CRITICAL 9 min read 21 Apr 2026

Vault, Nexus, WebEx and Windows DC Patch Regression Demand Immediate Action — 21 April 2026

Tier-0 advisories from BSI CERT-BUND, Cisco, HashiCorp, Sonatype and Microsoft expose secrets management, enterprise collaboration, software supply chain and network identity fabrics to simultaneous critical vulnerabilities. Windows domain controller patch regression remains unresolved. UK and EU enterprises face compressed remediation windows against an already-elevated April threat landscape.

Key findings
01
HashiCorp Vault Multiple Vulnerabilities (WID-SEC-2026-1164)
HIGH
[High] BSI CERT-BUND published WID-SEC-2026-1164 on 17 April 2026, covering multiple vulnerabilities in HashiCorp Vault that affect the core secrets management fabric.
02
Sonatype Nexus Repository Manager RCE + Security Bypass (WID-SEC-2026-1138)
HIGH
[High] BSI CERT-BUND WID-SEC-2026-1138 discloses a combined remote code execution and security bypass vulnerability in Sonatype Nexus Repository Manager, published 16 April 2026. Nexus serves as the centralised artifact repository for Java, npm, Docker and other ecosystems inside many enterprises.
03
Cisco WebEx Multiple Vulnerabilities (WID-SEC-2026-1132)
HIGH
[High] BSI CERT-BUND WID-SEC-2026-1132, published 16 April 2026, covers multiple high-severity vulnerabilities in Cisco WebEx. WebEx has become the default collaboration platform across UK and EU enterprises through the remote-work transition, and it now carries business-critical traffic: board meetings, client reviews, cross-border HR conversations and incident response calls.
04
Cisco Identity Services Engine Multiple Vulnerabilities (CVE-2026-20184, WID-SEC-2026-1146)
HIGH
[High] Cisco disclosed CVE-2026-20184 alongside three companion CVEs affecting Identity Services Engine, the enterprise AAA fabric responsible for 802.1X network access control across UK and EU financial services, telecommunications and government estates.
05
Linux Kernel April Vulnerability Batch (WID-SEC-2026-0614 and related)
HIGH
[High] BSI CERT-BUND and Red Hat together disclosed more than thirty Linux kernel CVEs between 17 and 20 April 2026, spanning denial-of-service, privilege escalation and memory disclosure classes across kernel components.
06
Microsoft Defender Privilege Escalation (CVE-2026-33825, Blue Hammer) — PATCHED
HIGH
[High] CVE-2026-33825, tracked by BSI CERT-BUND WID-SEC-2026-1155 and NCSC-NL NCSC-2026-0115, affects Microsoft Defender and permits privilege escalation to SYSTEM on Windows hosts.
07
Windows April 2026 Patch Regression — Domain Controller Reboot Loops
MEDIUM
[Medium] Microsoft is investigating a regression in the April 2026 security patch bundle causing unexpected reboot loops on Windows Server domain controllers. Reported by BleepingComputer on 17 April 2026 and acknowledged in Microsoft official statements, the regression affects a subset of deployments and does not yet have a corrected build.
08
ShowDoc RCE (CVE-2025-0520) — Active Exploitation
MEDIUM
[Medium] CVE-2025-0520 is a remote code execution vulnerability in ShowDoc, and The Hacker News reported on 14 April 2026 that unpatched production instances are being actively exploited. A vendor patch is available.
09
108 Malicious Chrome Extensions — 20,000+ Users Compromised
MEDIUM
[Medium] The Hacker News documented the discovery of 108 malicious Chrome extensions in the official Chrome Web Store harvesting Google and Telegram credentials, affecting more than twenty thousand users.
10
Mirai Nexcorium Variant — CVE-2024-3721
MEDIUM
[Medium] The Hacker News reported a Mirai botnet variant exploiting CVE-2024-3721, continuing the sustained pressure of Mirai-family botnets against internet-exposed consumer and small-business network devices.
11
Apple Account Change Alerts Abused for Phishing [LOW-ACTIONABILITY]
MEDIUM
[Medium] BleepingComputer reported on 19 April 2026 that threat actors are abusing Apple's own account-change notification system to deliver phishing emails that appear to originate from Apple infrastructure. This is a tactics-techniques-and-procedures discovery rather than a CVE-bearing vulnerability.
12
References
MEDIUM
• BSI CERT-BUND, WID-SEC-2026-1164 — HashiCorp Vault multiple vulnerabilities, 17 April 2026 • BSI CERT-BUND, WID-SEC-2026-1138 — Sonatype Nexus Repository Manager RCE + security bypass, 16 April 2026 • BSI CERT-BUND, WID-SEC-2026-1132 — Cisco WebEx multiple vulnerabilities, 16 April 2026 • BSI

Vault, Nexus, WebEx and Windows DC Patch Regression Demand Immediate Action — 21 April 2026

HashiCorp Vault Multiple Vulnerabilities (WID-SEC-2026-1164)

Confidence: High

BSI CERT-BUND published WID-SEC-2026-1164 on 17 April 2026, covering multiple vulnerabilities in HashiCorp Vault that affect the core secrets management fabric. Vault has become the de-facto standard for credential and secrets orchestration in cloud-native enterprises: database passwords, API keys, OAuth tokens and TLS certificates routinely flow through Vault for programmatic retrieval by workloads.

