VulnerabilitiesCRITICAL

CVE-2026-2699 & CVE-2026-2701 - Critical Vulnerabilities Found

#CVE-2026-2699#CVE-2026-2701#Progress ShareFile#Storage Zones Controller

Original Reporting

AWArctic Wolf Blog·Julian Tuin

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelCRITICAL

Active exploitation or massive impact — immediate action required

🎯

Basically, two serious security flaws were found in Progress ShareFile that could let hackers access restricted areas without permission.

Quick Summary

Progress ShareFile has identified critical vulnerabilities CVE-2026-2699 and CVE-2026-2701. These flaws allow remote attackers to bypass authentication. Immediate updates are essential to protect sensitive data.

The Flaw

On March 10, 2026, Progress ShareFile disclosed two critical vulnerabilities in their Storage Zones Controller (SZC) 5.x. These vulnerabilities are tracked as CVE-2026-2699 and CVE-2026-2701. The first vulnerability, CVE-2026-2699, involves an authentication bypass due to improper handling of redirects and sessions in the /ConfigService/Admin.aspx endpoint. This flaw enables a remote unauthenticated attacker to gain access to restricted administrative functions.

What's at Risk

The implications of these vulnerabilities are severe. An attacker exploiting these flaws could potentially manipulate the system, access sensitive information, or perform unauthorized actions within the ShareFile environment. Organizations using the affected version of the Storage Zones Controller are at risk of significant data breaches and operational disruptions.

Patch Status

Progress ShareFile has released patches addressing these vulnerabilities. It is crucial for users to apply these updates immediately to mitigate the risks associated with these flaws. The patches are designed to correct the improper session handling and secure the affected endpoints.

Immediate Actions

Organizations should take the following steps to protect themselves:

  • Update to the latest version of Progress ShareFile Storage Zones Controller.
  • Review access logs for any unauthorized attempts to access administrative functions.
  • Implement additional security measures, such as multi-factor authentication, to enhance protection against unauthorized access.

By addressing these vulnerabilities swiftly, organizations can safeguard their data and maintain the integrity of their systems.

Pro Insight

🔒 Pro insight: Exploitation of these vulnerabilities could lead to severe security breaches; organizations must prioritize patching to mitigate risks.

Sources

Original Report

AWArctic Wolf Blog· Julian Tuin
Read Original

Related Pings

MEDIUMVulnerabilities

Microsoft Fixes Classic Outlook Bug Causing Email Delivery Issues

Microsoft has fixed a bug causing email delivery issues for Classic Outlook users. This problem led to non-delivery reports for some emails. Affected users should switch to the New Outlook client or Outlook.com for sending emails.

BleepingComputer·
HIGHVulnerabilities

BlueHammer Windows Zero-Day Exploit Leaked by Researcher

A researcher leaked the BlueHammer exploit for a Windows zero-day flaw, allowing privilege escalation. This poses a significant risk as no patch is currently available.

BleepingComputer·
HIGHVulnerabilities

CVE-2026-35616 - New Exploited Vulnerability Added by CISA

CISA has added a new vulnerability, CVE-2026-35616, to its catalog due to active exploitation. This flaw in Fortinet software poses significant risks to organizations. Timely remediation is essential to safeguard systems against attacks.

CISA Advisories·
MEDIUMVulnerabilities

is-localhost-ip 2.0.0 - SSRF Vulnerability Discovered

A new SSRF vulnerability in is-localhost-ip 2.0.0 has been discovered. This flaw could allow attackers to access sensitive internal data. Users should isolate the software and monitor for updates.

Exploit-DB·
CRITICALVulnerabilities

ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered

A critical vulnerability in ASP.NET 8.0.10 allows attackers to bypass authentication and hijack sessions. Immediate patching is crucial to secure affected systems.

Exploit-DB·
HIGHVulnerabilities

WordPress Madara - Local File Inclusion Vulnerability Alert

A Local File Inclusion vulnerability in WordPress Madara threatens user data. This affects all sites using the theme. Immediate action is necessary to prevent data breaches.

Exploit-DB·