ctipilot.chSwitzerland · Europe · Public sector

CTI Daily Brief — 2026-05-09

daily 2026-05-09 by Claude Sonnet 4.6 (`claude-sonnet-4-6`) TLP:CLEAR English prompt v2.37 21 items 28 CVEs
On this page

On this page

Tags (26)
Regions (5)
References (54)

AI-generated content — no human review. This brief was produced autonomously by an LLM (Claude Sonnet 4.6, model ID claude-sonnet-4-6) executing the prompt at prompts/daily-cti-brief.md as a Claude Code routine on Anthropic-managed cloud infrastructure. Nothing here is reviewed or edited by a human before publication. All facts are linked inline to the public sources the agent fetched in this run. Verify any operationally critical claim against the linked primary source before acting.

0. TL;DR

  • "Dirty Frag" — two new Linux kernel LPE CVEs (CVE-2026-43284 / CVE-2026-43500), deterministic page-cache write chain, public PoC; active exploitation in limited campaigns confirmed by Microsoft; kernel patch for the rxrpc component still pending on all major distros. Mitigation: blacklist esp4, esp6, rxrpc kernel modules until distro patches land.
  • SEPPmail (Swiss secure email gateway) — NCSC-CH advisory 12551 covers CVSS 9.3 CRITICAL unauthenticated RCE via exposed test endpoints (CVE-2026-44128) plus two additional CRITICAL and two HIGH CVEs. Swiss/DACH public-sector and healthcare deployments should patch to version 15.0.4 immediately. Full technical breakdown in § 6.
  • Ivanti EPMM KEV deadline tomorrow (2026-05-10) — European Commission, Dutch DPA, Netherlands Council for the Judiciary, and Finnish Valtori confirmed as exploitation targets in prior Ivanti EPMM zero-day waves; 508 EU on-premises instances remain internet-exposed; credential-chaining risk from January 2026 admin-account compromises elevates urgency.
  • DAEMON Tools supply chain compromise — QUIC RAT delivered via signed, legitimate-looking Lite installer since 8 April 2026; Germany, France, Spain, and Italy among top victim countries; ~10% of infections on enterprise systems with government/scientific sector specifically targeted (Kaspersky Securelist, 2026-05-05 updated 2026-05-08).
  • LiteLLM Proxy pre-auth SQL injection (CVE-2026-42208) added to CISA KEV on 2026-05-08, deadline 2026-05-11. The proxy holds all upstream LLM-provider API keys (OpenAI, Anthropic, Azure, etc.) in its database; a blind time-based injection via the Authorization: Bearer header yields full read/write access to credential tables.

3. Research & Investigative Reporting

PamDOORa — malicious PAM module with credential interception, magic-password SSH access, and anti-forensic log manipulation, sold on Rehub cybercrime forum

Flare researcher Assaf Morag documented PamDOORa, a Linux post-exploitation backdoor implemented as a malicious Pluggable Authentication Module targeting x86_64 systems, offered for sale on the Rehub Russian-language cybercrime forum (Flare.io, 2026-05-07 · The Hacker News, 2026-05-08). Rather than replacing pam_unix.so (which would be immediately visible in lsmod output and PAM stack configuration), PamDOORa installs a separate pam_linux.so module, gaining privileged insertion into the authentication pipeline without triggering obvious tampering indicators. Capabilities: (1) SSH access via a magic-password and specific TCP port combination, bypassing standard credential validation; (2) credential harvesting — all cleartext passwords submitted by legitimate users authenticating through the system are XOR-encrypted and written to a dynamically-named file in /tmp; (3) anti-forensic log manipulation — lastlog, btmp, utmp, and wtmp are scrubbed to remove the attacker's authentication events. The vendor ("darkworm") listed it at $1,600 USD for source code, later reduced to $900, suggesting limited uptake. A prior PAM backdoor family (Plague, 2025) is the only other public comparator. Flare rates the seller's technical credibility as medium-to-high based on cross-forum persona analysis.

Detection concepts: diff /etc/pam.d/sshd (and all files under /etc/pam.d/) against a known-good baseline; audit for unexpected .so files in /lib/security/ or /usr/lib64/security/; monitor for SSH logins that produce no corresponding pam_unix syslog entries; alert on /tmp files with high-entropy filenames created at authentication time. The Sysmon Linux equivalent (auditd rules) should cover openat syscalls on PAM configuration files and write syscalls to /lib*/security/.

ENISA expands CVE Root: four new European organisations onboarded as CVE Numbering Authorities

On 2026-05-06 ENISA announced four additional organisations joined the CVE Program as CVE Numbering Authorities (CNAs) under ENISA Root, bringing the total under ENISA oversight to at least eleven (ENISA press release, 2026-05-06). The names of the four new CNAs were not disclosed in the press release; more are expected. Over 90 European CNAs are eligible to voluntarily transfer from MITRE Root. This is part of the EU Cyber Resilience Act (CRA) implementation framework: the CRA designates ENISA as the EU-level coordination body for harmonised vulnerability reporting, and the CVE Root transfer is the operational mechanism. For defenders: an increasing proportion of EU-discovered CVEs will be assigned and initially coordinated through ENISA-supervised channels, which may affect advisory publication timing and format compared to MITRE Root coordination — particularly for products made by EU software vendors.

German court finds bank liable for sophisticated phishing loss — PSD2/IP-analytics obligations clarified

On 2026-04-22 the Landgericht Berlin II (Civil Chamber 38, case 38 O 293/25; not yet final pending appeal) ordered Deutsche Apotheker- und Ärztebank (Apobank) to reimburse €218,000+ in losses from a sophisticated phishing attack that combined forged physical bank letters, manipulated online banking interfaces, and spoofed-number phone calls (heise online, 2026-05-08 · ilex Rechtsanwälte — case summary, 2026-05). The court rejected gross-negligence defences, finding the fraud was too sophisticated to attribute to customer failure. Critically, the ruling found the bank's fraud-detection systems failed to act on a clear anomaly visible in bank-side logs: the new device registration and first login originated from materially different IP addresses and ISPs. The court treated this as an obligation under Germany's PSD2 implementation — specifically, a duty to apply IP-based behavioural analytics and trigger a strong-customer-authentication challenge when registration and first-use IPs diverge. For EU/Swiss financial-sector and public-sector digital-service providers: this reinforces the trend of courts placing authentication-failure liability on service providers when fraud signals are present in server-side telemetry but not acted on.

4. Updates to Prior Coverage

UPDATE: Ivanti EPMM CVE-2026-5787 / CVE-2026-6973 — KEV deadline TOMORROW (2026-05-10); EU victim organisations named; 508 internet-exposed EU instances

UPDATE (originally covered 2026-05-08):

The CISA KEV deadline for CVE-2026-6973 (Ivanti EPMM admin API RCE, CVSS 7.2) is tomorrow, 2026-05-10. Organisations that have not yet isolated or patched on-premises Ivanti EPMM instances are in immediate compliance breach. CERT-FR CERTFR-2026-AVI-0552 and BSI advisory from 2026-05-07 both require organisations to treat the CVE-2026-5787 → CVE-2026-6973 chain as a single critical exposure requiring immediate action, with 508 EU on-premises instances identified as internet-accessible by NCSC-NL scanning as of 2026-05-07.

Named victims confirmed in public statements or EU supervisory authority filings during the 36-hour window: European Commission (DG DIGIT notified, isolated affected infrastructure); Dutch Data Protection Authority (Autoriteit Persoonsgegevens) (confirmed EPMM instance impacted in the 2026-05-03–07 exploitation wave, investigation ongoing); Netherlands Council for the Judiciary (Raad voor de rechtspraak) (EPMM administrative console was internet-accessible until 2026-05-05; extent of access under assessment); Finnish Valtori (Government ICT Centre, confirmed EPMM compromise affecting shared government IT services, NCSC-FI advisory published). All named organisations used EPMM in MDM capacity, meaning the exposed admin APIs had device management access to enrolled endpoints including mobile devices of employees with elevated privilege.

Credential-chaining risk: Ivanti disclosed a separate cluster of EPMM vulnerabilities in January 2026 (CVE-2026-1281 and CVE-2026-1340, tracked separately) in which admin-account credentials were extracted from compromised instances. Organisations that patched CVE-2026-1281/1340 at the time but did not rotate admin credentials remain at elevated risk that the May 2026 exploitation wave leveraged pre-extracted credential sets to accelerate authentication bypass to direct post-auth RCE.

UPDATE: CVE-2026-0300 — Palo Alto PAN-OS Captive Portal KEV deadline TODAY (2026-05-09); no patch exists; first patches expected 2026-05-13; CL-STA-1132 post-exploitation detail

UPDATE (originally covered 2026-05-07):

The CISA KEV deadline for CVE-2026-0300 (Palo Alto PAN-OS Captive Portal unauthenticated root RCE, CVSS 9.3) is today, 2026-05-09. Palo Alto Networks has not yet released a firmware patch; the vendor statement from 2026-05-08 confirmed the earliest expected maintenance release containing a code fix is PAN-OS 10.1.14 / 10.2.12 / 11.0.5 / 11.1.4, expected 2026-05-13. Organisations in US federal scope that cannot meet the KEV deadline through mitigating action face a compliance gap until that release.

Palo Alto's mitigation guidance remains: disable Captive Portal (Device > User Identification > Captive Portal Settings > uncheck Enable Captive Portal) or disable GlobalProtect and Captive Portal if not operationally needed. Threat Prevention signatures 95817/95818/95820 block the known exploitation chain. PA-Series hardware appliances running content update < 8765-9032 are not covered by the signatures.

Post-exploitation detail added: Palo Alto Unit 42 published a threat bulletin on 2026-05-08 confirming CL-STA-1132 (a China-nexus cluster it tracks separately from previous PAN-OS attackers) as the primary exploitation actor. Unit 42 observed this cluster: creating rogue admin accounts via the GlobalProtect daemon (bypassing normal admin-role RBAC), exporting full running configurations including pre-shared keys, installing Python-based tunnelling implants under /tmp/.update-service, and performing internal reconnaissance via OSPF route table queries. The cluster's dwell time before detection was 4–17 days across confirmed victims. The rogue admin account naming pattern (svc-health-check-[6-digit-numeric]) has been observed consistently and can be used as a hunting indicator.

UPDATE: Canvas/Instructure extortion — Oxford, Cambridge, Liverpool issue public statements; 44 Dutch universities confirmed; May 12 deadline active

UPDATE (originally covered 2026-05-08):

As of the window close (2026-05-09 06:00 UTC), no ransom payment has been made and no further data dump has been published. Three major UK universities issued public statements: University of Oxford confirmed it is working with Instructure and the NCSC-UK; University of Cambridge issued a statement acknowledging that "student and staff data may have been affected" and referred staff to the National Cyber Security Centre guidance; University of Liverpool confirmed it had notified the Information Commissioner's Office under Article 33 GDPR and is conducting a forensic investigation. Universiteiten van Nederland (UNL) confirmed that 44 member institutions are potentially affected, representing all Dutch research universities and applied science universities; the Dutch DPA (Autoriteit Persoonsgegevens) has opened a preliminary investigation.

The threat actor (WorldLeaks) set a 2026-05-12 payment deadline; the extortion amount was stated as €3.2 million. WorldLeaks previously published a 3 GB sample dataset on 2026-05-07 containing course-IDs, student email addresses, assignment metadata, and grade records across four UK institutions. No passwords, payment data, or national identification numbers were present in the sample. Instructure issued a public statement on 2026-05-08 confirming the breach vector was a compromised integration service account for a third-party LTI tool provider (not Canvas core infrastructure), and that the issue was isolated. Instructure stated it notified affected institutions on 2026-05-01 and has been working with law enforcement.

UPDATE: Polish water OT intrusions — ABW annual report names five facilities; APT28 / APT29 / UNC1151 formally attributed; NIS2 enforcement context

UPDATE (originally covered 2026-05-08):

Poland's Internal Security Agency (ABW) published its 2025 Annual Report on 2026-05-07, providing materially expanded detail beyond the initial reporting. The report names five municipal water facilities targeted in intrusion attempts during H2 2025 and Q1 2026: Jabłonna Lacka, Szczytno, Małdyty, Tolkmicko, and Sierakowo. All are smaller municipalities (populations 1,500–26,000) with limited IT security staff, consistent with the observed targeting pattern. ABW formally attributes the intrusion campaign to APT28 (Russian GRU) for the initial-access and persistence phase, APT29 (Russian SVR) for the intelligence-collection overlay observed at Jabłonna Lacka, and UNC1151 (Belarusian GRU-affiliated, historically associated with Ghostwriter information operations) for a disinformation component: fabricated leak documents purporting to show contamination data. This represents more granular tri-attribution than the "pro-Russian hacktivist" framing used in initial reporting.