A successful exploit of these flaws creates a direct path to plaintext credentials across the enterprise. Because Vault centralises access to secrets that other systems assume are isolated, a compromise cascades into every application holding a Vault-issued credential. HashiCorp's rapid-response history suggests patches are imminent if not already available; defenders should track the Vault release notes closely and prepare for rotation of any secrets that may have been touched during the exposure window.

Immediate actions: audit Vault deployments against the advisory's affected versions, enable Vault audit logging if not already active, and review secret-access patterns for anomalies. Upon patch validation, plan a rotation of high-value secrets as a precautionary measure rather than a confirmed breach response.

Sonatype Nexus Repository Manager RCE + Security Bypass (WID-SEC-2026-1138)

Confidence: High

BSI CERT-BUND WID-SEC-2026-1138 discloses a combined remote code execution and security bypass vulnerability in Sonatype Nexus Repository Manager, published 16 April 2026. Nexus serves as the centralised artifact repository for Java, npm, Docker and other ecosystems inside many enterprises. A compromise of Nexus strikes at the heart of the software supply chain: attackers with RCE in the artifact repository can tamper with every binary built or pulled from that point forward.

The security-bypass component compounds the risk by undermining the trust boundary that CI/CD pipelines rely on. Downstream build systems assume artefacts retrieved from Nexus carry the provenance guarantees that the repository's access controls are supposed to enforce; a bypass removes that assumption. Enterprises should treat any artifact produced after a suspected compromise window as unverified until forensic evidence confirms otherwise.

Patch when available; in the interim, isolate the Nexus instance at the network layer, review artifact checksums against known-good baselines, and prepare to quarantine any recent builds should compromise be confirmed.

Cisco WebEx Multiple Vulnerabilities (WID-SEC-2026-1132)

Confidence: High

BSI CERT-BUND WID-SEC-2026-1132, published 16 April 2026, covers multiple high-severity vulnerabilities in Cisco WebEx. WebEx has become the default collaboration platform across UK and EU enterprises through the remote-work transition, and it now carries business-critical traffic: board meetings, client reviews, cross-border HR conversations and incident response calls.

Vulnerability classes across the advisory bundle include paths to meeting hijacking, credential theft and exfiltration of recorded sessions. Post-exploitation value is high because WebEx recordings frequently contain unredacted commercial and personal data. Cisco typically releases coordinated patches for WebEx within one to two weeks of BSI disclosure; organisations should track the Cisco Security Center for advisory identifiers mapping to this BSI reference.

Short-term mitigations: disable WebEx client auto-update to prevent silent rollouts until the patched version is vetted, coordinate with endpoint management for forced deployment once validated, and review recent recording storage for unexpected access patterns.

Cisco Identity Services Engine Multiple Vulnerabilities (CVE-2026-20184, WID-SEC-2026-1146)

Confidence: High

Cisco disclosed CVE-2026-20184 alongside three companion CVEs affecting Identity Services Engine, the enterprise AAA fabric responsible for 802.1X network access control across UK and EU financial services, telecommunications and government estates. BSI CERT-BUND corroborated the finding in WID-SEC-2026-1146 on 16 April 2026.

Code execution flaws in identity services carry disproportionate blast radius. Compromise of ISE does not merely expose a single application: it undermines the authentication posture of every device that relies on ISE for network admission. Attackers gaining ISE privileges can authenticate as legitimate users, bypass segmentation policies, and persist invisibly within environments that treat successful AAA as evidence of legitimacy.

ISE patches typically see slower adoption than perimeter firewall updates due to authentication dependency risk. This advisory warrants inverting that practice: defenders should prioritise ISE patching over other April updates, stage the patch in a non-production AAA domain first, and plan a change-management window that accounts for brief authentication interruption.

Windows April 2026 Patch Regression — Domain Controller Reboot Loops

Confidence: Medium

Microsoft is investigating a regression in the April 2026 security patch bundle causing unexpected reboot loops on Windows Server domain controllers. Reported by BleepingComputer on 17 April 2026 and acknowledged in Microsoft official statements, the regression affects a subset of deployments and does not yet have a corrected build. Specific KB article scoping is pending Microsoft's detailed advisory.

Domain controllers are the singular authority for authentication and directory services across Windows enterprise estates. Reboot loops on DCs disrupt every downstream operation that depends on domain authentication: file shares, Group Policy application, certificate services and application single sign-on. The risk calculation is unusual because the threat vector is the patch itself rather than a failure to patch.

Recommended posture: HOLD April security patches on production domain controllers pending a corrected Microsoft build, continue patching non-DC Windows systems on the normal cadence, and validate DC patch candidates in a mirrored lab before any production rollout. Track the Microsoft Security Response Center for the corrected build release.

Linux Kernel April Vulnerability Batch (WID-SEC-2026-0614 and related)

Confidence: High

BSI CERT-BUND and Red Hat together disclosed more than thirty Linux kernel CVEs between 17 and 20 April 2026, spanning denial-of-service, privilege escalation and memory disclosure classes across kernel components. WID-SEC-2026-0614 is one of the representative entries; the full set carries sustained patching pressure across distribution channels.

For UK and EU enterprises running Linux on infrastructure-critical workloads — DNS resolvers, load balancers, Kubernetes control planes, CI/CD runners — this batch cannot be deferred indefinitely. At the same time, the volume of advisories and the diversity of kernel subsystems involved make a single-weekend rollout impractical for most change-management regimes.

Recommended approach: phased deployment over a two-week rolling window, staging through non-production and observability-rich workloads first, prioritising externally exposed systems over internal compute. Subscribe to Red Hat Security Advisory feeds and the kernel.org release announcements to track patch availability per distribution.

Microsoft Defender Privilege Escalation (CVE-2026-33825, Blue Hammer) — PATCHED

Confidence: High

CVE-2026-33825, tracked by BSI CERT-BUND WID-SEC-2026-1155 and NCSC-NL NCSC-2026-0115, affects Microsoft Defender and permits privilege escalation to SYSTEM on Windows hosts. Microsoft released the patch in the 15 April 2026 Patch Tuesday cycle, moving this finding from unpatched to remediated status.

The presence of three Tier-0 corroborating sources — BSI, NCSC-NL and Microsoft — confers high confidence. Because Defender ships across essentially every Windows enterprise deployment, unpatched estates represent a broad local-privilege-escalation exposure. Deployment should use the normal patching mechanisms (WSUS, Group Policy, Intune or SCCM) with compliance verification within 48 hours.

ShowDoc RCE (CVE-2025-0520) — Active Exploitation

Confidence: Medium

CVE-2025-0520 is a remote code execution vulnerability in ShowDoc, and The Hacker News reported on 14 April 2026 that unpatched production instances are being actively exploited. A vendor patch is available. The active-exploitation status compresses the response window: defenders should assume that any internet-reachable unpatched instance has been targeted within hours of the disclosure.

Organisations running ShowDoc for internal documentation should locate every deployment, apply the vendor patch within 48 to 72 hours, and review logs for signs of compromise predating the patch window. Where patching is delayed, isolate the instance from general network access and capture forensic snapshots before remediation.

108 Malicious Chrome Extensions — 20,000+ Users Compromised

Confidence: Medium

The Hacker News documented the discovery of 108 malicious Chrome extensions in the official Chrome Web Store harvesting Google and Telegram credentials, affecting more than twenty thousand users. Google has since removed the extensions, but the pattern confirms that the Chrome Web Store vetting process is not a reliable security control on its own.

The downstream risk for enterprises is credential theft cascading into Google Workspace and corporate Gmail account takeover. Enterprise Chrome estates that rely on unrestricted extension installation are directly exposed. Recommended response: audit deployed extensions against the published list of 108 identifiers, deploy an extension allowlist via Chrome Enterprise policy if not already in place, and treat this as a recurring risk rather than a resolved incident.

Mirai Nexcorium Variant — CVE-2024-3721

Confidence: Medium

The Hacker News reported a Mirai botnet variant exploiting CVE-2024-3721, continuing the sustained pressure of Mirai-family botnets against internet-exposed consumer and small-business network devices. While the individual CVE is older, the variant represents a fresh distribution wave targeting unpatched devices that have now been exposed for an extended window.

Enterprise impact is secondary but real: compromised small-office and home-office devices on corporate networks, or residential ISP-managed devices used for remote work, can serve as ingress points into otherwise protected estates. Recommended action is a network egress review for Mirai-family command-and-control traffic and confirmation that remote-worker endpoints are not routing through compromised home devices.

Apple Account Change Alerts Abused for Phishing [LOW-ACTIONABILITY]

Confidence: Medium

BleepingComputer reported on 19 April 2026 that threat actors are abusing Apple's own account-change notification system to deliver phishing emails that appear to originate from Apple infrastructure. This is a tactics-techniques-and-procedures discovery rather than a CVE-bearing vulnerability. There is no Tier-0 corroboration from Apple yet.

