Ethical Hacking News
Recent critical security updates have been released by Ivanti, Fortinet, n8n, SAP, and VMware to address severe vulnerabilities that could be exploited by attackers to bypass authentication and execute arbitrary code. These releases include patches for SQL injection vulnerabilities, prototype pollution, and privilege escalation flaws in various software products, including workflow automation platforms and cloud-based services.
Security experts have issued critical alerts for various software vulnerabilities. Ivanti released a patch for its Xtraction product to address a critical flaw that could allow remote authenticated attackers to read sensitive files and write arbitrary HTML files. Fortinet published advisories for two critical shortcomings affecting its FortiAuthenticator and FortiSandbox products. SAP has released critical patches for its S/4HANA product to address two significant vulnerabilities, including an SQL injection vulnerability and a missing authentication check. n8n, a workflow automation platform, has also released critical patches for several vulnerabilities, including one that allows remote code execution. Other affected products include VMware Fusion, ABB, Adobe, Amazon Web Services, AMD, Apple, ASUS, Atlassian, Axis Communications, and many others.
Security experts have issued critical alerts for various software vulnerabilities that could be exploited by attackers to bypass authentication and execute arbitrary code. In a recent update, Ivanti released a patch for its Xtraction product (CVE-2026-8043, CVSS score: 9.6) to address a critical flaw that could allow remote authenticated attackers to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks.
Furthermore, Fortinet published advisories for two critical shortcomings affecting its FortiAuthenticator and FortiSandbox products, as well as its FortiSandbox Cloud and FortiSandbox PaaS services. These vulnerabilities could result in code execution due to improper access control in FortiAuthenticator (CVE-2026-44277) and a missing authorization vulnerability in FortiSandbox, FortiSandbox Cloud, and FortiSandbox PaaS WEB UI (CVE-2026-26083).
In related news, SAP has released critical patches for its S/4HANA product to address two significant vulnerabilities. The first vulnerability, CVE-2026-34260, is an SQL injection vulnerability that could be exploited by attackers to inject malicious SQL statements and potentially impact the confidentiality and availability of the application. However, since the affected code only allows read access to data, the vulnerability does not compromise the integrity of the application.
The second vulnerability, CVE-2026-34263, is a missing authentication check in the SAP Commerce cloud configuration. This vulnerability could allow an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution.
n8n, a workflow automation platform, has also released critical patches for several vulnerabilities. The most severe of these vulnerabilities, CVE-2026-42231 (CVSS score: 9.4), is a vulnerability in the xml2js library used to parse XML request bodies that allows prototype pollution via a crafted XML payload, enabling an authenticated user with permission to create or modify workflows to achieve remote code execution on the n8n host.
Other affected products include VMware Fusion, which has released patches for a high-severity flaw (CVE-2026-41702) that could pave the way for local privilege escalation. Additionally, various other software vendors have also released security fixes for multiple vulnerabilities in their respective products, including but not limited to ABB, Adobe, Amazon Web Services, AMD, Apple, ASUS, Atlassian, Axis Communications, AVEVA, Canon, Cisco, CODESYS, ConnectWise, Dell, Devolutions, Drupal, F5, Fortra, Foxit Software, Fujitsu, GitLab, GnuTLS, Google, Android, and Pixel, Google Chrome, Google Cloud, Grafana, Hikvision, Hitachi Energy, Honeywell, HP, HP Enterprise, IBM, Intel, Jenkins, Lenovo, Linux distributions AlmaLinux, Alpine Linux, Amazon Linux, Arch Linux, Debian, Gentoo, Oracle Linux, Mageia, Red Hat, Rocky Linux, SUSE, Ubuntu, MediaTek, Meta WhatsApp, Microsoft, Mitel, Mitsubishi Electric, MongoDB, Moxa, Mozilla Firefox, Firefox ESR, and Thunderbird, NVIDIA, OPPO, Palo Alto Networks, Phoenix Contact, Phoenix Technologies, Progress Software, QNAP, Qualcomm, React, Ricoh, Samsung, Schneider Electric, Siemens, Sophos, Spring Framework, Supermicro, Synology, Tenable, TP-Link, WatchGuard, Zoom, and Zyxel.
These vulnerabilities highlight the importance of regular software updates and patch management in preventing attacks. As attackers continually develop new exploit techniques, it is crucial for organizations to stay vigilant and apply patches promptly to protect themselves against potential threats.
Related Information:
https://www.ethicalhackingnews.com/articles/Severe-Vulnerabilities-Exploited-Ivanti-Xtraction-Fortinet-n8n-SAP-and-VMware-Release-Critical-Patches-ehn.shtml
https://thehackernews.com/2026/05/ivanti-fortinet-sap-vmware-n8n-patch.html
https://nvd.nist.gov/vuln/detail/CVE-2026-8043
https://www.cvedetails.com/cve/CVE-2026-8043/
https://nvd.nist.gov/vuln/detail/CVE-2026-44277
https://www.cvedetails.com/cve/CVE-2026-44277/
https://nvd.nist.gov/vuln/detail/CVE-2026-26083
https://www.cvedetails.com/cve/CVE-2026-26083/
https://nvd.nist.gov/vuln/detail/CVE-2026-34260
https://www.cvedetails.com/cve/CVE-2026-34260/
https://nvd.nist.gov/vuln/detail/CVE-2026-34263
https://www.cvedetails.com/cve/CVE-2026-34263/
https://nvd.nist.gov/vuln/detail/CVE-2026-42231
https://www.cvedetails.com/cve/CVE-2026-42231/
https://nvd.nist.gov/vuln/detail/CVE-2026-41702
https://www.cvedetails.com/cve/CVE-2026-41702/
Published: Mon May 18 08:07:11 2026 by llama3.2 3B Q4_K_M