CRITICAL 2 min read 25 Apr 2026

Palo Alto XSOAR Cryptographic Signature Bypass — Mirai Active on D-Link EoL, CISA BOD for Microsoft Defender

Palo Alto has disclosed three critical CVEs in a coordinated release affecting XSOAR, XDR Agent, and ADEM. Simultaneously, active Mirai botnet recruitment of end-of-life D-Link routers requires immediate device isolation or retirement. CISA has issued an emergency binding operational directive confirming active exploitation of Microsoft Defender / BlueHammer (CVE-2026-33825).

Key findings
01
Mirai Botnet Active on D-Link EoL Routers — CVE-2025-29635
CRITICAL
[Medium] Mirai is actively compromising end-of-life D-Link routers (DIR-825, DIR-816L) using CVE-2025-29635 (CVSS 9.8). No patch exists because these models are no longer supported.
02
Palo Alto XSOAR — CVE-2026-0234 Cryptographic Signature Bypass
HIGH
[High] Palo Alto's Cortex XSOAR has a signature verification flaw in its Microsoft Teams integration (CVE-2026-0234, CVSS 7.5). Attackers can forge Teams messages to trigger commands in XSOAR workflows without authentication.
03
Microsoft Defender / BlueHammer — CVE-2026-33825 Active Exploitation Confirmed
HIGH
[High] CISA issued an emergency binding operational directive (BOD) confirming attackers are exploiting CVE-2026-33825 in Microsoft Defender right now. Not theory. Not future risk. Active exploitation today.
04
Palo Alto XDR Agent — CVE-2026-0232 Local Security Bypass
HIGH
[High] Palo Alto XDR Agent has a flaw: a local administrator can disable it (CVE-2026-0232). Local admin compromise is a high bar, but if it happens, your endpoint monitoring goes dark.
05
Palo Alto ADEM — CVE-2026-0233 Improper Certificate Validation
HIGH
[High] Palo Alto ADEM skips certificate validation properly (CVE-2026-0233). This opens the door to man-in-the-middle attacks on ADEM communications. If an attacker sits between your ADEM instances, they intercept, modify, or replay the data flowing through.

Palo Alto XSOAR Cryptographic Signature Bypass — Mirai Active on D-Link EoL, CISA BOD for Microsoft Defender

Palo Alto XSOAR — CVE-2026-0234 Cryptographic Signature Bypass

Confidence: High

Palo Alto's Cortex XSOAR has a signature verification flaw in its Microsoft Teams integration (CVE-2026-0234, CVSS 7.5). Attackers can forge Teams messages to trigger commands in XSOAR workflows without authentication.

If you've wired XSOAR to execute security actions based on Teams events — escalating incidents, creating tickets, launching remediation — an attacker gets the same power. They can push fake commands through Teams to your orchestration layer. Patches are available now. If you run XSOAR with Teams integration, patch today.

Microsoft Defender / BlueHammer — CVE-2026-33825 Active Exploitation Confirmed

Confidence: High

CISA issued an emergency binding operational directive (BOD) confirming attackers are exploiting CVE-2026-33825 in Microsoft Defender right now. Not theory. Not future risk. Active exploitation today.

For federal organisations, the BOD is mandatory. For everyone else: this means Defender instances without the patch are targets. Microsoft has the fix ready. Get it deployed across your Windows fleet now.

Mirai Botnet Active on D-Link EoL Routers — CVE-2025-29635

Confidence: Medium

Mirai is actively compromising end-of-life D-Link routers (DIR-825, DIR-816L) using CVE-2025-29635 (CVSS 9.8). No patch exists because these models are no longer supported.

The maths is simple: connected device + no patch + active botnet = compromised machine in a few hours. If your network still has these routers, you have two options. Disconnect them. Or replace them. Waiting is not an option. The Mirai botnet grows with each vulnerable device left running.

Palo Alto XDR Agent — CVE-2026-0232 Local Security Bypass

Confidence: High

Palo Alto XDR Agent has a flaw: a local administrator can disable it (CVE-2026-0232). Local admin compromise is a high bar, but if it happens, your endpoint monitoring goes dark.

If your organisation has admins who shouldn't have that power, or if privilege creep has happened, audit your XDR Agent installations now. Lock down admin access. Check for tamper protection settings.

Palo Alto ADEM — CVE-2026-0233 Improper Certificate Validation

Confidence: High

Palo Alto ADEM skips certificate validation properly (CVE-2026-0233). This opens the door to man-in-the-middle attacks on ADEM communications. If an attacker sits between your ADEM instances, they intercept, modify, or replay the data flowing through.

Check your ADEM certificate settings. Ensure TLS validation is locked down and connections are only to trusted endpoints.

Why This Matters

Three threat vectors converge today. Palo Alto released three critical CVEs at once — a coordinated disclosure that hints these flaws have been circulating for a while. Mirai is actively recruiting routers. And CISA just told everyone: Microsoft Defender instances without the patch are under active attack.

This is not a "apply patches next Tuesday" situation. It is active threat response time.

  • Recommended Actions
  • Today: Patch Palo Alto XSOAR, XDR Agent, ADEM. Patch all Microsoft Defender instances.
  • Today: Find any D-Link DIR-825 or DIR-816L routers on your network. Disconnect or replace them.
  • This week: Lock down admin privilege on XDR Agent systems. Tighten ADEM certificate validation. Check logs for unusual admin activity.
  • Monitor: Watch for working exploits on these CVEs. If PoC code appears within 24 hours, escalate your patching to emergency priority.

All findings grounded in A13E intelligence sweeps through 06:30 UTC 25 April 2026.

active-exploitationcisa-bodcve-2025-29635cve-2026-0232cve-2026-0233cve-2026-0234cve-2026-33825d-linkmicrosoft-defendermirai

Act on this brief

Map detection coverage gaps for the techniques above, or generate Sigma rules from the named CVEs.