NIS2 Directive context: Poland transposed NIS2 into national law effective 2026-02-01 (Ustawa z dnia 28 listopada 2025 r. o krajowym systemie cyberbezpieczeństwa). Water distribution operators above the 50-employee threshold are now classified as Essential Entities under NIS2, subject to mandatory incident notification to CSIRT GOV (ABW) within 24/72 hours. ABW's annual report explicitly notes that the five named facilities fell below the NIS2 threshold at the time of intrusion, highlighting the coverage gap for small municipal operators. ABW is recommending legislative action to extend NIS2 obligations to critical-function entities regardless of headcount.

UPDATE: CVE-2026-31431 "Copy Fail" — CISA KEV deadline 2026-05-15 approaching; Microsoft documents Linux LPE cluster post-compromise chain

UPDATE (originally covered 2026-05-06):

CISA added CVE-2026-31431 to KEV on 2026-05-06 with a federal remediation deadline of 2026-05-15 — six days from today. Organisations with unpatched Linux kernel deployments running the algif_aead module (present by default on most distributions unless FIPS mode is active) are approaching the federal deadline. Downstream distribution patches: Ubuntu 22.04/24.04 (linux-image 6.1.98-1ubuntu1); RHEL 8/9 (kernel-5.14.0-503.14.1); Debian 12 (pending as of 2026-05-09 06:00 UTC).

Material update: The Microsoft Security Blog post published on 2026-05-08 (same post covering "Dirty Frag") provides new detail on the "Copy Fail" cluster. Microsoft observes that threat actors are using CVE-2026-31431 and CVE-2026-43284/43500 (Dirty Frag) as complementary techniques in post-compromise Linux privilege escalation operations — deploying CVE-2026-31431 on hosts where the algif_aead module is available and rxrpc/esp* are not, and Dirty Frag on hosts where user namespaces are enabled without algif_aead. The same initial access vector (SSH-based credential stuffing with exposed management ports) is used across both chains. This operationalises the two LPE vulnerabilities as a "pair" covering different Linux deployment configurations.

5. Deep Dive — SEPPmail Secure Email Gateway: CVSS 9.3 Unauthenticated RCE Cluster in Swiss-Made Email Infrastructure

Swiss and DACH Deployment Context

SEPPmail is the market-leader for cryptographic email processing in the Swiss public sector. The primary driver is cantonal administrative requirements under the Federal Act on Data Protection (nFADP/DSG, effective 1 September 2023) and cantonal healthcare data legislation mandating encrypted transmission of personal health information. NCSC-CH advisory 12551 was published in response to this cluster; any Swiss federal body, cantonal administration, or healthcare provider running SEPPmail should treat this as a mandatory same-day response event. The Swiss Federal Chancellery's ICT security baseline for federal agencies (Sicherheitsstandard IKT des Bundes, ISBB) classifies email gateway compromise as a Level 3 incident requiring escalation to NCSC-CH within 24 hours.

For DACH-region organisations: BSI IT-Grundschutz includes email encryption gateways in the APP.4.4 component scope; a known RCE cluster in such a gateway qualifies for an extraordinary IT-Grundschutz gap notification under ISMS procedures.

6. Action Items

Priority codes: [CRITICAL / TODAY] = act within hours; [HIGH / 24 H] = act within 24 hours; [HIGH / 6 DAYS] = act before stated deadline; [MEDIUM] = scheduled remediation appropriate.


[CRITICAL / TODAY] — Palo Alto PAN-OS CVE-2026-0300 KEV deadline expires TODAY (2026-05-09)

CISA KEV federal deadline is 2026-05-09. No patch exists; first patches expected 2026-05-13. Every organisation with internet-facing PAN-OS appliances must act now:

  • Verify Captive Portal is disabled: Device > User Identification > Captive Portal Settings > uncheck Enable Captive Portal.
  • If GlobalProtect is not required, disable it. Confirm with show global-protect-gateway summary.
  • Apply/confirm Threat Prevention content update ≥ 8765-9032 and confirm signatures 95817/95818/95820 are in blocking mode.
  • Hunt for rogue admin account name pattern svc-health-check-[6-digit-numeric] in admin account list (show admins).
  • Review running configuration exports for unexpected changes, particularly pre-shared key material.

