Palo Alto XSOAR Cryptographic Signature Bypass — Mirai Active on D-Link EoL, CISA BOD for Microsoft Defender
Palo Alto XSOAR — CVE-2026-0234 Cryptographic Signature Bypass
Confidence: High
Palo Alto's Cortex XSOAR has a signature verification flaw in its Microsoft Teams integration (CVE-2026-0234, CVSS 7.5). Attackers can forge Teams messages to trigger commands in XSOAR workflows without authentication.
If you've wired XSOAR to execute security actions based on Teams events — escalating incidents, creating tickets, launching remediation — an attacker gets the same power. They can push fake commands through Teams to your orchestration layer. Patches are available now. If you run XSOAR with Teams integration, patch today.
Microsoft Defender / BlueHammer — CVE-2026-33825 Active Exploitation Confirmed
Confidence: High
CISA issued an emergency binding operational directive (BOD) confirming attackers are exploiting CVE-2026-33825 in Microsoft Defender right now. Not theory. Not future risk. Active exploitation today.
For federal organisations, the BOD is mandatory. For everyone else: this means Defender instances without the patch are targets. Microsoft has the fix ready. Get it deployed across your Windows fleet now.
Mirai Botnet Active on D-Link EoL Routers — CVE-2025-29635
Confidence: Medium
Mirai is actively compromising end-of-life D-Link routers (DIR-825, DIR-816L) using CVE-2025-29635 (CVSS 9.8). No patch exists because these models are no longer supported.
The maths is simple: connected device + no patch + active botnet = compromised machine in a few hours. If your network still has these routers, you have two options. Disconnect them. Or replace them. Waiting is not an option. The Mirai botnet grows with each vulnerable device left running.
Palo Alto XDR Agent — CVE-2026-0232 Local Security Bypass
Confidence: High
Palo Alto XDR Agent has a flaw: a local administrator can disable it (CVE-2026-0232). Local admin compromise is a high bar, but if it happens, your endpoint monitoring goes dark.
If your organisation has admins who shouldn't have that power, or if privilege creep has happened, audit your XDR Agent installations now. Lock down admin access. Check for tamper protection settings.
Palo Alto ADEM — CVE-2026-0233 Improper Certificate Validation
Confidence: High
Palo Alto ADEM skips certificate validation properly (CVE-2026-0233). This opens the door to man-in-the-middle attacks on ADEM communications. If an attacker sits between your ADEM instances, they intercept, modify, or replay the data flowing through.
Check your ADEM certificate settings. Ensure TLS validation is locked down and connections are only to trusted endpoints.
Why This Matters
Three threat vectors converge today. Palo Alto released three critical CVEs at once — a coordinated disclosure that hints these flaws have been circulating for a while. Mirai is actively recruiting routers. And CISA just told everyone: Microsoft Defender instances without the patch are under active attack.
This is not a "apply patches next Tuesday" situation. It is active threat response time.
- Recommended Actions
- Today: Patch Palo Alto XSOAR, XDR Agent, ADEM. Patch all Microsoft Defender instances.
- Today: Find any D-Link DIR-825 or DIR-816L routers on your network. Disconnect or replace them.
- This week: Lock down admin privilege on XDR Agent systems. Tighten ADEM certificate validation. Check logs for unusual admin activity.
- Monitor: Watch for working exploits on these CVEs. If PoC code appears within 24 hours, escalate your patching to emergency priority.
All findings grounded in A13E intelligence sweeps through 06:30 UTC 25 April 2026.