The finding is flagged [LOW-ACTIONABILITY] because the technique does not require immediate defensive action beyond standard user-awareness training. Security teams should track for an official Apple security response and, in the interim, include the pattern in phishing-awareness briefings: users should confirm account changes by navigating directly to Apple settings rather than responding to notifications.

Why This Matters

The April 2026 threat window has now accumulated simultaneous critical exposures in every layer of the enterprise stack: secrets management (Vault), software supply chain (Nexus), collaboration (WebEx), network identity (ISE), endpoint protection (Defender, now patched), operating-system kernel (Linux batch) and the patch-management system itself (Windows DC regression). These are not isolated incidents being reported on the same day — they are the combined output of sustained vulnerability research pressure across the ecosystem.

BSI CERT-BUND continues to serve as the highest-signal aggregator for UK and EU defenders, republishing vendor advisories with regional context and often surfacing them faster than vendor-only channels. Organisations that have not subscribed to BSI CERT-BUND feeds as a primary intelligence source are operating with a latency penalty that is difficult to justify.

The Windows domain controller patch regression introduces an unusual inversion of the normal calculus. Defenders habituated to "patch immediately" discipline must now exercise the opposite restraint on a specific subsystem while maintaining momentum everywhere else. This demands clear internal communication to prevent operators from either blanket-holding all April patches or blanket-applying them without regard to the DC-specific risk.

Recommended Actions

  • Immediate (0–24 hours):
  • Locate HashiCorp Vault deployments and stage the advisory-matching patch in a staging environment ahead of production rollout
  • Identify Sonatype Nexus instances and review network-level isolation
  • Enumerate Cisco WebEx client versions across the endpoint fleet; pause client auto-update until the patched version is vetted
  • Apply the Microsoft Defender CVE-2026-33825 patch (Patch Tuesday, 15 April 2026) across the Windows estate with compliance verification
  • Short-term (24–72 hours):
  • Deploy Cisco ISE patches ahead of other April infrastructure updates
  • Patch ShowDoc instances under active-exploitation conditions
  • Audit Chrome Enterprise policies for extension allowlists and remove the 108 identified malicious extensions from any managed browsers
  • Begin staging the Linux kernel batch rollout, externally exposed hosts first
  • Ongoing:
  • Maintain HOLD on April 2026 security patches for Windows domain controllers until Microsoft releases a corrected build
  • Continue monitoring BleepingComputer, Microsoft Security Response Center, and BSI CERT-BUND for the DC-regression resolution
  • Subscribe to BSI CERT-BUND feeds as a primary intelligence source if not already in place

All findings are grounded in A13E intelligence sweeps through 04:34 UTC and 16:33 UTC on 20 April 2026, validated by Tier-0 BSI CERT-BUND, Cisco, HashiCorp, Sonatype, Microsoft and NCSC-NL advisories.

  • References
  • BSI CERT-BUND, WID-SEC-2026-1164 — HashiCorp Vault multiple vulnerabilities, 17 April 2026
  • BSI CERT-BUND, WID-SEC-2026-1138 — Sonatype Nexus Repository Manager RCE + security bypass, 16 April 2026
  • BSI CERT-BUND, WID-SEC-2026-1132 — Cisco WebEx multiple vulnerabilities, 16 April 2026
  • BSI CERT-BUND, WID-SEC-2026-1146 — Cisco Identity Services Engine multiple vulnerabilities, 16 April 2026
  • NVD, CVE-2026-20184 — Cisco Identity Services Engine
  • BSI CERT-BUND, WID-SEC-2026-0614 — Linux kernel multiple vulnerabilities (representative), 17 April 2026
  • Red Hat, RHSA advisory index for April 2026 kernel updates, 17–20 April 2026
  • BSI CERT-BUND, WID-SEC-2026-1155 — Microsoft Defender privilege escalation (CVE-2026-33825), 16 April 2026
  • NCSC-NL, NCSC-2026-0115 — Microsoft Defender Blue Hammer
  • Microsoft Security Response Center, CVE-2026-33825 — Windows Defender elevation of privilege, 15 April 2026
  • BleepingComputer, Microsoft investigates April 2026 patch causing Windows domain controller reboot loops, 17 April 2026
  • NVD, CVE-2025-0520 — ShowDoc remote code execution
  • The Hacker News, 108 malicious Chrome extensions harvest credentials from 20,000+ users, April 2026
  • The Hacker News, Mirai botnet Nexcorium variant exploits CVE-2024-3721, April 2026
  • BleepingComputer, Apple account change alerts abused to send phishing emails, 19 April 2026
active-exploitationbsi-cert-bundcisco-isecve-2024-3721cve-2025-0520cve-2026-20184cve-2026-33825linux-kernelnexussupply-chain

Act on this brief

Map detection coverage gaps for the techniques above, or generate Sigma rules from the named CVEs.