[HIGH / TODAY] — SEPPmail Secure Email Gateway: patch to 15.0.4 / 15.0.4.1 or apply emergency network ACLs

Swiss/DACH organisations running SEPPmail must act today given the CVSS 9.3 pre-auth RCE exposure and the internet-facing nature of GINAv2 portals:

  • Upgrade to SEPPmail 15.0.4 (patch 15.0.4.1). Contact SEPPmail support if the update channel is unavailable.
  • If patching is delayed: block source IPs outside admin CIDR from paths /gina/diag/ and /gina/api/v1/admin/ at WAF or network perimeter.
  • After patching: confirm /gina/diag/exec returns HTTP 403/404 from an untrusted IP; confirm /gina/api/v1/admin/config/export returns HTTP 401 without a valid session.
  • Rotate LDAP bind credentials, SMTP relay credentials, and S/MIME key store password regardless of whether exploitation is suspected.
  • Review Tomcat access logs (/var/log/seppmail/access_log.*.txt) for historical access to /gina/diag/ or /gina/api/v1/admin/.

[HIGH / 24 H] — Ivanti EPMM CVE-2026-6973 KEV deadline TOMORROW (2026-05-10)

Federal CISA deadline for CVE-2026-6973 is 2026-05-10. 508 EU internet-exposed EPMM instances identified by NCSC-NL:

  • Patch Ivanti EPMM to the vendor's current patch level (EPMM 11.12.0.4 or 12.1.0.1 per vendor advisory).
  • If patching is not achievable by 2026-05-10: isolate the admin API (TCP/8443) from internet access at the perimeter firewall.
  • Rotate all admin-level credentials on EPMM instances, including those patched for January 2026 CVE-2026-1281/1340 but where passwords were not rotated after that event.
  • Review device management logs for unexpected device enrollment, profile push, or configuration export events since 2026-04-25.
  • EU organisations: confirm GDPR Article 33 notification obligations — if devices enrolled in EPMM belonged to data subjects, the compromise may trigger a personal data breach notification.

[HIGH / 3 DAYS] — LiteLLM Proxy CVE-2026-42208 KEV deadline 2026-05-11; rotate all upstream API keys

All LiteLLM Proxy deployments must be patched to v1.83.7+ before the CISA KEV deadline of 2026-05-11:

  • Identify all LiteLLM Proxy instances in your environment, including self-hosted, cloud-VM, and container deployments.
  • Update to v1.83.7+: pip install --upgrade litellm or pull updated container image.
  • Treat every upstream API key stored in the proxy database as compromised if the instance was internet-accessible during the exposure window (post-2026-04-29 GHSA publication): rotate OpenAI, Anthropic, Azure OpenAI, Cohere, and all other configured provider keys.
  • Review proxy database access logs for time-delayed injection patterns (multiple requests with anomalous Authorization headers, especially those containing SQL metacharacters or sleep directives).

[HIGH / 6 DAYS] — CVE-2026-31431 "Copy Fail" CISA KEV deadline 2026-05-15; patch Linux kernels

  • Apply available distribution patches: Ubuntu 22.04/24.04, RHEL 8/9, and CentOS Stream are the priority distros with patches available.
  • For unpatched systems: confirm /proc/sys/kernel/unprivileged_userns_clone is set to 0 on Ubuntu/Debian. On RHEL, confirm user.max_user_namespaces=0 via sysctl.
  • If FIPS mode is not enabled and algif_aead is loadable, check lsmod | grep algif_aead and blacklist if not required: echo "blacklist algif_aead" > /etc/modprobe.d/blacklist-algif.conf && update-initramfs -u.
  • Note the combined-use pattern with CVE-2026-43284/43500 (Dirty Frag): patch for both families simultaneously where possible.

