ctipilot.ch

CTI Daily Brief — 2026-05-18

Typedaily
Date2026-05-18
GeneratorClaude Opus 4.7 (`claude-opus-4-7`)
ClassificationTLP:CLEAR
LanguageEnglish
Promptv2.59
Items4
CVEs7
On this page

0. TL;DR

  • Microsoft Exchange Server CVE-2026-42897 (OWA stored XSS, actively exploited, CISA KEV) — Exchange Team Blog update confirms the EM Service auto-mitigation requires outbound HTTPS connectivity from the Exchange host to officemitigations.microsoft.com. Segmented or air-gapped Exchange 2016 / 2019 / SE environments that block this egress path will not have received the automatic URL-Rewrite mitigation and remain exposed; no permanent patch is available yet (Microsoft Exchange Team Blog, 2026-05-17; Microsoft MSRC).
  • NGINX Rift CVE-2026-42945 — VulnCheck honeypot telemetry confirms in-the-wild exploitation as of 2026-05-17. The 18-year-old heap overflow in ngx_http_rewrite_module (versions 0.6.27 through 1.30.0) is now actively probed; patches are NGINX Open Source 1.30.1 / 1.31.0 and NGINX Plus R32 P6 / R36 P4 (The Hacker News, 2026-05-17; Security Affairs, 2026-05-14).
  • THORChain — Switzerland-based cross-chain liquidity protocol — drained of ~$11M across nine blockchains via a suspected GG20 Threshold-Signature-Scheme implementation flaw. A malicious newly-churned validator node is reported to have gradually leaked vault key shards over multiple keygen/signing rounds before forging outbound signatures; The Record reports user funds were unaffected and only protocol-owned assets were impacted (The Record, 2026-05-15; TRM Labs, 2026-05-15).
  • Tycoon2FA PhaaS pivots from credential-relay AiTM to OAuth 2.0 Device Authorization Grant abuse against Microsoft 365. Victims paste an attacker-supplied device code into the legitimate microsoft.com/devicelogin endpoint; MFA succeeds on the real Microsoft endpoint and tokens are issued to the attacker's registered device. eSentire documented the campaign with a four-layer browser chain ending in a fake Microsoft CAPTCHA (BleepingComputer, 2026-05-17; eSentire TRU, 2026-05-12).

Immediate Action — Verify Exchange Emergency Mitigation Service health and officemitigations.microsoft.com connectivity. CVE-2026-42897 is an actively-exploited OWA stored-XSS with no permanent patch; the EM Service auto-applies the URL-Rewrite mitigation M2.1.x only if outbound HTTPS to officemitigations.microsoft.com is reachable from each Exchange Mailbox server. Segmented or restricted-egress on-premises Exchange 2016 / 2019 / SE estates may be silently unprotected. Right now: run Get-ExchangeDiagnosticInfo -Server <server> -Process EdgeTransport -Component EmergencyMitigation on every Mailbox role, confirm Status Active and rule M2.1.x applied; on segmented servers run .\EOMT.ps1 -CVE "CVE-2026-42897" manually from an elevated Exchange Management Shell.

3. Research & Investigative Reporting

No new research with operational defender impact published inside the 36-hour recency window this run — Sunday-into-Monday is research-light. Three substantive pieces (DFIR Report on EtherRAT + TukTuk → Gentleman ransomware, 2026-05-11; Microsoft IR on a 123-day MSP-mediated intrusion via HPE Operations Manager, 2026-05-12; Unit 42 on AD CS ESC1 + shadow-credential exploitation by Fighting Ursa, 2026-05-11) were surfaced by S3 but all fall outside the strict window and outside prior coverage; they are flagged in § 7 as candidates for the weekly summary rather than padded into today's brief. Section intentionally left empty.

