WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Weekly Vulnerabilities to Prioritize – April 23, 2026
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Weekly Vulnerabilities to Prioritize – April 23, 2026

TLP:CLEAR

Author: Chase Snow

Created: Thursday, April 23, 2026 - 15:31

Categories: Cybersecurity, Security Preparedness

The below vulnerabilities have been identified by WaterISAC analysts as important for water and wastewater utilities to prioritize in their vulnerability management efforts. WaterISAC shares critical vulnerabilities that affect widely used products and may be under active exploitation. WaterISAC draws additional awareness in alerts and advisories when vulnerabilities are confirmed to be impacting, or have a high likelihood of impacting, water and wastewater utilities. Members are encouraged to regularly review these vulnerabilities, many of which are often included in CISA’s Known Exploited Vulnerabilities (KEV) Catalog.

Microsoft Defender Insufficient Granularity of Access Control Vulnerability
CVSS v3.1: 7.8
CVE: CVE-2026-33825
Description: Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally. CISA added this vulnerability to its KEV catalog.
Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825

Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default
CVSS: N/A
CVE: CVE-2026-29146
Description: Padding Oracle vulnerability in Apache Tomcat’s EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Source: https://lists.apache.org/thread/lzt04z2pb3dc5tk85obn80xygw3z1p0w
Additional Reading:

  • Critical Apache Tomcat Flaw Allows Full Server and Application Takeover (CVE-2026-29146)

ASP.NET Core Elevation of Privilege Vulnerability
CVSS v3.1: 9.1
CVE: CVE-2026-40372
Description: Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.
Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372

D-Link DIR-823X series routers
CVSS 3.1: 8.8
CVEs: CVE-2025-29635
Description: A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.
Original Source: https://nvd.nist.gov/vuln/detail/CVE-2025-29635
Additional Reading

  • https://www.akamai.com/blog/security-research/cve-2025-29635-mirai-campaign-targets-d-link-devices

Microsoft SharePoint Server Spoofing Vulnerability
CVSS 3.1:
6.5
CVEs: CVE-2026-32201
Description: Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
Original Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201
Additional Reading

  • Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks

Cisco Catalyst SD-WAN Manager Vulnerabilities
CVSS 3.1: 5.4, 7.5, 6.5
CVEs: CVE-2026-20122, CVE-2026-20128, CVE-2026-20133
Description: Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager and Cisco Catalyst SD-WAN Software could allow both authenticated and unauthenticated remote attackers to escalate privileges, access sensitive information, and manipulate the underlying system. These issues stem from improper file handling in the API, exposure of credential files associated with the Data Collection Agent (DCA), and insufficient file system restrictions. An attacker could exploit these weaknesses by uploading malicious files, issuing crafted HTTP requests to retrieve credentials, or accessing system shells with elevated privileges. Successful exploitation could result in unauthorized file overwrites, credential compromise, lateral movement to other systems, and access to sensitive operating system data. CISA added this vulnerability to its KEV catalog.
Original Source: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar