Customer Security Newsletter - May 2026

Welcome to the May 2026 edition of the MEDITECH Customer Security Newsletter. This month, we provide critical updates on vulnerabilities added to federal catalogs and strategic intelligence on threat actors targeting essential infrastructure. Our goal is to provide you with actionable information and resources to strengthen your organization's security posture. This data has been gleaned from the review of public records on file with CISA, H-ISAC and Health Sector Cybersecurity Coordination Center (HC3) alerts. Please note the Talk To Us section, as we would like to tailor future editions of the newsletter to address specific concerns.


Known Exploited Vulnerabilities

Between April 8 and May 13, 2026, CISA added 32 vulnerabilities to its "Known Exploited Vulnerabilities" catalog. These additions are based on evidence of active exploitation in the wild. Because these vulnerabilities are frequent attack vectors for malicious actors, they pose a significant risk to organizational security.

CVE Record & SeverityTargeted ProductAttack Type
CVE-2026-42208 (Critical)BerriAI LiteLLMSQL Injection
CVE-2026-6973 (High)Ivanti Endpoint Manager Mobile (EPMM)Improper Input Validation (RCE)
CVE-2026-0300 (Critical)Palo Alto Networks PAN-OSOut-of-bounds Write (Root RCE)
CVE-2026-31431 (High)Linux KernelIncorrect Resource Transfer
CVE-2026-41940 (Critical)WebPros cPanel & WHMMissing Authentication
CVE-2026-32202 (Medium)Microsoft Windows ShellProtection Mechanism Failure
CVE-2024-1708 (High)ConnectWise ScreenConnectPath Traversal (RCE)
CVE-2024-57726 (Critical)SimpleHelpMissing Authorization
CVE-2024-57728 (High)SimpleHelpPath Traversal (RCE)
CVE-2024-7399 (Critical)Samsung MagicINFO 9 ServerPath Traversal
CVE-2025-29635 (High)D-Link DIR-823XCommand Injection
CVE-2026-39987 (Critical)Marimo AI NotebookPre-auth Remote Code Execution
CVE-2026-33825 (High)Microsoft DefenderInsufficient Access Control
CVE-2024-27199 (High)JetBrains TeamCityRelative Path Traversal
CVE-2025-32975 (Critical)Quest KACE Systems Management ApplianceImproper Authentication
CVE-2026-20128 (High)Cisco Catalyst SD-WAN ManagerRecoverable Password Storage
CVE-2025-48700 (Medium)Zimbra Collaboration Suite (ZCS)Cross-site Scripting (XSS)
CVE-2023-27351 (High)PaperCut NG/MFImproper Authentication
CVE-2025-2749 (High)Kentico XperiencePath Traversal
CVE-2026-20133 (High)Cisco Catalyst SD-WAN ManagerExposure of Sensitive Information
CVE-2026-20122 (Medium)Cisco Catalyst SD-WAN ManagerIncorrect Use of Privileged APIs
CVE-2026-34197 (High)Apache ActiveMQImproper Input Validation (RCE)
CVE-2026-32201 (Medium)Microsoft SharePoint ServerImproper Input Validation (Spoofing)
CVE-2009-0238 (High)Microsoft Office ExcelRemote Code Execution
CVE-2026-34621 (High)Adobe Acrobat and ReaderPrototype Pollution (RCE)
CVE-2026-21643 (Critical)Fortinet FortiClient EMSSQL Injection (RCE)
CVE-2020-9715 (High)Adobe AcrobatUse-After-Free (RCE)
CVE-2023-36424 (High)Microsoft Windows (CLFS)Out-of-Bounds Read
CVE-2023-21529 (High)Microsoft Exchange ServerInsecure Deserialization (RCE)
CVE-2025-60710 (High)Microsoft WindowsLink Following (Privilege Escalation)
CVE-2012-1854 (High)Microsoft VBAInsecure Library Loading (RCE)
CVE-2026-1340 (Critical)Ivanti Endpoint Manager Mobile (EPMM)Code Injection (RCE)

Threat Actor Spotlight: Handala (The Pro-Iranian "Faketivist" Group)

Since emerging in December 2023, the threat actor known as Handala (also stylized as Handala_hack) has transitioned from regional targeting to launching major disruptive operations against U.S. critical infrastructure. While the group presents itself as an independent, pro-Palestinian hacktivist collective, security analysts identify it as a "faketivist" front—a persona operated by Iranian state-linked clusters such as Void Manticore (also known as Red Sandstorm or Banished Kitten) to provide the regime with plausible deniability.

  • Targeting Strategy: Handala prioritizes sectors with high societal and operational impact, particularly healthcare and energy. Their selection process favors targets whose compromise offers high media visibility, intended to create reputational damage and widespread psychological distress.
  • Operational Behavior (May 2026 Update): Throughout late March and April 2026, the group demonstrated sophisticated "Living off the Land" (LotL) capabilities. In a significant escalation on March 11, 2026, the group claimed responsibility for a massive wiper attack on the medical technology firm Stryker, allegedly impacting over 200,000 systems globally by abusing enterprise management tools like Microsoft Intune to issue bulk factory reset commands.
  • Tactics and Techniques: The group relies heavily on initial access through spear-phishing and the exploitation of exposed credentials or compromised VPN infrastructure. Unlike traditional ransomware gangs, Handala often deploys destructive wipers (such as the Hamsa or Hatef tools) designed to permanently erase data rather than encrypt it for profit. Their operations are frequently paired with "hack and leak" activities, including the public doxxing of defense engineers and high-ranking government officials to amplify the perceived scale of the breach.
  • Proactive Defense: Mitigation strategies should focus on eliminating internet-facing administrative interfaces and implementing phishing-resistant multi-factor authentication (MFA). Organizations are also urged to maintain immutable, off-site backups to ensure recovery in the event of a pure data-destruction (wiper) event.

News

Securing the Autonomous Frontier: Strategic Guidance for Agentic AI Adoption

CISA and its international partners urge organizations to integrate agentic AI into established cybersecurity frameworks—prioritizing least-privilege access, cryptographically secured identities, and human-in-the-loop checkpoints—to mitigate the unique risks of privilege creep and emergent autonomous behaviors. 

Health Sector Resilience in the Claude Mythos

Health-ISAC and Quest Diagnostics highlight the systemic shift in healthcare risk posed by Claude Mythos—an Anthropic AI model with unprecedented autonomous capabilities for zero-day vulnerability discovery and weaponization—and warn that the global proliferation of such unregulated tools by late 2026 will drastically lower the barrier for sophisticated cyberattacks against critical infrastructure.


Additional Resources


Talk to us!

We at MEDITECH would love to hear your feedback about this newsletter and we’d like to know what is on your mind. Is there something you would like us to address?

We also have a question for you that is important to us. What are your largest concerns or security hopes for 2026?

Please let us know by contacting us!

Until next time, stay alert out there!