Cyber Intelligence Daily -- May 11, 2026
Daily Cyber Intelligence Brief — 11 May 2026
TLP:WHITE | Cutoff: 11 May 2026, 09:00 UTC | Coverage window: 09–11 May 2026
Bottom Line
Three KEV entries demand action today. CVE-2026-42208 (BerriAI LiteLLM SQL injection) carries a federal remediation deadline of 11 May 2026. CVE-2026-0300 (Palo Alto PAN-OS Captive Portal) remains unpatched with active state-nexus exploitation and thousands of exposed instances. CVE-2026-6973 (Ivanti EPMM) passed its federal deadline yesterday. Separately, a confirmed software supply-chain compromise at JDownloader.org served trojanized installers on 6–7 May, and an active macOS infostealer campaign weaponizes legitimate Claude.ai shared-chat URLs to bypass reputation controls.
| Assessment Area | Finding | Confidence |
|---|---|---|
| KEV deadline — LiteLLM (CVE-2026-42208) | Federal deadline expires today; pre-auth SQLi confirmed in wild | High |
| PAN-OS exploitation (CVE-2026-0300) | Active state-nexus exploitation; PoC public; no patch yet | High |
| JDownloader supply-chain compromise | Trojanized installers served 6–7 May; RAT + Linux persistence | Moderate — single Tier 2 source |
| Claude.ai shared-chat macOS campaign | Active malvertising; novel delivery substrate | Moderate — single Tier 2 source |
| CERT-UA / GRU-FSB-SVR activity | No new UAC advisory in window | Unverified — silence, not confirmed absence |
Key Judgments
KJ-1 (High confidence): CVE-2026-42208 in BerriAI LiteLLM is a pre-authentication SQL injection reachable via the Authorization: Bearer header. The CISA KEV federal remediation deadline for civilian agencies expires 11 May 2026. Sysdig Threat Research has reported in-the-wild targeting of upstream provider credential tables. (Sysdig TRT reporting is a single Tier 2 source; specific table names are not independently corroborated at publication time.)
KJ-2 (High confidence): CVE-2026-0300 exploitation against PAN-OS predates public disclosure by nearly a month. Palo Alto Networks Unit 42 attributes observed activity to a cluster designated CL-STA-1132, assessed as likely state-sponsored. TTP overlap with Volt Typhoon, UAT-8337, APT41, and CL-STA-0046 is noted by Unit 42 on the basis of shared tooling; this is TTP overlap, not formal attribution of CL-STA-1132 to any of those named actors. No formal patch exists as of this writing.
KJ-3 (Moderate confidence — single Tier 2 source): The JDownloader website compromise constitutes a confirmed software supply-chain incident affecting Windows and Linux installer downloads between 6 and 7 May 2026. All hosts that downloaded from jdownloader.org in that window should be treated as fully compromised. Confidence is moderate because all technical detail derives from a single BleepingComputer report; no independent corroboration has been identified at publication time.
KJ-4 (Moderate confidence — single Tier 2 source): Threat actors are operationally abusing Anthropic's Claude.ai shared-chat feature as a malware delivery substrate, bypassing URL-reputation controls because the hosting domain is legitimate. Confidence is moderate; all campaign detail derives from a single BleepingComputer report. The "second variant" identified in that report was found by the same outlet, not an independent source.
KJ-5 (Moderate confidence): Public PoC code for CVE-2025-33073 (Windows NTLM reflection via SMB, KEV-listed since October 2025) received fresh GitHub commits in the last 24 hours, materially lowering the skill ceiling for SYSTEM-level lateral movement against environments not enforcing SMB signing. No fresh mass-scanning telemetry has been observed to confirm active exploitation at scale.
A four-story brief today, sequenced per coverage directive: (1) KEV additions and deadlines, (2) the still-unpatched PAN-OS zero-day, (3) the JDownloader supply-chain compromise, (4) the Claude.ai macOS malware campaign. Adjacent high-risk CVEs (GeoVision cluster, Ivanti EPMM, CVE-2025-33073 PoC refresh) are tracked in a separate section and do not displace the four lead stories.
One structural note on sourcing: the multilingual sweep returned no significant items from Russian-language (SecurityLab.ru, FSTEC), Chinese-language (FreeBuf, Anquanke, ThreatBook), Iranian (CERTFA, ClearSky), or Indian (CERT-In, CloudSEK) sources within the 09–11 May window. No [First in English] flag is warranted for those channels. The Check Point Research advisories CPAI-2026-4267 and CPAI-2026-4262 originated from an Israeli-language-adjacent feed and had not appeared in Western outlets at the time of the sweep; both are flagged below.
Story 1 — KEV: LiteLLM SQL Injection Deadline Expires Today
CVE-2026-42208 | BerriAI LiteLLM | CISA KEV added 8 May 2026 | Federal remediation deadline 11 May 2026
The vulnerability is a pre-authentication SQL injection in LiteLLM proxy's API-key verification path. Per the BerriAI GitHub Security Advisory, LiteLLM passes the value of the Authorization: Bearer header into a non-parameterized SQL query against the PostgreSQL backend. An unauthenticated attacker reaching any LLM API route can issue arbitrary SELECT statements. Affected versions: >=1.81.16, <1.83.7. Fixed version: 1.83.7; BerriAI's current stable recommendation is 1.83.10-stable per the BerriAI GitHub advisory page. (Readers should verify the current recommended version against the live BerriAI advisory, as patch guidance may have been updated after this brief's cutoff.)
Sysdig Threat Research Team reports that an unidentified threat actor specifically queried tables holding upstream provider API keys and proxy runtime configuration. (This is a single Tier 2 source; the specific table names cited by Sysdig are not independently corroborated at publication time. The targeting behavior — credential-theft rather than reconnaissance — is Sysdig's characterization.)
Strategic note: CVE-2026-42208 is the first CISA KEV entry for an agentic-AI orchestration component. The procurement and policy implications are addressed in the Policy Implications section below.
Action — due today:
- Upgrade to LiteLLM ≥ 1.83.7 (target 1.83.10-stable per BerriAI advisory).
- If immediate upgrade is impossible, apply BerriAI's documented workaround: set
disable_error_logs: trueundergeneral_settings. - Treat the LiteLLM PostgreSQL database as compromised regardless of exploitation evidence: rotate every virtual key, master key, and upstream provider credential stored in the proxy.
Story 2 — Unpatched Zero-Day: PAN-OS CVE-2026-0300, Active State-Nexus Exploitation
CVE-2026-0300 | Palo Alto Networks PAN-OS User-ID Authentication Portal | CISA KEV added 6 May 2026 | Federal deadline 9 May 2026 (expired)
The vulnerability is an unauthenticated buffer overflow / out-of-bounds write in the Captive Portal service. Successful exploitation yields root-level RCE on PA-Series and VM-Series firewalls. Palo Alto's PSIRT advisory rates it Critical. (The pre-gathered context does not include a confirmed CVSS score; the PSIRT advisory page at security.paloaltonetworks.com/CVE-2026-0300 should be consulted for the current score.)
Attribution and TTPs. Palo Alto Networks Unit 42 attributes observed exploitation to a cluster designated CL-STA-1132, assessed as likely state-sponsored. Unit 42 notes that the tooling observed — specifically EarthWorm and ReverseSocks5 tunneling tools — has previously appeared in operations linked to Volt Typhoon, UAT-8337, APT41, and CL-STA-0046. This is TTP overlap on shared tooling; it is not a formal attribution of CL-STA-1132 to any of those named actors, and the named actors are cited here only to convey the China-nexus context Unit 42 has established. (The specific exploitation timeline dates and the HA-failover SAML flood technique are drawn from Unit 42's published analysis; a direct URL to that publication was not available in the pre-gathered context and should be verified against the Unit 42 blog at unit42.paloaltonetworks.com.)
Post-exploitation TTPs observed by Unit 42 include: shellcode injection with deletion of nginx crash logs, kernel messages, and core dumps to suppress forensic artifacts; deployment of EarthWorm and ReverseSocks5 at root; use of the firewall's service account for Active Directory enumeration; and a SAML flood against the active firewall to force HA failover to a second device, followed by exploitation of the now-active second device. Unit 42 describes the HA-failover technique as the first publicly documented use of forced HA cutover as an exploitation enabler in this campaign context.
Exposure. The Shadowserver Foundation has reported more than 5,800 PAN-OS VM-Series firewalls exposed to the public internet. (The Shadowserver figure is drawn from Unit 42 and broader reporting; a direct Shadowserver report URL was not available in the pre-gathered context. Readers should verify against shadowserver.org dashboards.) A public PoC was published 6 May 2026, the same day CISA added the CVE to KEV.
