Saturday, April 11, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Friday's disclosures reveal significant exposure across AWS services, with CVE-2026-40175 (CVSS 10.0) enabling IMDSv2 bypass and CVE-2026-5058/CVE-2026-5059 (CVSS 9.8) affecting AWS CLI and aws-mcp-server. Twenty critical vulnerabilities were disclosed, a 39% decrease from the prior day's 33, while 100 high-priority CVEs held steady. Additional critical flaws include CVE-2026-4149 (CVSS 10.0) in Sonos Era 300 smart speakers, CVE-2026-5412 (CVSS 9.9) in Canonical Juju, and CVE-2026-34621 (CVSS 9.6) in Adobe Acrobat Reader. Remote code execution and authentication bypass patterns dominate, spanning cloud infrastructure, consumer IoT, and document processing software. No patches are currently available for any disclosed vulnerabilities, requiring defenders to prioritize compensating controls and network-level mitigations.

  • Three AWS services affected by critical vulnerabilities: IMDSv2 bypass (CVSS 10.0), CLI command injection (CVSS 9.8), and MCP server flaw (CVSS 9.8)
  • 20 critical CVEs disclosed, down 39% from the prior day's 33; two carry maximum CVSS 10.0 scores
  • 100 high-priority CVEs unchanged from the prior day, maintaining elevated disclosure volume
  • RCE and authentication bypass dominate attack patterns across Sonos IoT devices, Adobe Acrobat Reader, Canonical Juju, and Totolink routers
  • Zero patches available across all 120 disclosed vulnerabilities β€” compensating controls required
  • 2 actively exploited vulnerabilities identified in Google Dawn and TrueConf Client (both CVSS 9.5)

Immediate action: Prioritize AWS environments for immediate review β€” audit IMDSv2 configurations, restrict AWS CLI and MCP server access, and apply network segmentation around Sonos Era 300 and Totolink A7100RU devices. With no patches currently available for any of the 120 disclosed CVEs, implement WAF rules, disable unnecessary services, and monitor for exploitation indicators on Google Dawn and TrueConf Client.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation