalls, VPNs, or DNS Break TLS Trust

    Microsoft’s latest Windows Update guidance says devices that cannot scan, download, or validate updates are often being stopped by proxy, firewall, VPN, or DNS rules that fail to pass Microsoft’s update subdomains through untouched. The practical message is blunt: Windows Update is not just “web...
  4. CVE-2026-31420 Bridge MRP Zero Interval Can Panic Kernel

    The Linux kernel has another networking-focused security fix on its hands, and this one is a classic example of how a tiny input-validation oversight can escalate into a system-wide stability problem. CVE-2026-31420 affects the bridge MRP path, where a zero test interval supplied through netlink...
  5. CVE-2026-23442 SRv6 Kernel Bug: NULL idev Dereference in IPv6 Routing Paths

    CVE-2026-23442 is a small-looking Linux kernel fix with the kind of operational consequences that make networking teams sit up and take notice. The vulnerability centers on IPv6 Segment Routing over IPv6 (SRv6) paths, where the kernel can end up dereferencing a NULL idev pointer if the device...
  6. CVE-2026-5107: FRR EVPN Type-2 access control flaw in bgp_evpn.c

    The reported CVE-2026-5107 in FRRouting’s FRR EVPN Type-2 route handling is notable because it points at a control-plane path that sits at the center of modern data-center overlays. According to the Microsoft Security Response Center entry, the issue is tied to bgp_evpn.c, specifically...
  7. CVE-2026-23276: Linux Kernel Fix for Tunnel Recursion Loops in Bond Broadcast

    CVE-2026-23276 is a reminder that some of the most dangerous kernel bugs are not glamorous buffer overflows or obvious use-after-free defects, but control-flow problems that only emerge under very specific network topologies. In this case, the Linux kernel fix closes an infinite recursion path...
  8. Microsoft Launches MAI-Image-2 With Major Boost to AI Image Realism

    Microsoft’s MAI-Image-2 is shaping up as more than a routine model refresh; it looks like a strategic attempt to make AI image generation feel less synthetic, more useful, and more deeply embedded in Microsoft’s own ecosystem. The company is clearly aiming at a different end state than a flashy...
  9. CVE-2026-23154: Linux Kernel GSO/GRO Fraglist Forwarding Fix Explained

    This Linux kernel fix is a small patch with an outsized networking lesson: when packet forwarding meets Generic Receive Offload and Generic Segmentation Offload, tiny assumptions about packet layout can turn into real-world throughput problems. CVE-2026-23154 tracks a fraglist forwarding bug in...
  10. CISA Adds CVE-2026-20131 to KEV Catalog: Cisco FMC/SCC Deserialization Risk

    The latest CISA KEV update is a reminder that some of the most dangerous vulnerabilities are not necessarily the most complicated—they are the ones that security teams already know how to classify, but still struggle to contain quickly. On March 19, 2026, CISA added CVE-2026-20131 to its Known...
  11. CVE-2019-14199 UDP Underflow in U-Boot Causes Remote Memory Corruption

    An integer underflow in the network handling code of Das U-Boot through version 2019.07 makes it possible for a maliciously crafted UDP packet to trigger an unbounded memcpy, allowing remote attackers to corrupt memory and potentially execute code in the pre-boot environment. The flaw, tracked...
  12. CVE-2019-14201 U-Boot NFS Overflow Case Study and Patching Lessons

    An exploitable stack-based buffer overflow in U-Boot’s NFS reply handling — tracked as CVE-2019-14201 — exposed a broad class of embedded devices to remote compromise when U-Boot’s network boot features were enabled, and the resulting disclosure, patching and follow-up regressions offer a...
  13. Understanding U-Boot NFS Vulnerabilities: CVE-2019-14196 to CVE-2022-30767

    Das U-Boot suffered a dangerous parsing bug that was disclosed in mid‑2019: an unbounded memcpy in the NFS reply handling code could be driven by attacker‑controlled packet fields, allowing remote memory corruption and, in many configurations, remote code execution on devices that use network...
  14. CVE-2026-0386: Adjacent Network RCE in Windows Deployment Services

    Microsoft has confirmed a new security record — CVE-2026-0386 — tied to Windows Deployment Services (WDS) that, according to the vendor entry, stems from an improper access control issue capable of enabling remote code execution by an unauthenticated actor on an adjacent network. This is a...
  15. Linux atlantic Driver CVE-2025-68301 Fix and Mitigation

    The Linux kernel received a targeted patch closing CVE‑2025‑68301, a fragmentation-handling flaw in the in‑tree atlantic network driver that can produce an out‑of‑bounds write in skb_add_rx_frag_netmem and cause kernel panic on systems using Aquantia/Marvell AQtion family NICs; maintainers...
  16. CVE-2025-61104: FRR OSPF NULL Pointer DoS and Patch Guide

    FRRouting's OSPF implementation contains a NULL-pointer dereference that can be triggered by a crafted OSPF packet, allowing remote attackers to crash the OSPF daemon (ospfd) and cause a Denial of Service (DoS) for routers and appliances using vulnerable FRR releases. Background FRRouting (FRR)...
  17. CVE-2025-61106: FRR OSPF NULL Pointer DoS (v4.0 to v10.4.1)

    FRRouting (FRR) versions from v4.0 through v10.4.1 contain a NULL pointer dereference in the OSPF code that can be triggered by a crafted OSPF packet, allowing an attacker to crash the ospfd daemon and cause a Denial of Service (DoS) across affected deployments. Background FRRouting (commonly...
  18. CVE-2025-38350: Linux Kernel Patch Fixes Qdisc Use-After-Free

    The Linux kernel patch for CVE-2025-38350 fixes a subtle but recurring logic gap in the traffic‑control (net/sched) classful qdisc handling that can lead to a use‑after‑free when a child qdisc unexpectedly goes empty during an enqueue operation, and operators should treat multi‑tenant and...
  19. SOAPwn: .NET SOAP WSDL flaw for file writes and RCE

    Security research presented at Black Hat Europe has pulled back the curtain on a surprising and dangerous interaction between legacy .NET SOAP client proxies and Web Services Description Language (WSDL) imports — a design quirk that lets SOAP clients be coerced into writing arbitrary files and...
  20. CVE-2025-40321: Upstream fix stops brcmfmac NULL pointer crash in standalone AP mode

    A small but dangerous bug in the Broadcom Linux wireless driver has been fixed upstream: CVE-2025-40321 addresses a NULL-pointer crash in brcmfmac that occurs when the driver attempts to send Wi‑Fi Action Frames while running in standalone AP mode (hostapd-only). The flaw can be triggered by an...