Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Awareness is Key: Critical Vulnerabilities Patched Across SAP, Adobe, Microsoft, Fortinet, and More


Critical vulnerabilities have been patched across prominent software vendors, including Adobe, Microsoft, SAP, and Fortinet. This article provides an in-depth look at these vulnerabilities, their potential impact, and the steps being taken by organizations to mitigate these risks.

  • Four software vendors - Adobe, Microsoft, SAP, and Fortinet - have significant security patches released in recent Patch Tuesday updates.
  • The vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse (CVE-2026-27681) allows a low-privileged user to upload arbitrary SQL statements, posing risks to sensitive data.
  • Adobe Acrobat Reader has a remote code execution vulnerability (CVE-2026-34621), which is under active exploitation in the wild, emphasizing the need for immediate patching.
  • FortiSandbox vulnerabilities (CVE-2026-39813 and CVE-2026-39808) allow authentication bypass and code execution via crafted HTTP requests.



  • The latest Patch Tuesday releases have brought to light a multitude of critical vulnerabilities across prominent software vendors. Among these, four companies stand out for their significant security patches: Adobe, Microsoft, SAP, and Fortinet. In this article, we will delve into the specifics of these vulnerabilities, their potential impact, and the steps being taken by organizations to mitigate these risks.

    Firstly, it is essential to acknowledge that vulnerability management is an ongoing process. It requires constant monitoring and evaluation to ensure that our systems are secure against emerging threats. The recent Patch Tuesday releases demonstrate this necessity, as they highlight critical flaws in various software products that have been identified and addressed.

    One of the most notable vulnerabilities is the SQL injection vulnerability impacting SAP Business Planning and Consolidation and SAP Business Warehouse (CVE-2026-27681, CVSS score: 9.9). This vulnerability allows a low-privileged user to upload a file with arbitrary SQL statements that will then be executed, posing significant risks to sensitive data. The consequences of such an attack could include the execution of malicious code, extraction of sensitive information, and deletion or corruption of database content.

    Onapsis has issued an advisory highlighting the severity of this vulnerability. According to Onapsis, manipulated planning figures, broken reports, or deleted consolidation data can undermine close processes, executive reporting, and operational planning. Moreover, in the wrong hands, this issue creates a credible path to both stealthy data theft and overt business disruption.

    Another critical-severity vulnerability that deserves attention is the remote code execution in Adobe Acrobat Reader (CVE-2026-34621, CVSS score: 8.6). This vulnerability has come under active exploitation in the wild, emphasizing the need for immediate patching.

    Furthermore, Adobe has addressed five critical flaws in ColdFusion versions 2025 and 2023. If successfully exploited, these vulnerabilities could lead to arbitrary code execution, application denial-of-service, arbitrary file system read, and security feature bypass.

    Additionally, two critical FortiSandbox vulnerabilities have been patched, which could result in authentication bypass and code execution (CVE-2026-39813 and CVE-2026-39808). These vulnerabilities are listed below:

    * CVE-2026-39813 (CVSS score: 9.1) - A path traversal vulnerability in FortiSandbox JRPC API that could allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.
    * CVE-2026-39808 (CVSS score: 9.1) - An operating system command injection vulnerability in FortiSandbox that could allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.

    In conclusion, the recent Patch Tuesday releases underscore the importance of vigilance and proactive approach to security management. By being aware of these vulnerabilities and taking necessary steps to address them, organizations can significantly reduce their risk exposure. It is essential for cybersecurity professionals to stay informed about emerging threats and to develop a robust vulnerability management strategy that prioritizes proactive patching and incident response.

    Critical vulnerabilities have been patched across prominent software vendors, including Adobe, Microsoft, SAP, and Fortinet. This article provides an in-depth look at these vulnerabilities, their potential impact, and the steps being taken by organizations to mitigate these risks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Awareness-is-Key-Critical-Vulnerabilities-Patched-Across-SAP-Adobe-Microsoft-Fortinet-and-More-ehn.shtml

  • https://thehackernews.com/2026/04/april-patch-tuesday-fixes-critical.html

  • https://www.bleepingcomputer.com/news/microsoft/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-27681

  • https://www.cvedetails.com/cve/CVE-2026-27681/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-34621

  • https://www.cvedetails.com/cve/CVE-2026-34621/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-39813

  • https://www.cvedetails.com/cve/CVE-2026-39813/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-39808

  • https://www.cvedetails.com/cve/CVE-2026-39808/


  • Published: Wed Apr 15 09:09:12 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us