4. Updates to Prior Coverage

UPDATE: CVE-2026-42897 Exchange OWA — EM Service auto-mitigation depends on outbound connectivity to `officemitigations.microsoft.com`

UPDATE (originally covered 2026-05-15 / deep-dive 2026-05-16): The Microsoft Exchange Team Blog post addressing CVE-2026-42897 was last modified 2026-05-17 to clarify an operational dependency that defenders must verify on every Exchange Mailbox host: the Exchange Emergency Mitigation Service (EM Service / EEMS) — which auto-applies the URL-Rewrite mitigation labelled M2.1.x — only delivers that mitigation when it can reach officemitigations.microsoft.com over outbound HTTPS. Segmented on-premises Exchange 2016 / 2019 / Subscription-Edition deployments that block direct outbound HTTPS from the Mailbox role will therefore not have received the automatic mitigation and remain exposed to the actively-exploited OWA stored-XSS chain.

The CVE remains CISA KEV-listed (added 2026-05-15) with no permanent cumulative-update fix as of 2026-05-18; Microsoft states verbatim "We are working on developing and testing a more permanent fix which we will provide when it meets our quality standards." Exchange Online is unaffected. Operational verification per server: Get-ExchangeDiagnosticInfo -Server <server> -Process EdgeTransport -Component EmergencyMitigation returns Status: Active and rule M2.1.x applied; manual application on hosts that cannot reach the mitigation service: .\EOMT.ps1 -CVE "CVE-2026-42897" from an elevated Exchange Management Shell, or apply the documented URL Rewrite rule by hand.

Changes since first coverage(4 prior appearances)
  1. 2026-05-182026-W21Consolidated in weekly summary for week 2026-W21
  2. 2026-05-172026-05-17UPDATE: Pwn2Own Berlin 2026 Day 2 — DEVCORE Orange Tsai chained three undisclosed Exchange bugs to unauthenticated SYSTEM RCE ($200K, 90-day embargo). Separate attack surface from CVE-2026-42897. Compound risk: active XSS without permanent patch PLUS fresh SYSTEM RCE class. MSRC advisory remains the operational primary.
  3. 2026-05-172026-W20Consolidated in weekly summary for 2026-W20
  4. 2026-05-162026-05-16First coverage. Microsoft confirmed Exploitation Detected 2026-05-14; CISA KEV-added 2026-05-15; no permanent patch — EEMS Mitigation M2 auto-applies, EOMT for air-gapped; Exchange 2016/2019 permanent fix gated on Period 2 ESU enrolment. Deep dive § 5.

UPDATE: CVE-2026-42945 NGINX Rift — in-the-wild exploitation confirmed by VulnCheck honeypots

UPDATE (originally covered 2026-W21 weekly): VulnCheck honeypot telemetry confirmed active exploitation of CVE-2026-42945 on 2026-05-17, promoting the 18-year-old ngx_http_rewrite_module heap buffer overflow from PoC-public status (where it sat last week) to actively-exploited. The flaw is reachable by an unauthenticated remote attacker via a single crafted HTTP request to any NGINX instance running a rewrite-rule configuration that uses unnamed PCRE captures ($1, $2); successful exploitation crashes the worker process (DoS reliable on ASLR-enabled hosts) and reaches RCE on hosts where ASLR is disabled.

Affected per F5 PSIRT advisory K000161019: NGINX Open Source 0.6.27 through 1.30.0 (every release since 2008) and NGINX Plus R32 through R36, plus F5 NGINX Instance Manager, NGINX Ingress Controller, NGINX Gateway Fabric, NGINX App Protect WAF, F5 WAF for NGINX, and NGINX App Protect DoS. Patches: NGINX Open Source 1.30.1 / 1.31.0; NGINX Plus R32 P6, R36 P4. Interim mitigation if immediate upgrade is not possible: convert unnamed PCRE captures in all rewrite directives to named captures ((?P<name>...) syntax). Detection-engineering anchors that follow from the flaw class (heap-overflow worker crash under specific rewrite-rule configurations) are NGINX worker-process crash events (SIGSEGV / SIGABRT and immediate respawn) in syslog / journald, correlated with inbound HTTP requests carrying unusually long or deeply-nested rewrite-rule input strings from the same source; defenders should validate these against their own rewrite-rule configuration before depending on them.

