CVE-2026-24178: About NVIDIA NVFlare Dashboard (29th Apr 2026)

Preface: NVIDIA FLARE allows research and data scientists to adapt existing ML/DL workflow to federated learning paradigm.

Background: A critical Insecure Direct Object Reference (IDOR) vulnerability was identified in the NVIDIA NVFlare Dashboard (CVE-2026-24178). In federated learning environments—where privacy is paramount (e.g., HIPAA-compliant medical research)—this flaw allowed unauthorized users to bypass access controls and interact with data belonging to other participants.

The Dashboard’s RESTful API previously relied on user-supplied identifiers (such as job_id or user_id) to retrieve records. While the system verified that a user was logged in (Authentication), it failed to verify if that user actually owned or was authorized to access the specific record requested (Authorization). This allowed an attacker to simply change a numeric ID in an API request to view, modify, or delete sensitive information outside their scope.

Vulnerability details: NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to privilege escalation, data tampering, information disclosure, code execution, and denial of service.

Remediation: The Patch
The vulnerability is fully addressed in NVIDIA FLARE SDK v2.7.2. The fix implements Attribute-Based Access Control (ABAC) by:

  • Decoupling Trust: The backend no longer trusts the ID provided in the request URL/body as the sole source of authority.
  • Enforcing Ownership: Every database query now automatically injects an owner_id or org_id filter derived from a secure, server-side session.
  • Silent Rejection: Unauthorized requests now correctly return a 403 Forbidden error, ensuring data isolation between collaborating parties.

Official announcement: Please refer to the link for details –

https://nvidia.custhelp.com/app/answers/detail/a_id/5819

CVE-2026-7191: Static-eval npm package in qnabot-on-aws versions 7.2.4 and earlier design weakness (28th Apr 2026)

Preface: Self-service AI is a technology that uses AI techniques (such as chatbots, natural language processing (NLP), and machine learning) to enable customers to solve problems or find information themselves anytime, anywhere, without interacting with human customer service. It acts as a digital agent, providing instant assistance through channels such as websites, instant messaging applications, and voice systems.

Background: In the context of Amazon Content Designer, the result of using static-eval depends entirely on the AST (Abstract Syntax Tree) generated from your string and the Context (variables) you provide. The primary goal of static-eval is to return a plain JavaScript value without using the dangerous eval() function.

An Abstract Syntax Tree (AST) in the context of static evaluation (static-eval) is a hierarchical, tree-structured representation of source code that captures its logical and structural meaning without requiring the code to be executed.

In static analysis, the code is parsed into this tree format, allowing tools to traverse, analyze, and manipulate the structure to find potential bugs, security vulnerabilities, or styling issues before runtime.

Vulnerability details: Improper use of the static-eval npm package in the open source solution qnabot-on-aws versions 7.2.4 and earlier may allow an authenticated administrator to execute arbitrary code within the fulfillment Lambda execution context by injecting a crafted conditional chaining expression via the Content Designer interface, which bypasses the intended expression sandbox through JavaScript prototype manipulation. This may grant direct access to backend resources (Lambda environment variables, OpenSearch indices, S3 objects, DynamoDB tables) that are not exposed through normal administrative interfaces. We recommend you upgrade to version 7.3.0 or above.

Official announcement: Please refer to link for details –

https://nvd.nist.gov/vuln/detail/CVE-2026-7191

CVE-2026-40372: ASP.NET Core Vulnerable to Privilege Elevation (28th Apr 2026)

Preface: Due to the need for high-security, compliance (HIPAA, GDPR), and transaction reliability, many banks and financial firms use ASP[.]NET. The primary difference is that ASP[.]NET (often called “ASP[.]NET Framework”) is the original, Windows-only version, while ASP[.]NET Core is a modern, cross-platform includes Windows, macOS, and Linux.

Background: The Microsoft 365 ecosystem relies heavily on ASP[.]NET Core for its modern, high-traffic web components:

Microsoft Teams: The backend for Teams is built on ASP[.]NET Core to handle the massive, real-time demands of millions of concurrent users.

Office Web Apps: Core parts of the web-based versions of Word, Excel, and Outlook utilize the[.]NET architecture for cross-platform stability.

 Bing & SharePoint: These services are frequently cited as being “proven at hyperscale” using the ASP[.]NET Core framework.

ASP[.]NET Core’s Kestrel server can handle over 7 million requests per second.

Ref: When you use an official Microsoft [.]NET Docker image, Kestrel is already there. When your container starts, it runs dotnet Myapp[.]dll, which immediately fires up Kestrel to listen for requests.

# Kestrel (Inside Container) → Receives the “cleaned” request from the proxy and runs your ASP[.]NET Core logic.

In Kubernetes, your “Pod” runs that Docker container. Kestrel handles the traffic inside that Pod. 

Vulnerability details: Improper verification of cryptographic signature in ASP[.]NET Core allows an unauthorized attacker to elevate privileges over a network.

Official announcement: Please refer to the link for details – https://nvd.nist.gov/vuln/detail/CVE-2026-40372

Closer Look – SIM-Farm-as-a-Service (28th Apr 2026)

Preface: A SIM box (or SIM bank) is a hardware device that houses multiple SIM cards simultaneously to facilitate VoIP-to-GSM call termination. It reroutes international VoIP calls to appear as local calls by using local prepaid SIM cards, allowing operators to bypass high international tariffs and exploit low local call rates. It is primarily used for, but not limited to, fraudulent bypass.

Background: Why SIM-Farm-as-a-Service (SFaaS) is a Major Security Concern

Industrial-Scale Fraud: It enables the mass creation of fake accounts for social media, messaging apps, and banking by bypassing SMS-based one-time password (OTP) verification.

Evading Detection: By using local SIM cards, scammers can disguise international phishing attempts as local calls or texts, making them harder for users and automated systems to detect.

Critical Infrastructure Risk: Massive setups, like the one dismantled by the US Secret Service in late 2025, have the capacity to overload cellular networks, potentially jamming emergency services.

Legal Gray Areas: While the hardware itself is often legal for testing purposes, its application in SFaaS models has prompted governments, notably the UK government, to pursue bans on the “possession and supply” of SIM farm equipment.

Security focus: The recent spotlight on SIM-Farm-as-a-Service in April 2026 stems from a major investigation by the cybersecurity firm Infrawatch. Please refer to the link for referene.

https://www.techradar.com/pro/sim-farm-as-a-service-how-a-belarus-based-network-hijacked-uk-and-us-telcos-to-enable-global-fraud

The “ghost data” issue has been fixed in iOS 18.7.8 and iPadOS 18.7.8, as well as iOS 26.4.2 and iPadOS 26.4.2. (24th Apr 2026)

Preface: To be or not to be! Fixing this “bug” makes it easier for criminals to destroy evidence. However, leaving it unpatched leaves billions of innocent users vulnerable to forensic data theft if their phones are ever lost or stolen.

Background: Internally, iOS manages notifications through a system service called bulletinboard. The actual data is typically stored in a SQLite database file named deliverednotifications[.]sqlite, located in a protected system directory (usually /private/var/mobile/Library/BulletinBoard/).

The Freelist Mechanism: When iOS deletes a notification, SQLite does not immediately erase the data from the hard drive; instead, it marks the block as “Freelist.”

Fundamental Problem: The original binary data still exists in these blocks before they are overwritten by new data.

• Forensic Principle: Forensic tools can scan these unallocated spaces and directly extract the message content.

Vulnerability details: A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

Official announcement: Please refer to the link for details –

https://nvd.nist.gov/vuln/detail/CVE-2026-28950

CVE-2026-24176: NVIDIA KAI Scheduler contains a vulnerability (24th Apr 2026)

Preface: When a Pod’s spec[.]schedulerName is set to kai-scheduler, the default scheduler will completely ignore the Pod, and only the KAI Scheduler’s ServiceAccount permissions will intervene to handle the scheduling and resource binding of the task.

Background: The vulnerability stems from how the scheduler tracks and authorizes GPU resources across different namespaces when using the Reservation Pod mechanism .

1.Improper Isolation: In a multi-tenant environment, the scheduler is supposed to enforce strict isolation between namespaces .

2.Cross-Namespace References: The flaw allows an attacker with access to one namespace to craft a pod definition (such as by manipulating annotations or references) that points to or impacts a PodGroup or reservation in a different, unauthorized namespace .

3.Data/Resource Tampering: By setting nvidia[.]com/gpu (an integer resource) while KAI is managing the same physical card via fractional annotations (like gpu-fraction: “0.5”), you could cause the scheduler to miscalculate or “lose track” of the actual hardware state .

Exploitation: An attacker could use these cross-namespace references to “poach” GPUs reserved for other tenants, leading to data tampering (modifying scheduling state) or unauthorized resource access .

Vulnerability details:  NVIDIA KAI Scheduler contains a vulnerability where an attacker could cause improper authorization through cross-namespace pod references. A successful exploit of this vulnerability might lead to data tampering.

Remedy: To mitigate this risk, you should immediately update to NVIDIA KAI Scheduler v0.13.0 or later .

Official announcement: Please refer to link for details –  https://nvidia.custhelp.com/app/answers/detail/a_id/5818

About CVE-2026-24189: NVIDIA CUDA-Q  (23rd Apr 2026)

Preface: NVIDIA CUDA-Q is an open-source, hybrid quantum-classical computing platform designed for simulating and controlling quantum processors (QPUs) using GPU acceleration. It acts as a unified programming model, allowing developers to write code in C++ or Python that seamlessly integrates CPUs, GPUs, and various QPU hardware.

Background: The Relationship: Client API vs. Kernel

1. CUDA-Q Client API (The “Host”)

•       Where it runs: On the CPU (Host).

•       What it does: It manages the overall application logic, classical data processing, and the orchestration of quantum tasks. It “calls” the quantum kernels and handles the results.

•       Language: Typically Python or standard C++.

2. CUDA-Q Kernel (The “Device”)

•       Where it runs: On the QPU (Quantum Processing Unit) or a GPU/CPU Simulator.

•       What it does: This is the code marked with __qpu__ (in C++) or @cudaq.kernel (in Python). It contains the actual quantum circuit instructions (Hadamard gates, CNOTs, measurements).

•       Execution: It is compiled into a specific intermediate representation (like QIR) that the backend target understands.

Vulnerability details: NVIDIA CUDA-Q contains a vulnerability in an endpoint where an unauthenticated attacker may cause an out-of-bounds read by sending a maliciously crafted request. A successful exploit of this vulnerability may lead to denial of service and information disclosure.

Official announcement: Please refer to link for details –

https://nvidia.custhelp.com/app/answers/detail/a_id/5820

Ref: To securely manage API keys and mitigate the risk of development environment theft in CUDA-Q projects, consider the following industry-standard practices. This prevents keys from being leaked in the code and provides a buffer in case the laptop environment is compromised.

1. Use Environment Variables This is the most basic and important rule: Never write API keys directly in the code.

• Local development: Edit your [.]bashrc or [.]zshrc file on your system (such as Linux or macOS):

bash export NVQC_API_KEY=”your_secret_key_here”

AMD-SB-7050:  Floating Point Value Injection (FPVI) Variant in AMD CPUs. AMD believes that existing mitigation guidance for FPVI remains valid (22nd Apr 2026)

Preface: In modern processor design, the Floating Point Unit (FPU) is no longer a separate co-processor that needs to be installed; it is now an integrated, standard component built directly into every CPU core.

Background: Unlike early processors that used slow software to mimic math, modern chips like the AMD EPYC use dedicated physical logic to handle numbers instantly. 

When you ask a CPU to add two floating-point numbers, it follows a high-speed “assembly line” process:

1.      Alignment: The CPU compares the exponents of the two numbers. It shifts the mantissa of the smaller number until their decimal points align.

2.      Calculation: Dedicated hardware—like a Floating-point Adder or Multiplier—performs the binary math on the mantissas.

3.      Normalization: The result is shifted so that it starts with a single non-zero digit (e.g., changing 0.011 x (2 to power 5) to 1.1 x (2 to power 3)).

4.      Rounding: Since binary cannot represent every decimal perfectly, the FPU applies rounding rules to fit the result into the standard bit size (32-bit or 64-bit).

Technical details: Researchers shared with AMD a report titled “TREVEX: A Black-Box Detection Framework For Data-Flow Transient Execution Vulnerabilities.”

The researchers’ paper introduced a Floating-Point Value Injection (FPVI) variant, which could allow an attacker with a deep understanding of microarchitectural behavior to inject values into vector registers during transient execution. Although they noted similarities with FPVI, they initially reported the finding as a new issue due to its capability to be triggered without denormal values as inputs.

Official announcement: AMD believes that their FPVI variant falls within the existing scope of CVE-2021-26314 (FPVI) as existing descriptions of FPVI do not specifically require denormal inputs. Additionally, AMD believes that existing mitigation guidance for FPVI remains valid.

Please refer to the link for details – https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7050.html

CVE-2026-39813: FortiSandbox 5.2 and 4.2 not affected by JRPC API design weakness. Please staying alert! (21st Apr 2026)

Preface: FortiSandbox sends analyzed threat logs (including malicious file behavior, risk ratings, etc.) to FortiSIEM.

FortiSIEM obtains threat intelligence from FortiSandbox via API, correlates and analyzes it with logs from other devices to enrich alert content and improve detection accuracy.

Background: In the Fortinet ecosystem, the filedir parameter is specifically used in the FortiSIEM Integration API, rather than the standard FortiManager JRPC configuration API. It is used during Lookup Table operations to specify the directory path for CSV file imports.

Key Difference: FortiManager vs. FortiSIEM

  • FortiManager/FortiOS: Uses the url and data structure for almost all JRPC tasks. File operations (like backups) are usually handled by exec commands that return the file content directly in the JSON response, without requiring a local filedir on the appliance.
  • FortiSIEM: Uses explicit path parameters like fileDir and fileName for bulk data ingestion and system-level integrations.

Vulnerability details: A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.

Official announcement: Please refer to the links for details:

https://nvd.nist.gov/vuln/detail/CVE-2026-39813

https://fortiguard.fortinet.com/psirt/FG-IR-26-112

As of April 19, 2026, Active Region 4419 (AR 4419) is a visible sunspot region that has been monitored for potential solar flare activity.

Preface: Between April 19th and 20th, 2026, a solar storm will cross Earth’s magnetic poles. When the coronal mass ejection (CME) reaches Earth, it will first disrupt the Earth’s magnetic field, triggering a geomagnetic storm—a global geomagnetic disturbance that could interfere with satellite operations and ground-based power systems. What are your thoughts on this?

Background: We are currently at the peak of the 25th solar cycle, meaning storms of today’s magnitude will become more frequent. While G2-class storms have limited impact on everyday life, they represent a stress test for precision navigation (due to increased GPS errors) and power grid stability, requiring close monitoring.

The CME energy of this storm is expected to peak on the evening of the 19th.

Practical Effects on Earth:

•       Aurora Borealis: Because of the G1-G2 storm conditions, high-latitude regions (e.g., Canada, Northern US, Northern Europe) have a high probability of visible auroras during the night of April 19.

•       Radio & Navigation: If AR 4419 produces an M-class flare, it may cause brief Shortwave Radio Blackouts (R1-R2 levels). Additionally, the geomagnetic disturbance from the coronal hole might cause minor fluctuations in GPS accuracy.

Official details: Please refer to the link – https://www.swpc.noaa.gov/communities/aurora-dashboard-experimental