As an ongoing service to Quest's valued clients, our team of experts monitors security and service advisories we are seeing in the market from multiple vendors and these important notices are sent to our clients. You can view an overview of our recent advisories below. If you need more information on any of these advisories, or would like to set up a meeting to discuss them further, please reach out to our team.
Security Advisory: Critical Cisco Catalyst SD-WAN Vulnerabilities (2/25)
Security Advisory: Critical Vulnerabilities in Dell RecoverPoint (2/19)
Security Advisory: Emerging Security Risks in Autonomous AI Agents (2/12)
Security Advisory: Notepad++ Update Compromise (2/4)
Security Advisory: Cisco Communications Manager Vulnerability impacting Multiple Products (1/22)
Security Advisory: Strengthen Email Security with BIMI (1/20)
Security Advisory: Fortinet Vulnerability impacting Multiple Products (1/15)
Security Advisory: BRICKSTORM Malware Targeting VMware and Windows (12/19)
Security Advisory: Critical Vulnerabilities in React Server Components (12/10)
Security Advisory: Critical Fortinet Vulnerabilities Impacting Multiple Products (12/9)
Security Advisory: Critical Cisco Unified Contact Center Express Vulnerabilities (11/5)
Security Advisory: Critical Vulnerabilities in Veeam Products (10/14)
Security Advisory: Immediate Critical Risk in MySonicWall Firewall Backups (10/9)
Quest has been notified of security advisories addressing multiple critical vulnerabilities in Cisco Catalyst SD-WAN products currently under global exploitation. Cisco has urgently patched critical security vulnerabilities that could allow unauthenticated users to bypass authentication and elevate privileges to root on impacted products listed in their Security Advisory.
Vendor: Cisco
CVE(s): CVE-2026-20127, CVE-2026-20122, CVE-2026-20126, CVE-2026-20128, CVE-2026-20129, CVE-2026-20133
CVSS: 9.8-10.0 (Critical)
In the wild: Yes
Unauthenticated: Yes
Description: Cisco Catalyst SD-WAN Controller Authentication Bypass, Privilege Escalation Vulnerabilities
Impact: Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage) could allow an attacker to access an affected system, elevate privileges to root, gain access to sensitive information, and overwrite arbitrary files. An additional vulnerability in the peering authentication of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.
Workarounds: None
Link to source(s):
Cisco Catalyst SD-WAN Controller Auth Bypass CVE-2026-20127:
Cisco Catalyst SD-WAN Vulnerabilities CVE-2026-20122, CVE-2026-20126, CVE-2026-20128, CVE-2026-20129, CVE-2026-20133: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
IOC available: Yes
Recommendation:
1. Inventory all in-scope Cisco SD-WAN systems.
2. Collect artifacts, including virtual snapshots and logs from SD-WAN systems, to support threat-hunting activities.
3. Fully patch Cisco SD-WAN systems with available updates.
4. Hunt for evidence of compromise.
5. Concurrently review Cisco’s latest security advisories, Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability and Cisco Catalyst SD-WAN Vulnerabilities, and implement Cisco’s SD-WAN Hardening Guidance.
CISA has also provided guidance: CISA and Partners Release Guidance for Ongoing Global Exploitation of Cisco SD-WAN Systems | CISA
If you need assistance with threat hunting, artifact collection, hardening configuration, updating Cisco Catalyst SD-WAN products, or would like to discuss these vulnerabilities in more detail, please reply to this email, and we will set up a call.
Quest has been notified of a maximum severity zero-day security advisory addressing critical risks Dell RecoverPoint for Virtual Machines. Dell is urging customers to immediately update / address Dell RecoverPoint for Virtual Machines to a patched version.
Vendor: Dell / RecoverPoint
CVE(s): CVE-2026-22769
CVSS: 10.0 (Critical)
In the wild: Yes
Unauthenticated: Yes
Description: Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.
Impact: Full system compromise leading to ransomware and to data theft
Workarounds: No
Link to source(s): https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079
Indicators of Compromise (IOC) available: No
Mitigation & Recommendations: Upgrade immediately to a non-impacted version and ensure that RecoverPoint for Virtual Machines be deployed within a trusted, access-controlled internal network protected by appropriate firewalls and network segmentation.
If you need assistance reviewing, implementing the mitigation & recommendations or would like to discuss these vulnerabilities in more detail, please reply to this email, and we will set up a call.