Changes since first coverage(2 prior appearances)
  1. 2026-05-182026-W21Consolidated in weekly summary for week 2026-W21
  2. 2026-05-152026-05-15First coverage. CVSS 9.2/8.1 heap overflow in NGINX 0.6.27-1.30.0. PoC public. NCSC-CH advisory. Affects NGINX OS, Plus, Ingress Controller, F5 WAF products.

UPDATE: CVE-2026-0300 PAN-OS Captive Portal — revised fix-release timelines for 10.2.13-h21 and 10.2.16-h7; wave-2 target remains 2026-05-28

UPDATE (originally covered 2026-05-07 deep dive): The Palo Alto Networks PSIRT advisory for CVE-2026-0300 was revised on 2026-05-16 to update the per-build fix-release schedule: PAN-OS 10.2.13-h21 was retimed on 2026-05-16, 10.2.16-h7 on 2026-05-14. Both are commonly deployed LTS branches in large enterprise and government estates; PA-Series and VM-Series devices on those two specific builds remain mitigation-only.

The wave-2 patch target for the remaining outstanding builds remains 2026-05-28. No new exploitation evidence accompanied the revision; the actively-exploited posture (unauthenticated heap overflow in the User-ID Authentication Portal / Captive Portal service, CVSS 9.3, pre-auth root RCE) reported in prior briefs continues. Defender action: verify each PA / VM appliance's installed PAN-OS build against the advisory's per-version patch matrix; if the installed build is 10.2.13-h21 or 10.2.16-h7, confirm the Captive Portal / User-ID Authentication Portal mitigation (disable the feature if unused, or apply the published Threat Prevention rule) remains active until the wave-2 fix lands.

Changes since first coverage(9 prior appearances)
  1. 2026-05-182026-W21Consolidated in weekly summary for week 2026-W21
  2. 2026-05-172026-W20Consolidated in weekly summary for 2026-W20
  3. 2026-05-142026-05-14UPDATE: Palo Alto PSIRT 2026-05-13 announces patch wave 2 for eight build streams (12.1.7, 11.2.4-h17, 11.2.12, 11.1.7-h6, 11.1.15, 10.2.7-h34, 10.2.13-h21, 10.2.16-h7) delayed to 2026-05-28; operators on those builds run interim mitigation only. CL-STA-1132 ITW continues. KEV deadline 2026-05-09 expired (FCEB only, no CH/EU weight).
  4. 2026-05-132026-05-13First-wave patched PAN-OS builds released 2026-05-13 (12.1.4-h5, 12.1.7 staged 05/28; 11.2/11.1/10.2 staged 05/13–05/28).
  5. 2026-05-122026-05-12First wave of PAN-OS fixed builds released today (12.1.4-h5, 11.2.7-h13, 11.2.10-h6, 11.1.4-h33/.6-h32/.10-h25/.13-h5, 10.2.10-h36, 10.2.18-h6); second wave ~2026-05-28 covering remaining branches. Surfaced as Immediate Action callout in § 0 + § 6 Action Item.
  6. 2026-05-102026-W19Consolidated in weekly summary for week 2026-W19
  7. 2026-05-092026-05-09UPDATE: KEV deadline TODAY 2026-05-09. No patch released yet (expected 2026-05-13). CL-STA-1132 post-exploitation detail: rogue admin accounts (svc-health-check-NNNNNN), Python tunnelling implants under /tmp/.update-service, 4-17 day dwell time.
  8. 2026-05-082026-05-08UPDATE: CISA KEV deadline is today (2026-05-09). No patch until 2026-05-13. Mitigation (disable Captive Portal or restrict to internal IPs) must be confirmed applied; treat as P0.
  9. 2026-05-072026-05-07First coverage. Critical unauthenticated RCE in PAN-OS Captive Portal; CERT-EU Critical Advisory 2026-006; CISA KEV deadline 2026-05-09; exploitation since 2026-04-09 by CL-STA-1132 (likely state-sponsored); no patch until 2026-05-13. Deep dive § 5.

5. Deep Dive — Tycoon2FA after the March 2026 takedown — OAuth Device Authorization Grant abuse on Microsoft 365

Background. Tycoon2FA is one of the established Microsoft 365 Phishing-as-a-Service (PhaaS) kits, previously documented as a classic adversary-in-the-middle (AiTM) credential-relay kit (Sekoia's reference analysis catalogued earlier versions of the kit). eSentire's Threat Response Unit documented a late-April 2026 campaign in which the kit's operators have moved away from credential-relay AiTM and are now abusing the legitimate OAuth 2.0 Device Authorization Grant flow as their post-MFA token-theft primitive (eSentire TRU, 2026-05-12; BleepingComputer, 2026-05-17). The substantive defender consequence is that the new chain runs against Microsoft's own authentication endpoints rather than against a credential-relay proxy the defender could block at the infrastructure layer; the abuse is structurally indistinguishable from a legitimate device-code sign-in until the resulting token is used.

Attack chain. A phishing email directs the victim through a four-layer browser chain documented by eSentire: a Trustifi click-tracking redirect (legitimate-email-marketing infrastructure, abused for reputation laundering) hands off to a Cloudflare Workers throwaway subdomain whose stage performs anti-analysis fingerprinting, AES-GCM-encrypted JavaScript decrypts the next stage only when the browser fingerprint clears, and finally the victim lands on a fake Microsoft CAPTCHA / "Check Domain" page that bridges into the OAuth device-code lure. eSentire records the underlying hosting ASN rotated to AS45102 (Alibaba Cloud) from 2026-04-10 onward, replacing previously documented ASNs. The terminal step is the technique pivot: instead of relaying credentials through an AiTM proxy, the phishing site displays a Microsoft-branded prompt instructing the victim to "complete sign-in by visiting microsoft.com/devicelogin and entering this code: AB12-CDEF". The code is a real device code that the attacker pre-generated by calling the OAuth Device Authorization Grant endpoint (/oauth2/v2.0/devicecode) on the victim's tenant, presenting itself as the Microsoft Authentication Broker client (AppId 29d9ed98-a469-4536-ade2-f981bc1d605e) — a first-party Microsoft client whose presence does not trip standard "unknown OAuth app" alerts in Entra ID. When the victim completes the device-code login in their browser they are authenticating to genuine Microsoft endpoints, MFA fires and succeeds against the victim's own MFA method (push, OTP, SMS) — and the resulting access and refresh tokens are issued to the attacker's polling device, not the victim. Entra ID sign-in logs record this as AuthenticationProtocol = deviceCode originating from an unfamiliar IP, but the actual authentication is logged as successful with valid MFA, masking the abuse.

ATT&CK mapping. T1566.002 Phishing: Spearphishing Link → T1528 Steal Application Access Token (the device-code flow itself) → T1550.001 Use Alternate Authentication Material: Application Access Token → T1078.004 Valid Accounts: Cloud Accounts (sustained post-MFA access using the issued tokens against Exchange Online, SharePoint, OneDrive, Teams, and Graph API). MFA bypass is structural here — Tycoon2FA does not break MFA; it sidesteps it by binding the MFA-validated session to an attacker-owned device through the legitimate OAuth flow. Every MFA method except FIDO2 / WebAuthn with phishing-resistant attestation is vulnerable to this attack class because the victim approves an MFA prompt on a flow the kit chose, not the flow the victim believes they are completing.

Hunt / detection concepts. Per eSentire's TRU analysis: query Entra ID sign-in logs for AuthenticationProtocol = "deviceCode" paired with ClientAppUsed = "Microsoft Authentication Broker" from IPs the user has never authenticated from previously; alert on any device-code authentication from foreign ASNs against high-privilege users (Global Admins, Privileged Role Admins, Compliance Admins) regardless of MFA outcome; correlate device-code sign-ins with Entra audit-log entries showing immediate token-refresh activity against Exchange Online or SharePoint endpoints (Add OAuth2PermissionGrant); on the email layer hunt for inbound mail containing the literal string microsoft.com/devicelogin paired with a device-code-shaped substring (eight alphanumerics with a hyphen at the midpoint) in the body — legitimate Microsoft messaging almost never instructs an end user to enter such a code in response to an email. Kit-fingerprint detection (useful when investigating a confirmed campaign): the Tycoon2FA browser stage retains the hardcoded CryptoJS AES-CBC key 1234567890123456 first documented in the kit's 2024 build, and the fake CAPTCHA layer still embeds the same Cloudflare-anti-bot bypass JavaScript across the rebuilt infrastructure.

Hardening. Entra Conditional Access policy to block OAuth Device Code flow as an authentication transport for users who do not need it — the policy is Conditional Access > New policy > Conditions > Authentication flows > Device code flow > Block; Microsoft recommends this as a tenant-wide default in modern deployments because the device-code flow is only legitimately needed for input-constrained devices (smart TVs, IoT, CLI tools) and almost never for desktop or browser users. Where a wholesale block is operationally infeasible, scope the block to all licensed user accounts and exempt only the named service principals that require it. Enable Continuous Access Evaluation (CAE) so that anomaly-driven sign-in revocation can cut an attacker's session within minutes rather than hours. Migrate high-privilege users to FIDO2 / WebAuthn with phishing-resistant attestation as their only permitted MFA method — the device-code flow can still be initiated, but the attacker cannot complete it because the FIDO2 origin-binding fails on a non-matching browser session. Awareness messaging should make explicit that Microsoft never sends device codes via email and that any incoming message asking the recipient to enter a code at microsoft.com/devicelogin is fraudulent regardless of the apparent sender.

6. Action Items

  • Verify Exchange Emergency Mitigation Service health on every on-premises Mailbox role. Run Get-ExchangeDiagnosticInfo -Server <server> -Process EdgeTransport -Component EmergencyMitigation against each Exchange 2016 / 2019 / SE host; confirm Status: Active and rule M2.1.x is applied. On segmented hosts that block outbound HTTPS to officemitigations.microsoft.com, manually apply via .\EOMT.ps1 -CVE "CVE-2026-42897" from an elevated Exchange Management Shell. No permanent patch yet; CISA KEV-listed and actively exploited. See § 4 update.

  • Patch NGINX 1.30.0 → 1.30.1 / 1.31.0 (open source) or NGINX Plus → R32 P6 / R36 P4 immediately on any internet-exposed instance. VulnCheck honeypot telemetry confirmed in-the-wild exploitation of CVE-2026-42945 ("NGINX Rift") on 2026-05-17. Where same-day upgrade is not feasible, audit nginx.conf and included *.conf rewrite rules for unnamed PCRE captures ($1, $2) and convert to named captures as an interim mitigation per the F5 advisory. See § 4 update.

  • Block OAuth Device Code flow tenant-wide in Entra ID Conditional Access where it is not operationally required. Path: Conditional Access → New policy → Conditions → Authentication flows → Device code flow → Block. Scope to all user accounts and exempt only the named service principals (smart-TV, IoT, CLI) that demonstrably need it. Where a wholesale block is infeasible, restrict the device-code flow to compliant devices and named-location IPs. Monitor Entra ID sign-in logs for AuthenticationProtocol = "deviceCode" from unfamiliar IPs against high-privilege users — see § 5 deep dive.

  • Audit PAN-OS build version against the revised CVE-2026-0300 fix-release timeline. Inventory PA-Series and VM-Series appliances; if any device runs 10.2.13-h21 or 10.2.16-h7, confirm Captive Portal / User-ID Authentication Portal mitigation remains active and track the wave-2 patch target (2026-05-28). See § 4 update.

