⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More

⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More — [https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFzN7ITW3vwaWKn1m

weekly-recap-exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more

What’s new: A critical vulnerability (CVE-2026-42897) in on-prem Microsoft Exchange Server is being actively exploited, with a CVSS score of 8.1. Cisco Catalyst SD-WAN Controller is also under attack due to CVE-2026-20182, an authentication bypass flaw. Additionally, a new wave of supply chain attacks has compromised TanStack npm packages, attributed to the TeamPCP group, which aims to harvest credentials and secrets. A fake Hugging Face repository has been identified that delivers stealer malware, and Instructure has reached a ransom agreement with the ShinyHunters group after a data breach.

Who’s affected

Organizations using on-prem Microsoft Exchange Server, Cisco Catalyst SD-WAN Controllers, and those relying on TanStack npm packages are at risk. Users of Hugging Face and institutions using Instructure’s Canvas platform may also be impacted.

What to do

  • Apply patches for CVE-2026-42897 and CVE-2026-20182 as soon as they are available.
  • Monitor for suspicious activity related to TanStack npm packages and review dependencies for potential vulnerabilities.
  • Educate users on the risks of downloading from unverified repositories, especially in AI model registries.
  • Consider implementing a robust incident response plan in light of recent ransom agreements and data breaches.

Sources