Quest’s Threat Intelligence has been monitoring a growing risk to organizations with the rapid rise and availability of Agentic AI agents. Agentic AI agents (or agentic AI) are autonomous software systems driven by large language models (LLMs) that plan, reason, and act independently to achieve complex, multi-step goals with minimal human oversight. Unlike chatbots that simply generate text, these agents use tools to interact with digital environments, learn from feedback, and make decisions to execute entire processes. While powerful, research has identified multiple critical risks associated with AI agent deployments.
Known Security Risks:
Critical Remote Code Execution (RCE)
Critical vulnerabilities have allowed one-click remote code execution via token exfiltration and WebSocket hijacking. Simply visiting a malicious web page could allow attackers to take full control of the host system.
Internet Exposed Instances at Scale
Security researchers have identified over 100K AI agent instances exposed to the public internet, many with weak or no authentication. A significant portion of these instances were vulnerable to known exploits, enabling attackers to access files, API keys, chat histories, and connected services.
Malicious Skills and Supply Chain Risk
An audit of AI agent extension marketplaces revealed thousands (and growing daily) of malicious skills designed to distribute malware, such as the Atomic macOS Stealer, via fake prerequisites and social engineering.
Prompt Injection and Logic Abuse
Because AI agents access private data, ingest untrusted content, and can take autonomous actions, they are highly susceptible to prompt injection attacks. In these attacks, malicious instructions are hidden in emails, documents, or web pages. These attacks do not require software exploits and may bypass traditional security tooling.
Credential Concentration and Data Leakage
AI agents commonly store API keys, OAuth tokens, chat logs, and session data locally. Misconfiguration or compromise can expose multiple systems at once, creating a high-impact single point of failure.
Financial Risk
Uncontrolled financial spending has already materialized in deployments through runaway API usage, prompt-injection attacks that trigger paid actions, and retries with unreasonable persistence. Reports of crypto wallet draining have also surfaced.
Recommendations:
Block AI Agent applications, downloads, network traffic at the endpoint and gateway level.
Treat unauthorized AI deployments as “shadow IT” and remediate/contain accordingly.
For companies choosing to use Agentic AI agents, Quest recommends strong safeguards (Guardrails) such as runtime isolation, reduced network exposure, least privilege permissions, controlled use of skills/extensions, spend limits, data exposure protection, and monitoring to detect anomalous behavior.
If you need help reviewing your defensive posture, assistance with detection or guardrail configuration, or would like to discuss this further, please let us know, and we will schedule a call.
Quest is advising our customers of a recent compromise involving the well-known text editor Notepad++, widely used by IT admins and developers.
What Was Discovered
The Notepad++ development team and independent researchers confirmed this week that the software’s official update infrastructure was compromised by a sophisticated threat actor between June and December 2025. During this period, certain update requests were intercepted and redirected to attacker-controlled servers, which delivered malicious payloads instead of legitimate update files.
The identified malware included a custom backdoor (dubbed “Chrysalis”), capable of providing persistent remote access. This activity is believed to be the result of a compromised update service, not a flaw in the application itself.
What Happened
What Was the Impact
Who Is at Risk
The attack is believed to be highly selective rather than broadly distributed. However, systems that installed Notepad++ updates from mid-2025 may be at risk.
What Does Quest Recommend?
Quest is actively reviewing telemetry and can assist with version checks, IOC scanning, and remediation. Please reach out and let us know how we can help.
Quest has been notified of a security advisory addressing critical vulnerabilities in multiple Cisco Unified Communications Manager products. Cisco has urgently patched a critical security vulnerability that could allow unauthenticated users to perform privilege escalation exploits on impacted products listed in their Security Advisory.
Vendor: Cisco (Unified CM, Unified CM SME, Unified CM IM&P, UC, Cisco Webex Calling)
CVE(s): CVE-2026-20045
CVSS: 8.2 (Critical)
In the wild: Yes
Unauthenticated: Yes
Description: A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device
Impact: This vulnerability could enable attackers to gain admin-level / root privileges on affected systems.
Workarounds: No
Link to source(s): Cisco Security Advisory
Indicators of Compromise (IOC) available: No
Recommendation: Review the vendor advisory, confirm applicability, and update to a patched version as soon as feasible.
If you need help reviewing or patching the affected Cisco products, or would like to discuss these vulnerabilities further, please let us know.
As the sophistication of email attacks against organizations continues to grow, there is a simple but powerful way to improve protection against phishing while also strengthening brand trust. That technology is called BIMI, which allows your verified company logo to appear next to legitimate emails in employee and customer inboxes. This gives recipients a quick visual signal that a message is authentic and not a spoofed email.
BIMI works alongside traditional email security controls like SPF, DKIM, and DMARC to ensure that only properly authenticated emails receive this brand indicator.
A recent high-profile example where BIMI proved valuable occurred during the widespread wave of Instagram password reset emails earlier this month.
1. Valid password reset emails were being sent from Instagram but were not initiated by the users themselves
2. As this issue became publicized, threat actors quickly weaponized the situation by sending spoofed messages with identical content but not from Instagram
3. Many recipients struggled to distinguish real messages from fake ones because sender names and addresses appeared legitimate
4. Instagram had BIMI enabled for their domain, ensuring their logo was visible in official messages
5. This allowed Instagram to communicate to users a simple and reliable way to identify valid emails
6. This visual distinction helped users pause, verify, and avoid malicious links
Example of Phishing email without BIMI
Valid Email with BIMI logo
Beyond security, BIMI also strengthens brand confidence
1. Recipients see your logo consistently in the inbox, reinforcing brand recognition
2. Users gain confidence that messages truly come from your organization
3. Customers are less likely to ignore or mistrust legitimate communications
Major email providers such as Google, Yahoo, and Apple validate BIMI participation. This means your organization is not only improving security but also meeting higher trust standards recognized by leading email platforms.
Quest can guide you through:
1. DMARC readiness and enforcement
2. SPF and DKIM validation
3. BIMI record configuration
4. Verified Mark Certificate guidance
If you would like a short BIMI readiness review or technical walkthrough, please let our team know.
Quest has been notified of a security advisory addressing a vulnerability in Fortinet products. Fortinet has patched the vulnerability that could allow unauthenticated users to execute arbitrary code or commands via specifically crafted requests.
Vendor: Fortinet (FortiOS and FortiSwitchManager)
CVE(s): CVE-2025-25249
CVSS: 7.4 (High)
In the wild: No
Unauthenticated: Yes
Description: A heap-based buffer overflow vulnerability in FortiOS and FortiSwitchManager cw_acd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Impact: This vulnerability could enable attackers to gain admin-level privileges on affected systems.
Workarounds: Yes, temporary workarounds are available until upgrading to a non-affected version.
Link to source(s): Fortinet Security Advisory
Indicators of Compromise (IOC) available: No
Recommendation: Review the vendor advisory, confirm applicability, apply the workaround, and update to a patched version as soon as feasible.
If you need assistance reviewing or implementing the temporary workaround, patching impacted Fortinet products, or discussing these vulnerabilities in more detail, please reply to this email, and we will set up a call.
Quest has been made aware of BRICKSTORM, a critical backdoor malware campaign actively targeting VMware vSphere environments, including ESXi and vCenter, as well as Windows systems. This threat enables stealthy, long-term access and can be used to exfiltrate VM snapshots, harvest credentials, and run remote shells. If you manage VMware or Windows servers, act now.
Link to Source(s):
Who’s Affected:
Immediate Actions (Do These Now):
Temporary Mitigations:
Indicators and Resources:
If you need assistance reviewing or implementing the mitigations and recommendations, or if you’d like to discuss these vulnerabilities in more detail, please let us know.
Quest has been made aware of a critical vulnerability affecting web applications built with React Server Components (RSC) and related frameworks such as Next.js. Known as React2Shell, this flaw allows unauthenticated remote code execution (RCE) through specially crafted HTTP requests.
If you use React Server Components or frameworks like Next.js, patch now and implement temporary mitigations to prevent compromise.
Vendor: Meta (React), Vercel (Next.js)
CVE(s): CVE-2025-55182
CVSS: 10.0 (Critical)
In the Wild: Yes-active exploitation confirmed
Unauthenticated: Yes
Description: A critical vulnerability in React Server Components (RSC) allows unauthenticated remote code execution (RCE) via unsafe deserialization in the Flight protocol. Attackers can send specially crafted HTTP requests to React Server Function endpoints, enabling arbitrary code execution without credentials. Internet-facing devices running vulnerable versions are being targeted by threat actors; immediate action is required.
Impact: Full server compromise, including ability to install web shells, deploy malware, and pivot within the environment. Exploits are low complexity and hard to detect.
Affected Versions:
Workarounds: Yes; Temporary – Apply WAF rules to block suspicious payloads (__proto__, constructor, prototype) and monitor logs until patched.
Link to source(s):
CISA Adds One Known Exploited Vulnerability to Catalog
Indicators of Compromise (IOC) available: Limited – Look for unusual POST requests targeting RSC endpoints and signs of reverse shells or web shells.
Mitigation & Recommendations:
If you need assistance reviewing, implementing the mitigation & recommendations or would like to discuss these vulnerabilities in more detail, please let us know.
Quest has been notified of a security advisory addressing critical vulnerabilities in Fortinet products. Fortinet has urgently patched vulnerabilities that could allow unauthenticated users to bypass SSO login authentication for FortiOS, FortiCloud, FortiWeb, FortiProxy, and FortiSwitchManager, granting admin-level privileges on impacted products listed in their Security Advisory.
Vendor: Fortinet (FortiCloud, FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager)
CVE(s): CVE-2025-59718, CVE-2025-59719
CVSS: 9.1 (Critical)
In the Wild: No (but exploitation is expected shortly)
Unauthenticated: Yes
Description: A vulnerability in the verification of cryptographic signatures in FortiOS may allow an unauthenticated attacker to bypass FortiOS FortiCloud SSO login authentication via a crafted SAML response message.
Impact: This vulnerability could enable attackers to gain admin-level privileges on affected systems.
Workarounds: Yes, temporary workarounds are available until upgrading to a non-affected version.
Link to source(s): Fortinet Security Advisory
Indicators of Compromise (IOC) available: No
Recommendation: Review the vendor advisory, confirm applicability, immediately apply the workaround, and update to a patched version as soon as possible.
If you need assistance reviewing or implementing the temporary workaround, patching impacted Fortinet products, or discussing these vulnerabilities in more detail, please reply to this email, and we will set up a call.
Quest has been notified of a security advisory addressing critical vulnerabilities in Cisco Unified Contact Center Express (Unified CCX) products. Cisco has urgently patched vulnerabilities that could allow unauthenticated users to perform privilege-escalation exploits on impacted products listed in their Security Advisory.
Vendor: Cisco
CVE(s): CVE-2025-20354, CVE-2025-20358
CVSS: 9.8 (Critical)
In the wild: Cisco PSIRT is not aware of any public announcements or malicious use as of this posting.
Unauthenticated: Yes
Description: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities
Impact: A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX could allow an unauthenticated, remote attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system.
Workarounds: None
Link to source(s): https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
Indicators of Compromise (IOC) available: No
Recommendation: Review the vendor advisory, confirm applicability, and apply updates as necessary.
If you need assistance reviewing and patching impacted Cisco Unified Contact Center Express (Unified CCX) products—or would like to discuss these vulnerabilities in more detail—please let us know, and we will set up a call.
Quest is reaching out to inform you of critical security vulnerabilities disclosed on October 14, 2025, affecting Veeam Backup & Replication and Veeam Agent for Microsoft Windows. These vulnerabilities may pose a significant risk to backup infrastructure if not addressed promptly.
Summary of Vulnerabilities:
Recommended Actions:
Additional Notes:
If you need assistance reviewing these vulnerabilities, assessing your environment, or completing a health check, please let us know.
Quest has been notified of an updated security advisory addressing critical risks involving MySonicWall Cloud Backup files. SonicWall has completed its investigation and confirmed that all customers who used the company’s cloud backup service were affected by last month’s security breach. SonicWall is urging customers to reset their MySonicWall credentials (if they have not already) and implement the Remediation Playbook linked below.
SonicWall is recommending IMMEDIATE Mitigation Steps. We strongly urge all partners and customers using SonicWall firewalls to take the following actions immediately:
Confirm impacted device serial numbers
Knowledge base: https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330
Run the Remediation Playbook
The Playbook includes a SonicWall tool that analyzes the firewall configuration file and provides targeted remediation guidance.
Remediation Playbook: https://www.sonicwall.com/support/knowledge-base/remediation-playbook/250916130050523
Critical actions to the following procedures include:
Additional high- and low-priority actions may be required; see the Remediation Playbook for details.
If you need assistance reviewing this situation or would like to discuss the risk in more detail, please contact our team.

Hotline: 800-443-5605 Email:
We will immediately contact you, assess your situation, and deploy our Incident Response Team.