Patch status. No formal patch exists as of 11 May 2026. Palo Alto has indicated patch releases are expected in approximately mid-May and late May timeframes, with fix targets including PAN-OS 12.1.4-h5, 11.2.7-h13, 11.1.4-h33, and 10.2.10-h36. (These version targets and timing estimates are drawn from Unit 42 and PSIRT reporting; they are vendor projections, not confirmed release dates. Verify against security.paloaltonetworks.com/CVE-2026-0300 for current status.)
Required mitigations (per Palo Alto PSIRT advisory security.paloaltonetworks.com/CVE-2026-0300):
- Restrict the User-ID Authentication Portal to trusted zones only.
- Disable Response Pages in the Interface Management Profile attached to every L3 interface in any zone where untrusted traffic can ingress.
- Deploy Threat Prevention signature Threat ID 510019. (This signature ID and the PAN-OS 11.1 version prerequisite are cited from Palo Alto PSIRT guidance; verify the current signature ID against the live advisory, as Palo Alto may update detection guidance.) Organizations on the 10.2 branch should note that this detection capability requires a version upgrade to apply.
- Hunt for EarthWorm and ReverseSocks5 indicators; audit AD authentication originating from firewall service accounts; review HA failover events for the post-9 April window.
[First in English — partial]: Check Point Research published advisory CPAI-2026-4267 covering this PAN-OS buffer overflow on 6 May 2026, updated 10 May 2026. This advisory predated or ran parallel to broader English-language coverage; it has since been superseded by Palo Alto PSIRT and Unit 42 reporting.
Story 3 — Active Breach: JDownloader Supply-Chain Compromise
(Single primary source: BleepingComputer, Lawrence Abrams, 9 May 2026. Technical payload analysis attributed to researcher Thomas Klemenc, also via BleepingComputer. No independent corroboration identified at publication time. All technical details below carry single-source epistemic status.)
On 9 May 2026, BleepingComputer reported that the official JDownloader website (jdownloader.org) was compromised and served trojanized installers to users between 6 and 7 May 2026.
Affected downloads (per BleepingComputer):
- Windows "Download Alternative Installer" path
- Linux shell installer path
- The signed standard Windows installer (signed by AppWork GmbH) was reportedly not affected, per BleepingComputer's reporting of a statement from JDownloader's development team. (The development team statement was not attributed to a named individual or a specific public post; this characterization reflects BleepingComputer's reporting of an unnamed developer communication.)
Initial access vector: BleepingComputer reports an unpatched website vulnerability that allowed attackers to modify CMS-managed content and download links. The development team confirmed the vector to BleepingComputer; no named spokesperson or public statement URL is available in the sourced reporting.
Payloads observed (per Thomas Klemenc analysis via BleepingComputer):
- Windows: heavily obfuscated Python-based remote access trojan.
- Linux: ELF payload with persistence via
/etc/profile.d/systemd.shand a SUID-root binary at/usr/bin/systemd-exec.
C2 infrastructure (per BleepingComputer): parkspringshotel[.]com, auraguest[.]lk, checkinnhotels[.]com.
Action:
- Identify any host that downloaded JDownloader from jdownloader.org between 6–7 May 2026 — treat as fully compromised. Rebuild or reimage; do not attempt in-place remediation given the SUID-root Linux persistence.
- Verify installer signing: legitimate Windows binaries are signed by AppWork GmbH.
- Hunt EDR and firewall telemetry for connections to the three C2 domains listed above.
- Rotate credentials cached on affected hosts: browser-stored passwords, SSH keys, cloud CLI tokens.
Open question (PIR-1): Whether the compromise extended to the signed Windows installer or the auto-updater channel — resolution would require vendor confirmation and VirusTotal retrohunt against installer hashes for the 6–7 May window. If the auto-updater was affected, the impacted population expands substantially beyond users who manually downloaded in the 48-hour window.
Story 4 — New CVE / Active Campaign: Claude.ai Shared Chats Weaponized for macOS Malware
(Single primary source: BleepingComputer, Ax Sharma, 10 May 2026. The "second variant" identified in that report was found by the same outlet, not an independent source. All campaign details below carry single-source epistemic status.)
