Customer Security Newsletter - April 2026

Welcome to the April 2026 MEDITECH Customer Security Newsletter, where we provide you with information and resources to give you insight into the security challenges facing your organization and the healthcare community as a whole. Here, we endeavor to provide some good information to help you improve your organization's security posture. This data has been gleaned from the review of public records on file with CISA, H-ISAC and Health Sector Cybersecurity Coordination Center (HC3) alerts. Please note the Talk To Us section, as we would like to tailor future editions of the newsletter to address specific concerns.


Known Exploited Vulnerabilities

Between March 13 and April 8, 2026, CISA added 18 vulnerabilities to its "Known Exploited Vulnerabilities" catalog. These additions are based on evidence of active exploitation in the wild. Because these vulnerabilities are frequent attack vectors for malicious actors, they pose a significant risk to organizational security.

CVE-2026-35616 (Critical)Fortinet FortiClient EMSImproper Access Control (RCE)
CVE-2026-3502 (High)TrueConf ServerUpdate Mechanism Hijack (RCE)
CVE-2026-5281 (High)Google Chrome (Dawn)Use After Free (RCE)
CVE-2026-3055 (High)Citrix NetScaler ADC & GatewayOut-of-Bounds Read
CVE-2025-53521 (Critical)F5 BIG-IP Access Policy ManagerUnauthenticated RCE
CVE-2026-33634 (Critical)Aqua Security TrivyEmbedded Malicious Code
CVE-2026-33017 (Critical)Langflow (AI Framework)Unauthenticated Code Injection (RCE)
CVE-2025-31277 (High)Apple Multiple ProductsBuffer Overflow 
CVE-2025-43520 (Medium)Apple Multiple ProductsBuffer Overflow
CVE-2025-43510 (High)Apple Multiple ProductsImproper Locking Vulnerability
CVE-2025-54068 (Critical)Laravel LivewireCode Injection (RCE)
CVE-2025-32432 (Critical)Craft CMSUnauthenticated RCE
CVE-2026-20131 (Critical)Cisco Secure FMC & SCCInsecure Deserialization (RCE)
CVE-2026-20963 (Critical)Microsoft SharePoint ServerInsecure Deserialization (RCE)
CVE-2025-66376 (High)Zimbra Collaboration SuiteStored XSS via CSS @import
CVE-2025-47813 (Medium)Wing FTP ServerInformation Disclosure (Path)
CVE-2026-3909 (High)Google Chrome (Skia)Out-of-bounds Write
CVE-2025-3910 (High) Google ChromeArbitrary Code Execution

Threat Actor Spotlight: Iranian-Affiliated APT Actors

In early April 2026, federal agencies, including the FBI, CISA, and the NSA, issued an urgent warning regarding a sophisticated campaign by Iranian-affiliated Advanced Persistent Threat actors targeting United States critical infrastructure. These actors, often identified as CyberAv3ngers or the Shahid Kaveh Group, have a history of targeting operational technology to cause disruptive effects.

The group specifically exploits internet-facing operational technology, primarily targeting Rockwell Automation and Allen-Bradley programmable logic controllers . By accessing these devices through common industrial ports (44818, 2222, 102, 22, and 502) the actors maliciously interact with project files and manipulate data displayed on supervisory control and data acquisition systems and human-machine interface screens . Since at least March 2026, this activity has resulted in documented operational disruptions and financial losses across sectors such as energy, water and wastewater systems, and government facilities . 

These attacks are frequently conducted via leased third-party infrastructure to hide the actor's origin while they use configuration software to create unauthorized connections to victim controllers . The targeting of multiple ports associated with different industrial protocols suggests these actors may be expanding their reach to various branded devices beyond their primary targets . To defend against this group, CISA mandates that organizations immediately remove programmable logic controllers from direct internet exposure . For facilities using Rockwell Automation hardware, administrators should ensure the physical mode switch is set to the run position to prevent unauthorized remote programming changes .


News

The End is Just the Beginning for Better Security: Enhanced Vulnerability Management with OpenEOX

CISA has introduced OpenEOX, a new open-source framework designed to help organizations better manage "End-of-Life" (EOL) and "End-of-Support" (EOS) software risks through standardized, automated data sharing. 

FDA Tightens Its Medical Device Cybersecurity Guidance

On March 26, 2026, H-ISAC shared an article noting that the Food and Drug Administration has tightened its cybersecurity requirements for medical device submissions, mandating that developers provide detailed plans to monitor, identify, and address post-market vulnerabilities to ensure patient safety in an increasingly connected healthcare environment.


Additional Resources


Talk to us!

We at MEDITECH would love to hear your feedback about this newsletter and we’d like to know what is on your mind. Is there something you would like us to address?

We also have a question for you that is important to us. What are your largest concerns or security hopes for 2026?

Please let us know by contacting us !

Until next time, stay alert out there!