Happy Monday! Stay ahead of the exploit, before it hits the wire.

In today's edition:

  • Top active exploits for the week.

  • Patch priority list.

  • Attack trend of the week.

  • Strategic insights.

  • Tools and resources mentioned.

Let’s jump right in.

Top Active Exploits

  • Windows RDS Privilege Escalation (CVE-2026-21533): A threat actor is selling a zero-day exploit for a Windows Remote Desktop Services privilege escalation vulnerability for $220,000 on a dark web forum. It targets improper privilege management to grant attackers local administrative control. The vulnerability impacts Windows 10, Windows 11, and Windows Server editions ranging from 2012 to the latest 2025 releases.

  • AVideo SQL Injection + RCE Chain (CVE-2026-28501 / CVE-2026-28502): CVE-2026-28501 is an unauthenticated SQL injection (CVSS 9.8) that exploits JSON-formatted POST requests, failing to sanitize the catName parameter. The malicious payload bypasses sanitization by merging into global request variables after initial security checks. CVE-2026-28502 is an authenticated RCE vulnerability in the plugin upload system where the platform only checks if uploaded content is a ZIP file without inspecting its contents.

  • ClickFix / CrashFix Social Engineering Exploit: Threat actor Kong Tuk has deployed a variant called "CrashFix," where victims see a convincing Microsoft Edge crash dialog and are instructed to run Win+R and paste content from the clipboard. The pasted content is actually a malicious PowerShell command giving attackers complete machine access. Traditional antivirus software often fails to detect this as it leverages user actions and legitimate Windows functionality.

Patch Priority List


Immediate action is recommended for the following high-risk vulnerabilities:

Priority

CVE

Product

Action

Critical

CVE-2026-21533

Windows RDS (all editions)

Apply Microsoft patches immediately

Critical

CVE-2026-28501/02

AVideo

Upgrade to v23+

Critical

CVE-2026-3797

Tiandy Video Surveillance 7.17.0

Patch or restrict access

Critical

CVE-2026-3798

Comfast CF-AC100 2.6.0.8

Patch or isolate device

  • Windows RDS: Organizations must apply Microsoft security patches and follow CISA BOD 22-01 guidance, or disable RDS if mitigations cannot be applied.

  • AVideo: Upgrade to version 23 or later; otherwise, disable plugin imports and prevent PHP execution in upload directories.

  • Tiandy Video Surveillance: Allows unrestricted file upload via the fileName argument; an exploit is already available.

  • Comfast CF-AC100: Enables remote command injection via the ping_config handler with a public exploit available.

Attack Trend of the Week

Supply Chain & CI/CD Pipeline Targeting

  • Hackerbot-Claw: An active automated campaign targeting insecure GitHub Actions workflows in public repositories to exfiltrate sensitive credentials.

  • Exploitation Methods: The campaign utilizes "Pwn Request" / pull_request_target abuse and encodes malicious commands into branch names or file paths.

  • LexisNexis Breach: Highlighted how a single exploited public app and over-privileged service identity can enable lateral movement into production stores.

Strategic Insight


AI Development Tools Are the New Attack Surface

  • ContextCrush: A critical vulnerability affecting the Context7 MCP Server used by AI coding assistants like Cursor and Claude Code.

  • Injection Risks: Attackers can plant malicious rules in documentation registries that are then distributed to developers' AI tools without direct system interaction.

  • Demonstrated Impact: AI agents were successfully instructed to find and transmit .env files to attackers and then delete local files. This marks a shift where the trust model of AI agents becomes a primary attack vector.

Tools & Resources Mentioned

  • OpenSSF OSPS Baseline: Projects using this framework are more resilient to GitHub Actions attacks by enforcing least-privilege automation.

  • Interactive Sandboxing Solutions: Enterprises report 21 minutes less mean time to resolve (MTTR) and 30% fewer Tier-1 to Tier-2 escalations.

  • CISA Known Exploited Vulnerabilities Catalog: CVE-2026-21533's addition underscores the immediate need for remediation.

  • EDR Solutions: Recommended for monitoring anomalous registry changes related to Windows RDS.
    Sources and References

  • [1] Cyber Security News: Hackers Allegedly Selling Exploit for Windows Remote Desktop Services 0-Day Flaw

  • [2] Daily CyberSecurity: Critical Vulnerabilities in AVideo: From SQL Injection to Remote Code Execution

  • [3] TWiT.tv Posts: How the Latest "ClickFix" Exploit Targets Windows Users

  • [6] Daily CyberSecurity: Security Alert: “Hackerbot-Claw” Autonomous Campaign Exploits GitHub Actions

  • [7] Infosecurity: ContextCrush Flaw Exposes AI Development Tools to Attacks

  • [8] News4Hackers: Outsmarting Enterprise Security: 3 Sophisticated Phishing Tactics Dominating 2026
    Next Step: Would you like me to create a summary of the patch actions tailored for a specific operating system or software environment?

Till next time,

The Choke Point

Recommended for you