7. Verification Notes

  • Coverage window: standard daily (gap to prior brief 2026-05-17 ≈ 24 h; window_hours = 36). Quiet Sunday-into-Monday — § 2 and § 3 are intentionally empty per PD-11.
  • Items dropped (sub-agent returned but failed Phase 2 / dedup / recency):
    • SEPPmail CVE-2026-44125 / 44126 / 44127 / 44128 / 44129 / 7864 cluster (NCSC-CH post #12551, 2026-05-08) — already covered in the 2026-05-09 deep dive and the CVEs are all in cves_seen.json; the NCSC-CH advisory date (2026-05-08) is 10 days outside window_hours = 36; dropped, no in-window delta.
    • Windows YellowKey / GreenPlasma zero-days (NCSC-CH post #12574, 2026-05-14) — already covered in the 2026-05-15 § 1; no fresh in-window development.
    • DHTMLX CVE-2026-41553 / 41552 / 7182 — already covered as a TL;DR item in 2026-05-17; CERT-PL advisory date 2026-05-15 sits at the edge of window but the coverage is already current.
    • NCSC-CH weekly review Week 19 (advance-fee scam, double-phishing awareness items) — primary-source date 2026-05-12 is outside window_hours; awareness-class content with no fresh defender action.
  • Single-source items: [SINGLE-SOURCE] CVE-2026-0300 PAN-OS § 4 UPDATE — sole primary source is the Palo Alto Networks PSIRT advisory (vendor-authoritative; national-CERT carve-out does not apply but vendor-PSIRT is itself the primary disclosing party).
  • Included with reduced confidence (no in-window primary): none in this brief — the three out-of-window S3 items were dropped rather than promoted.
  • Out-of-window research deferred to weekly summary (or next-week daily if material develops):
    • The DFIR Report, 2026-05-11 — EtherRAT blockchain-C2 + TukTuk SaaS-C2 chain ending in Gentleman ransomware; novel detection-engineering content (EtherHiding / Arweave dead-drop / multi-SaaS C2 fingerprints) but source is 7 days outside window_hours.
    • Microsoft Security Blog, 2026-05-12 — 123-day MSP-mediated intrusion via HPE Operations Manager with malicious Windows Network Provider DLL and LSA password-filter persistence; high relevance to public-sector outsourced IT but 6 days outside window_hours.
    • Unit 42, 2026-05-11 — Active Directory Certificate Services ESC1 + shadow-credential exploitation attributed to Fighting Ursa (APT28); 7 days outside window_hours.
  • Contradictions surfaced: CVSS scoring for CVE-2026-42945 NGINX Rift differs across primaries — NCSC-CH lists CVSS 4.0: 9.2 Critical while NVD currently has no published score; The Hacker News and Security Affairs cite the F5 advisory's CVSS 4.0 base of 9.2 used in this brief. CVSS 3.1 score reported by NCSC-NL feed is 8.1. Brief uses the CVSS 4.0 score most widely cited by national-CERT sources.
  • Sub-agents that didn't return on time: none — S1 (348 s), S2 (677 s), S3 (576 s), S4 (679 s) all returned inside the 30-min hard cap.
  • Candidate sources surfaced this run (one new candidate maximum per PD-3.6): depthfirst (depthfirst.com) — AI-assisted vulnerability research, primary disclosure source for CVE-2026-42945 NGINX Rift cited by NCSC-CH; recorded as status: candidate in sources/sources.json. A second candidate (cryptotimes) was surfaced by S4 for THORChain technical post-mortems and is held for a future run per the one-candidate-per-run cap.
  • Coverage gaps: cisa-kev (bridge subcommand returned no in-window adds beyond CVE-2026-20182 / CVE-2026-42897 already covered); apple-security (no in-window emergency update); chrome-releases (no in-window emergency update); akamai-sirt (RSS 403 — no in-window content corroborated via search); trendmicro-research (feed parse error — no in-window content corroborated via search); sophos-xops (HTTP 503 — no in-window content corroborated via search); inside-it-ch (host 403 — no in-window CH-specific incidents); cert-eu (most recent advisory 2026-05-06; feed empty in window); ncsc-ch weekly-review-kw20 (Week 20 review not yet published as of 2026-05-18T04:50Z); cert-fr actu (feed appears stale, items dated Sep–Oct 2025); sec-disclosures-edgar (Item 1.05 search returned zero filings for 2026-05-15 → 2026-05-18 — US weekend); ico-uk (no new enforcement actions in window); cnil-fr (no new enforcement decisions in window); databreaches-net (host 403 — WebSearch fallback used per documented mitigation).