"These incidents involve the intentional use of deceptive or illegal practices to fraudulently obtain money, assets, or information from individuals or institutions, and include actions carried out over cyber channels."
How this proliferation occurred is unclear, but suggests an active market for 'second hand' zero-day exploits. Beyond these identified exploits, multiple threat actors have now acquired advanced exploitation techniques that can be re-used and modified with newly identified vulnerabilities.
The bug, which has a maximum-rated vulnerability severity score of 10.0, allows hackers to remotely break into networks running its Catalyst SD-WAN products, which allow large companies and government agencies with multiple offices to connect their private networks over long distances.
The critical vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, can be exploited by remote, unauthenticated attackers to execute arbitrary code on target servers and gain complete control of the targeted mobile device management (MDM) infrastructure. The security holes were patched by Ivanti in late January, when the vendor notified users that it had been aware of zero-day attacks aimed at "a very limited number of customers". Widespread exploitation of CVE-2026-1281 and CVE-2026-1340 started soon after disclosure and Palo Alto Networks has been seeing a wide range of attacks.