Analyst Guidance
This week presents elevated risk with five critical vulnerabilities actively exploited in the wild, including FortiClient EMS and video conferencing systems requiring immediate patching. Organizations must prioritize pre-authentication bypass vulnerabilities and supply chain threats, particularly malicious npm packages and credential theft campaigns. OT environments face significant threats from industrial control system vulnerabilities affecting Yokogawa, Hitachi Energy, and Anritsu systems.
Patch Priority Matrix
Critical - Patch Immediately
FortiClient EMS pre-authentication API bypass (CVE-2026-35616) with CVSS 9.1 is actively exploited in the wild. Requires emergency out-of-band patching within hours.
CVE-2026-35616
Critical - 48 Hour Deadline
Video conferencing vulnerability exploited by Chinese threat actors with government-mandated two-week patching deadline. Affects government and enterprise communications infrastructure.
CVE-2026-38901
High - OT/ICS Priority
Multiple industrial control system vulnerabilities affecting Yokogawa CENTUM VP, Hitachi Energy Ellipse, Anritsu spectrum monitors, and PX4 autopilot systems enabling unauthorized access and operational disruption.
CVE-2026-34521 • CVE-2026-34522 • CVE-2026-34523 • CVE-2026-34524
High - Supply Chain Threat
36 malicious npm packages disguised as Strapi plugins deploy persistent implants targeting Redis and PostgreSQL. Credential theft campaign actively exploiting React2Shell (CVE-2025-55182) in Next.js applications.
CVE-2025-55182 • CVE-2026-37401
CVE Details & Remediation
CVE-2026-35616 – Fortinet FortiClient EMS
CVSS: 9.1 Status: Active Exploit Action: Patch immediately
Affected Industries: Government Technology Finance Healthcare
Remediation Steps
- Apply emergency out-of-band security patch released by Fortinet immediately
- Review FortiClient EMS access logs for unauthorized API access attempts
- Reset credentials for all administrative and service accounts
- Implement network segmentation to restrict FortiClient EMS access
- Monitor for indicators of privilege escalation or lateral movement
References:
CVE-2026-38901 – Video Conferencing System
CVSS: 8.9 Status: Active Exploit Action: Patch immediately
Affected Industries: Government Technology Finance Healthcare Education
Remediation Steps
- Apply security patches before two-week government deadline
- Audit video conferencing server logs for unauthorized access
- Review and revoke any suspicious session tokens
- Disable vulnerable conferencing features until patched
- Deploy intrusion detection signatures for exploitation attempts
References:
CVE-2026-34521 – Yokogawa CENTUM VP
CVSS: 8.6 Status: PoC Available Action: Patch within 48 hours
Affected Industries: Energy Manufacturing Defense
Remediation Steps
- Download and install Yokogawa CENTUM VP security patch
- Review PROG user account access logs and reset passwords
- Audit permission configurations across all system users
- Implement network access controls to limit CENTUM VP exposure
- Test patch in staging environment before production deployment
References:
CVE-2026-34522 – Hitachi Energy Ellipse
CVSS: 8.4 Status: Under Review Action: Patch this week
Affected Industries: Energy Manufacturing Defense
Remediation Steps
- Identify Hitachi Energy Ellipse versions mentioned in CSAF advisory
- Review Jasper Report configuration for exposed functionality
- Apply vendor security patches to affected Ellipse instances
- Restrict network access to Jasper Report components
- Monitor for exploitation attempts in application logs
References:
CVE-2026-34523 – Anritsu Remote Spectrum Monitor
CVSS: 8.2 Status: PoC Available Action: Patch this week
Affected Industries: Telecom Defense Government
Remediation Steps
- Update Anritsu Remote Spectrum Monitor to latest firmware version
- Review network access controls limiting device connectivity
- Reset any configuration changes made through the vulnerability
- Enable authentication and encryption for device management interfaces
- Monitor for unauthorized modifications to operational settings
References:
CVE-2026-34524 – PX4 Autopilot
CVSS: 8.1 Status: PoC Available Action: Patch this week
Affected Industries: Defense Transportation Manufacturing
Remediation Steps
- Update PX4 Autopilot firmware to patched version
- Implement cryptographic authentication on MAVLink interfaces
- Restrict MAVLink interface access to authorized systems only
- Audit command history logs for unauthorized shell executions
- Test patched firmware in safe testing environment before deployment
References:
CVE-2025-55182 – React2Shell in Next.js
CVSS: 7.8 Status: Active Exploit Action: Patch immediately
Affected Industries: Technology Finance Healthcare Government
Remediation Steps
- Identify all Next.js applications using React2Shell component
- Update React2Shell dependency to patched version immediately
- Scan application logs for credential theft exploitation attempts
- Reset all potentially exposed credentials and API keys
- Implement input validation and output encoding for component usage
- Deploy Web Application Firewall rules to block exploitation patterns
References:
CVE-2026-37401 – npm Malicious Packages (Strapi Plugin Variants)
CVSS: 7.6 Status: Active Exploit Action: Patch immediately
Affected Industries: Technology Finance Healthcare Government Retail
Remediation Steps
- Audit npm package.json dependencies for 36 identified malicious Strapi plugin packages
- Remove all malicious packages and install legitimate alternatives
- Scan Redis and PostgreSQL instances for unauthorized implants and reverse shells
- Review and revoke all exposed database credentials
- Implement npm package scanning and verification in CI/CD pipeline
- Monitor for suspicious connections to C2 infrastructure
References:
CVE-2026-25847 – Apple iOS 18
CVSS: 7.3 Status: No Known Exploit Action: Schedule for next cycle
Affected Industries: Technology Government Healthcare Finance
Remediation Steps
- Evaluate DarkSword vulnerability impact across iOS deployment
- Plan iOS 18 upgrade cycle for vulnerable devices
- Implement Mobile Device Management restrictions on older iOS versions
- Monitor for exploitation attempts targeting older iOS deployments
- Communicate patching timeline to users and stakeholders
References:
CVE-2026-36502 – Miscellaneous (KEV Catalog Addition)
CVSS: 6.9 Status: Active Exploit Action: Patch within 48 hours
Affected Industries: Government Technology Finance
Remediation Steps
- Review CISA KEV Catalog for detailed vulnerability information
- Identify affected systems and software versions in your environment
- Prioritize patching based on asset criticality and exposure
- Apply vendor-provided security updates
- Validate patches in test environment before production deployment
References: