<rss version="2.0">
    <channel>
        <title>Latest publications of type Security Advisories</title>
        <link>https://cert.europa.eu/publications/security-advisories/</link>
        <description>RSS feed for the latest 10 publications of type Security Advisories.</description>
        <ttl>1440</ttl>
        <language>en-gb</language>
        <item>
            <title>2026-004: Critical Vulnerability in SharePoint Exploited</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2026-004/
            </link>
            <description>On 17 March 2026, Microsoft updated one of its January 2026 security advisories related to a remote code execution vulnerability in Microsoft SharePoint. Specifically, Microsoft raised the CVSS score and changed the FAQ section to indicate that the vulnerability could be exploited by an unauthenticated attacker. This vulnerability was added in the CISA&#39;s Known Exploited Vulnerabilities (KEV) catalogue on 18 March 2026.&lt;br&gt;
Additionally, three further RCE flaws affecting Microsoft SharePoint were addressed in the March 2026 release.&lt;br&gt;
CERT-EU strongly recommends updating SharePoint servers as soon as possible, prioritising internet-facing assets. CERT-EU also encourages IT administrators to take necessary remediation actions.&lt;br&gt;
</description>
            <pubDate>Wed, 25 Mar 2026 08:51:39 CET</pubDate>
            <guid>security-advisories-10941</guid>
        </item><item>
            <title>2026-003: Multiple Vulnerabilities in Citrix NetScaler and Citrix ADC</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2026-003/
            </link>
            <description>On 23 March 2026, Citrix published a security advisory addressing multiple vulnerabilities affecting NetScaler ADC and NetScaler Gateway. These vulnerabilities may lead to sensitive information disclosure and user session mix-up under specific configurations.&lt;br&gt;
At the time of writing, there is no public evidence of active exploitation. It is strongly recommended updating affected gateways, prioritising internet-facing assets. It is also recommended to preserve evidence for further investigation.&lt;br&gt;
</description>
            <pubDate>Mon, 23 Mar 2026 19:03:59 CET</pubDate>
            <guid>security-advisories-10940</guid>
        </item><item>
            <title>2026-002: Multiple Vulnerabilities in Cisco Products</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2026-002/
            </link>
            <description>On 25 February 2026, Cisco released security advisories addressing multiple high and critical severity vulnerabilities in Cisco Catalyst SD-WAN controllers and Cisco SD-WAN Manager. If exploited, these vulnerabilities could allow attackers to gain administrative access to compromised systems. &lt;br&gt;
It is recommended to capture forensic evidence, hunt for indicators of compromise, and apply updates as soon as possible.&lt;br&gt;
One of the vulnerabilities, CVE-2026-20127, is exploited in the wild since 2023.&lt;br&gt;
</description>
            <pubDate>Thu, 26 Feb 2026 19:38:52 CET</pubDate>
            <guid>security-advisories-10939</guid>
        </item><item>
            <title>2026-001: Critical vulnerabilities in Ivanti EPMM</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2026-001/
            </link>
            <description>On 29 January 2026, Ivanti released a security advisory addressing two critical vulnerabilities in their EPMM products. An attacker could exploit those flaws to achieve unauthenticated remote code execution on the vulnerable device. One of these vulnerabilities have been exploited in a limited number of cases.&lt;br&gt;
</description>
            <pubDate>Fri, 30 Jan 2026 10:09:06 CET</pubDate>
            <guid>security-advisories-10938</guid>
        </item><item>
            <title>2025-042: Critical Vulnerability in Cisco Secure Email and Web Manager</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2025-042/
            </link>
            <description>On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products. &lt;br&gt;
It is recommended to follow Cisco&#39;s recommendations to check whether vulnerable appliances have been compromised, and to remediate the issue. There is no patch available for this vulnerability yet.&lt;br&gt;
</description>
            <pubDate>Thu, 18 Dec 2025 10:08:41 CET</pubDate>
            <guid>security-advisories-10937</guid>
        </item><item>
            <title>2025-041: Critical Security Vulnerability in React Server Components</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2025-041/
            </link>
            <description>On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests.&lt;br&gt;
It is recommended to update all affected component packages and any frameworks that integrate them.&lt;br&gt;
</description>
            <pubDate>Thu, 04 Dec 2025 14:50:51 CET</pubDate>
            <guid>security-advisories-10936</guid>
        </item><item>
            <title>2025-040: Critical Vulnerability in Windows Server Update Service (WSUS)</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2025-040/
            </link>
            <description>On October 23, 2025, Microsoft released an out-of-band update to address a critical vulnerability in Windows Server Update Service (WSUS). This vulnerability could allow a remote unauthenticated attacker to execute code on the targeted systems. A proof-of-concept is publicly available for this vulnerability.&lt;br&gt;
It is recommended to update as soon as possible.&lt;br&gt;
</description>
            <pubDate>Fri, 24 Oct 2025 18:42:26 CEST</pubDate>
            <guid>security-advisories-10935</guid>
        </item><item>
            <title>2025-039: High Severity Vulnerability in FortiOS</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2025-039/
            </link>
            <description>On October 14, 2025, Fortinet released a security advisory addressing a high severity vulnerability in its FortiOS product.&lt;br&gt;
It is recommended updating affected products.&lt;br&gt;
</description>
            <pubDate>Wed, 15 Oct 2025 20:41:33 CEST</pubDate>
            <guid>security-advisories-10934</guid>
        </item><item>
            <title>2025-038: Critical Vulnerabilities in Veeam Backup</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2025-038/
            </link>
            <description>On October 14, 2025, Veeam released a security advisory addressing multiple vulnerabilities including 2 critical in its Veeam Backup product.&lt;br&gt;
CERT-EU recommends updating affected software as soon as possible and following Veeam implementation best practices.&lt;br&gt;
</description>
            <pubDate>Wed, 15 Oct 2025 20:40:44 CEST</pubDate>
            <guid>security-advisories-10933</guid>
        </item><item>
            <title>2025-037: Multiple Vulnerabilities in F5 Products</title>
            <link>
                https://cert.europa.eu/publications/security-advisories/2025-037/
            </link>
            <description>On October 15, 2025, F5 disclosed that a sophisticated nation-state actor breached its systems and maintained long-term persistent access into F5&#39;s infrastructure. This included access to BIG-IP product development source code and to information related to security vulnerabilities that had not yet been disclosed nor patched. F5 released patches on the same day to address the vulnerabilities.&lt;br&gt;
There is currently no known exploitation of these vulnerabilities. CERT-EU strongly recommends to patch affected F5 products as soon as possible.&lt;br&gt;
</description>
            <pubDate>Wed, 15 Oct 2025 19:01:03 CEST</pubDate>
            <guid>security-advisories-10932</guid>
        </item>
    </channel>
</rss>