Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability
criticalLinux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

Known exploited vulnerabilities and urgent federal threat notices.
Vendor watch hub
The CISAwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
At a glance
Tracked
Active
Featured
Unique CVEs
Most recent entry
Apr 30, 2026, 7:00 PM
Feed refreshes daily · 5:15 a.m. Central
Sources·CISA Known Exploited Vulnerabilities catalog
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Showing the 20 most recent items, newest first. Each row links to the official advisory.
20 rows · sorted newest first
Operations viewLinux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.
WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.
Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.
Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.
D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.
SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.
Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.
Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.
PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. Known ransomware use: Known.
JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. Known ransomware use: Known.
Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.
Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.
Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.
Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.
Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.
Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information.
Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.
Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.
| Alert | Exposure | Status | Published | Source |
|---|---|---|---|---|
Linux Kernel Incorrect Resource Transfer Between Spheres VulnerabilityLinux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation. Kernel | criticalCVE-2026-31431 Critical | active | Apr 30, 2026, 7:00 PM | CISA KEVOpen source |
WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function VulnerabilityWebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel. cPanel & WHM and WP2 (WordPress Squared) | criticalCVE-2026-41940 Critical | active | Apr 29, 2026, 7:00 PM | CISA KEVOpen source |
ConnectWise ScreenConnect Path Traversal VulnerabilityConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems. ScreenConnect | criticalCVE-2024-1708 Critical | active | Apr 27, 2026, 7:00 PM | CISA KEVOpen source |
Microsoft Windows Protection Mechanism Failure VulnerabilityMicrosoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network. Windows | criticalCVE-2026-32202 Critical | active | Apr 27, 2026, 7:00 PM | CISA KEVOpen source |
Samsung MagicINFO 9 Server Path Traversal VulnerabilitySamsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority. MagicINFO 9 Server | criticalCVE-2024-7399 Critical | active | Apr 23, 2026, 7:00 PM | CISA KEVOpen source |
D-Link DIR-823X Command Injection VulnerabilityD-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. DIR-823X | criticalCVE-2025-29635 Critical | active | Apr 23, 2026, 7:00 PM | CISA KEVOpen source |
SimpleHelp Path Traversal VulnerabilitySimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user. SimpleHelp | criticalCVE-2024-57728 Critical | active | Apr 23, 2026, 7:00 PM | CISA KEVOpen source |
SimpleHelp Missing Authorization VulnerabilitySimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role. SimpleHelp | criticalCVE-2024-57726 Critical | active | Apr 23, 2026, 7:00 PM | CISA KEVOpen source |
Marimo Remote Code Execution VulnerabilityMarimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands. Marimo | criticalCVE-2026-39987 Critical | active | Apr 22, 2026, 7:00 PM | CISA KEVOpen source |
Microsoft Defender Insufficient Granularity of Access Control VulnerabilityMicrosoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally. Defender | criticalCVE-2026-33825 Critical | active | Apr 21, 2026, 7:00 PM | CISA KEVOpen source |
PaperCut NG/MF Improper Authentication VulnerabilityPaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class. Known ransomware use: Known. NG/MF | criticalCVE-2023-27351 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
JetBrains TeamCity Relative Path Traversal VulnerabilityJetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed. Known ransomware use: Known. TeamCity | criticalCVE-2024-27199 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor VulnerabilityCisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems. Catalyst SD-WAN Manager | criticalCVE-2026-20133 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs VulnerabilityCisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges. Catalyst SD-WAN Manger | criticalCVE-2026-20122 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format VulnerabilityCisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user. Catalyst SD-WAN Manager | criticalCVE-2026-20128 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Quest KACE Systems Management Appliance (SMA) Improper Authentication VulnerabilityQuest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials. KACE Systems Management Appliance (SMA) | criticalCVE-2025-32975 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Kentico Xperience Path Traversal VulnerabilityKentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations. Kentico Xperience | criticalCVE-2025-2749 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting VulnerabilitySynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. Zimbra Collaboration Suite (ZCS) | criticalCVE-2025-48700 Critical | active | Apr 19, 2026, 7:00 PM | CISA KEVOpen source |
Apache ActiveMQ Improper Input Validation VulnerabilityApache ActiveMQ contains an improper input validation vulnerability that allows for code injection. ActiveMQ | criticalCVE-2026-34197 Critical | active | Apr 15, 2026, 7:00 PM | CISA KEVOpen source |
Microsoft Office Remote Code ExecutionMicrosoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object. Office | criticalCVE-2009-0238 Critical | active | Apr 13, 2026, 7:00 PM | CISA KEVOpen source |
Related vendors
ITECS response pathways
These pathways connect the vendor watch feed into service-owner resources that already carry commercial authority.
Use the cybersecurity services pathway when this vendor alert needs an ITECS-managed response plan.
Connect the vendor watch page to broader managed detection, response, and governance planning.
Translate current watch items into a faster risk snapshot and prioritized remediation plan.
Return to the hub for cross-vendor prioritization, live filtering, and broader MSP threat context.
Vendor watch FAQ
It is the CISA-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
Use it to confirm whether current CISA issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Yes. ITECS can help map CISA advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.