MSP Threat Radar Weekly Briefing — Week of 2026-04-27

This week’s briefing tracks 12 recent watch items across 5 vendors, with emphasis on active service incidents and high-priority operational issues.

Briefing detail

About this briefing

Published

May 2, 2026

Read time

2 min read

Highlights

5 key items

This week's highlights

  • Linux Kernel: Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability
  • Connectwise: ConnectWise ScreenConnect Path Traversal Vulnerability
  • Cpanel: cpanel vulnerability (CVE-2026-41940)
  • Microsoft: Microsoft Windows Protection Mechanism Failure Vulnerability
  • Microsoft: net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption (CVE-2026-31533)

Full briefing

Markdown rendered

MSP Threat Radar Weekly Briefing — Week of 2026-04-27

This week’s briefing tracks 12 recent watch items across 5 vendors, with emphasis on active service incidents and high-priority operational issues.

Top items

Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due date: 2026-05-15.

ConnectWise ScreenConnect Path Traversal Vulnerability

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due date: 2026-05-12.

cpanel vulnerability (CVE-2026-41940)

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Review affected assets, prioritize patch validation, and map remediation against managed client inventory.

Microsoft Windows Protection Mechanism Failure Vulnerability

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due date: 2026-05-12.

net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption (CVE-2026-31533)

Information published. Information published.

Customer action is required. Review the Security Update Guide entry, confirm affected Microsoft products, and prioritize patch validation or mitigation.

Adjacent briefings

Move through the archive