← Back to Briefings
DAILY BRIEFING · MAY 22, 2026 · #065

Critical RCEs: Microsoft Defender, Linux kernel, Cisco Workload; Showboat targets telcos

📅 May 22, 2026🤖 AI-Generated Analysis5 min read
How to read this briefing
Verified facts — NVD & CISA KEV Partially verified — awaiting NVD enrichment AI analysis — synthesis, verify before acting [1]Inline citations — click any [N] to view the source
Actionable · Verified facts
NVD-published · CISA KEV cross-checked
CVECVSSVendor · ProductExploitationRefs
🛡️CVE-2026-410917.8 NVD 3.1Microsoft Malware Protection Engine In CISA KEV[1] [2]
Actionable · Partially verified
CVE in source articles · NVD enrichment pending
CVECVSSVendor · ProductExploitationRefs
CVE-2026-463337.1 NVD 3.1Linux Kernelno reports[1] [2]
CVE-2026-90826.5 NVD 3.1Drupalno reports[1]
These CVEs are real (their IDs appear in source articles) but NVD has not yet finished enrichment. Vendor/product/CVSS will appear here automatically once NVD catches up.
Contextual · AI analysis Synthesized from 10 feeds · verify before acting

TL;DR

Microsoft Defender privilege escalation actively exploited; Linux kernel 9-year-old flaw enables root access; Cisco Workload RCE patched; Showboat malware campaign targets multiple telcos. Patch immediately and monitor for exploitation attempts.

THREAT LEVEL: HIGH – Active exploitation of critical vulnerabilities in widely-deployed software combined with emerging Linux rootkit threats and targeted telco campaigns require immediate patching and monitoring.

Executive Summary

Top Threats Today

1. Microsoft Defender Privilege Escalation – Active Exploitation

Severity: CRITICAL   Affected: Government, Technology

Microsoft has disclosed that CVE-2026-41091, a privilege escalation vulnerability in Defender, is under active exploitation in the wild [1]. The flaw is rated 7.8 on the CVSS scoring system and allows attackers to gain SYSTEM privileges [1]. A secondary denial-of-service flaw in Defender has also come under active exploitation [1].
Sources:[1] The Hacker News

Recommended Action

  • Apply latest Microsoft security updates to all Defender installations immediately
  • Monitor Windows event logs for privilege escalation attempts targeting Defender processes
  • Isolate affected systems if active exploitation is suspected
  • Review AWS cached credentials and local key access controls on Windows machines [4]

2. Linux Kernel 9-Year-Old Privilege Escalation Flaw

Severity: HIGH   Affected: Technology, Government

Researchers have disclosed CVE-2026-46333, a 9-year-old vulnerability in the Linux kernel involving improper privilege management [1]. The flaw is rated CVSS 5.5 and permits unprivileged local users to disclose sensitive information and execute commands with elevated privileges [1]. The vulnerability affects major Linux distributions [1].
Sources:[1] The Hacker News

Recommended Action

  • Prioritize kernel updates for all Linux systems to latest stable release
  • Verify unprivileged user access controls and monitor for local privilege escalation attempts
  • Test updates in non-production environments before wide deployment

3. Cisco Secure Workload Maximum-Severity Remote Code Execution

Severity: HIGH   Affected: Technology

Cisco has released security updates for a maximum-severity vulnerability in Secure Workload that allows remote attackers to gain Site Admin privileges [1][2]. The issue stems from insufficient validation and authentication in the Secure Workload REST APIs [2].
Sources:[1] BleepingComputer[2] SecurityWeek

Recommended Action

  • Apply Cisco Secure Workload patches immediately
  • Review REST API access logs for unauthorized administrative activity
  • Enforce network-level access controls to administrative interfaces
  • Implement API authentication and rate-limiting policies

4. Showboat Linux Malware & JFMBackdoor Target Telecommunications Providers

Severity: HIGH   Affected: Telecom

A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat and JFMBackdoor [2]. Showboat is a modular post-exploitation framework designed for Linux systems with SOCKS5 proxy backdoor capabilities [1]. The campaign has been targeting a Middle East telecom provider since at least mid-2022 [1]. The malware has also been observed in Central Asia telco attacks [3].
Sources:[1] The Hacker News[2] BleepingComputer[3] Dark Reading

Recommended Action

  • Conduct network segmentation review for telecommunications infrastructure
  • Monitor for SOCKS5 proxy traffic and unusual outbound connections from Linux systems
  • Review authentication logs for suspicious login patterns in telecom management systems
  • Implement endpoint detection and response (EDR) solutions with malware hunting capabilities

5. Google Chrome Unfixed Remote Code Execution – Accidental Disclosure

Severity: HIGH   Affected: Technology

Google accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even after the browser is closed, allowing remote code execution on the device [1].
Sources:[1] BleepingComputer

Recommended Action

  • Monitor Google's security advisory channel for patch timeline on unfixed Chromium RCE
  • Restrict Chromium/Chrome deployment in high-risk environments until patch is available
  • Educate users to fully terminate browser processes rather than just closing windows

Today’s Action Checklist

🤖 This briefing was compiled by defend.network using AI-powered analysis of multiple cybersecurity sources including CISA advisories, vendor security bulletins, and threat intelligence feeds. Always verify critical intelligence through official vendor channels before taking action.

Get Tomorrow’s Briefing in Your Inbox

Subscribe free and never miss a daily threat briefing.