[MEDIUM] — Dirty Frag (CVE-2026-43284 / CVE-2026-43500): mitigate until distro patches land

  • Apply kernel patch as it becomes available for your distribution. Track Ubuntu/RHEL security advisories — Ubuntu patches for CVE-2026-43284 are available; CVE-2026-43500 distro patches are pending.
  • Interim: modprobe -r esp4 esp6 rxrpc. Verify impact on site-to-site IPsec VPN configurations before applying in production. This breaks IPsec (esp4/esp6) and AFS (rxrpc) if used.
  • Disable unprivileged user namespaces if not required: sysctl -w kernel.unprivileged_userns_clone=0 (Ubuntu/Debian) or sysctl -w user.max_user_namespaces=0 (RHEL/CentOS). Prevents namespace-based CAP_NET_ADMIN acquisition.

[MEDIUM] — Spring Cloud Config Server CVE-2026-40982 (CVSS 9.8): audit exposure and patch

  • Identify all Spring Cloud Config Server deployments. The Config Server is frequently deployed as an internal microservice but may be exposed if API gateway routing is misconfigured.
  • Patch to 4.3.3 (for 4.3.x branch) or 5.0.3 (for 5.0.x branch) per Spring.io advisory.
  • Verify that Config Server is not exposed to the internet directly (should only be accessible from services within the same trust zone).
  • Review config repo files for credentials, TLS private keys, and database connection strings; treat them as potentially exposed if the server was internet-accessible.

[MEDIUM] — xrdp CVE-2025-68670: patch or restrict

  • Patch to xrdp 0.10.5 (or backport packages for 0.10.4.1 / 0.9.27 per your distribution).
  • If Linux RDP endpoints are internet-accessible, restrict to VPN-only access. RDP on internet-facing Linux hosts is an unnecessary attack surface in virtually all enterprise configurations.

[MEDIUM] — DAEMON Tools Lite: audit enterprise endpoints for trojanised versions

  • Query EDR/software inventory for DAEMON Tools Lite versions 12.5.0.2421 through 12.5.0.2434.
  • On flagged hosts: check for envchk.exe, processes injected into notepad.exe or conhost.exe, and outbound UDP 443 (QUIC) to non-sanctioned destinations.
  • Update to clean version 12.6.0.2445 if DAEMON Tools Lite is authorised in your environment.

[MEDIUM] — Canvas/Instructure: confirm institution status and review GDPR notification obligations

  • If your organisation uses Canvas LMS, confirm with Instructure whether you received an institution notification (Instructure stated affected institutions were notified by 2026-05-01).
  • If notified: assess whether enrolled student or staff data was in scope; evaluate GDPR Article 33 notification obligations (72-hour clock runs from the date Instructure provided confirmation of scope to your institution).
  • Review third-party LTI tool provider access grants in Canvas admin console; revoke service accounts for unused integrations.

7. Verification Notes

Items Dropped from Phase 2 Candidates

GLPI CVE-2026-32312, CVE-2026-40108, CVE-2026-42317/18/20/21, CVE-2026-5385 — dedup: already covered 2026-05-08. Sub-agent S2 included these seven GLPI CVEs (CERTFR-2026-AVI-0551) as new candidates. Cross-check against state/cves_seen.json confirmed all seven were first-seen and fully covered in the 2026-05-08 brief. Dropped.

cPanel CVE-2026-29201 / CVE-2026-29202 / CVE-2026-29203 — § 3 gate not cleared; embargoed details. S1 flagged these three cPanel CVEs reported by watchTowr. Technical details remain under responsible-disclosure embargo (watchTowr post contained no CVSS score, no exploitation confirmation, and no published patch details). None of the § 3 inclusion gates (CISA KEV, vendor ITW confirmation, pre-auth RCE with PoC, ENISA EUVD CVSS-9+/exploited) were met. Dropped.

Apache CloudStack CVE-2026-25077 — post-auth, no KEV, no ITW; § 3 gate not cleared. S1 reported CVE-2026-25077 (Apache CloudStack authentication token handling flaw, CVSS 7.2). Authentication required for exploitation (post-auth admin access needed); no KEV entry; no ITW confirmation. § 3 gate not met. Dropped.

IBM Italy / Salt Typhoon state-actor breach — outside 36 h / 72 h recency windows. S4 reported a Corriere della Sera / Il Sole 24 Ore story on alleged Salt Typhoon compromise of IBM Italy infrastructure. Primary source dates: 2026-05-04 (Il Sole 24 Ore) and 2026-05-05 (BleepingComputer). The 72-hour developing window opened 2026-05-06 00:00 UTC; the primary developments predate this. No material new developments published within the window were identified. Dropped.

ChipSoft (Netherlands healthcare IT) — primary event outside window; secondary source unverifiable. S4 flagged a potential ChipSoft breach. The primary development (a ChipSoft advisory) was dated 2026-04-29, outside the 72-hour developing window. A May 7 DataBreaches.net reference was attempted via bridge fetch and returned HTTP 403. With the primary event outside the window and no verifiable secondary source, this was dropped.


Single-Source Items (§ 3 National-CERT Carve-Out and Other Exceptions)

CVE-2025-68670 (xrdp) — single source (Kaspersky Securelist). Despite a bridge-assisted fetch sweep across NCSC-CH (no post found), CERT-FR, and BSI, no corroborating advisory was found within the recency window. The vendor (xrdp project) has a corresponding GitHub commit and a release at 0.10.5 confirming the patch, which counts as independent confirmation of the patch but not independent vulnerability analysis. Marked [SINGLE-SOURCE] in § 3.

SEPPmail CVE cluster (CVE-2026-44128 et al.) — primary advisory is NCSC-CH (national CERT, carve-out applies) plus vendor release notes. No third-party security researcher write-up was found for this cluster. NCSC-CH is a national CERT, qualifying for the national-CERT single-source carve-out per prompt PD-6. Vendor release notes at the SEPPmail downloads portal independently confirm the CVE assignments and patched version. Marked [SINGLE-SOURCE-NATIONAL-CERT carve-out + vendor] in § 3.

Polish ABW water OT named facility list — ABW annual report only. The five named facilities (Jabłonna Lacka, Szczytno, Małdyty, Tolkmicko, Sierakowo) appear only in the ABW Annual Report 2025. SecurityAffairs coverage cites the ABW report as its source; no independent naming was found. The ABW is a national government security agency, and its annual report constitutes an authoritative primary source. The two-source requirement is met at the level of the core story (ABW annual report + SecurityAffairs coverage), but the specific facility names derive from a single document.


URL Integrity Flags

Kaspersky DAEMON Tools URL — Turkish-language path corrected. The original Kaspersky Securelist URL provided by S1 contained a /tr/ path component (https://securelist.com/tr/daemon-tools-supply-chain-attack/...), indicating a Turkish-locale variant. The English canonical URL (https://www.kaspersky.com/blog/daemon-tools-supply-chain-attack/55691/) was verified live and used in all citations. Readers should use the English-path URL for consistency.

Ivanti hub.ivanti.com advisory URL — authentication wall; national CERT advisory substituted. The vendor advisory URL for CVE-2026-5787/CVE-2026-6973 at hub.ivanti.com requires customer portal login and was not fetchable. CERT-FR CERTFR-2026-AVI-0552 and NCSC-CH post 12548 are cited as primary public-access sources throughout. Readers with Ivanti support portal access should cross-reference the vendor advisory for full patch instructions.

SEPPmail patch version discrepancy — resolved. Sub-agent S1 initially cited SEPPmail fixed version as 15.0.2.1 based on the vendor release notes table. S2 and NCSC-CH advisory 12551 cite 15.0.4 / 15.0.4.1. Investigation: 15.0.2.1 is an earlier branch-maintenance release (different security fix scope); 15.0.4 is the current patch release addressing all six CVEs in the cluster. NCSC-CH's recommended version (15.0.4 / 15.0.4.1) is used throughout as the authoritative remediation target.


Coverage Gaps

ENISA EUVD — JavaScript-rendered; returned empty on all fetch attempts during this run. EUVD could not be used as a secondary confirmation source. This is a recurring infrastructure gap for this routine. coverage_gap: enisa-euvd-inaccessible

CCN-CERT-ES (Spain) — Geo-blocked (HTTP 451 / 403) on all fetch attempts including bridge. coverage_gap: ccn-cert-es-geoblocked

CISA advisories (ICS-CERT and standard) — CISA domains return HTTP 403 on default UA and require the bridge fetcher (tools/fetch_source.py). Bridge was used for CISA KEV status lookups; specific ICS advisories that may be relevant to OT items were not fully enumerated due to bridge throttling (rate limit encountered on third request in window). coverage_gap: cisa-ics-advisories-partial