On 10 May 2026, BleepingComputer reported an active malvertising campaign abusing Google Ads alongside legitimate Claude.ai shared-chat URLs to deliver a macOS infostealer. Security engineer Berk Albayrak (Trendyol Group) identified the first malicious Claude shared chat; BleepingComputer identified a second variant on separate infrastructure.
Delivery chain (per BleepingComputer):
- Victim searches Google for "Claude mac download."
- A sponsored result leads to a Claude.ai shared-chat URL — a legitimate Anthropic-hosted page.
- The shared chat instructs the victim to paste a Terminal command.
- The command performs in-memory shell execution via
osascript, profiles the host (IP, hostname, OS, keyboard locale), and downloads the infostealer payload. - One variant skips execution on systems with Russian or CIS-region keyboard locales — a behavioral marker consistent with CIS-origin operators, though this inference is not confirmed by a named attribution source.
- Payload exfiltrates browser credentials, cookies, and the macOS Keychain — behavior BleepingComputer characterizes as consistent with the MacSync infostealer family. (MacSync family attribution is BleepingComputer's characterization; no independent malware analysis report is cited.)
Staging domains (per BleepingComputer): customroofingcontractors[.]com, bernasibutuwqu2[.]com, briskinternet[.]com.
Novel TTP note: The use of a legitimate LLM vendor's user-content hosting feature as a delivery substrate bypasses URL-reputation controls because the hosting domain (claude.ai) carries high trust scores. This TTP does not require any vulnerability in Anthropic's platform; it exploits the shared-chat feature as designed.
Action:
- Block sponsored-search download flows for security-sensitive software at the proxy layer.
- Issue a user-awareness alert: do not execute Terminal commands sourced from AI shared chats, regardless of the hosting domain's reputation.
- Hunt for outbound connections to the three staging domains across the macOS fleet.
- On any confirmed-infected macOS endpoint, rotate browser credentials and any Keychain-stored secrets; assume cookie-based session hijack of all browser-resident SaaS sessions.
Adjacent Items — Tracked, Not Lead Stories
CVE-2026-6973 (Ivanti EPMM). CISA KEV added 7 May 2026; federal deadline expired 10 May 2026. Improper input validation allowing remote authenticated execution. Fixed in EPMM 12.6.1.1, 12.7.0.1, 12.8.0.1 per Ivanti PSIRT advisory. Ivanti's PSIRT advisory acknowledges exploitation of a "very limited number" of customers; the advisory ID is listed in the pre-gathered PSIRT feed but a specific spokesperson or dated public statement URL was not available in the sourced context — verify against Ivanti's PSIRT portal. (CVE-2026-7821 was referenced in an earlier draft as a chaining partner; that CVE does not appear in the pre-gathered KEV, PSIRT, or high-risk CVE feed and cannot be cited with confidence. It is omitted pending a verifiable source.)
CVE-2025-33073 (Windows NTLM reflection via SMB). Already KEV-listed since October 2025. Fresh PoC commits to GitHub (0xMarcio/cve, updated approximately 9 hours before this brief's cutoff) in the last 24 hours. No fresh mass-scanning telemetry has been observed to confirm active exploitation at scale. Enforce SMB signing client and server side; apply Microsoft's June 2025 cumulative updates if not already deployed.
GeoVision and Totolink cluster. Seven CVEs published 4 May 2026, CVSS 9.0–10.0, no public PoC, no vendor patch confirmed in the pre-gathered context. CVE-2026-42369 (GV-VMS V20, CVSS 10.0) is described as an unauthenticated SYSTEM RCE via the WebCam Server endpoint. CVE-2026-42364 and CVE-2026-42368 (GeoVision LPC2011/LPC2211, CVSS 9.9) involve OS command injection and privilege escalation respectively. CVE-2026-7719 (Totolink WA300, CVSS 9.8) is a separate stack. No public PoC exists for any of these at publication time. Treat all internet-exposed GeoVision and Totolink WA300 devices as currently unpatchable; segment or remove from public reachability.
[First in English]: Check Point Research published CPAI-2026-4262 covering CVE-2026-27822 (RustFS cross-site scripting, medium severity) on 10 May 2026. No broader English-language coverage of this advisory has been identified at publication time.
CERT-UA / GRU-FSB-SVR Watch
No new UAC-designated advisory was published on cert.gov.ua or cip.gov.ua between 09–11 May 2026 based on the multilingual sweep. This is silence, not confirmed absence — CERT-UA typically posts advisories in Ukrainian first, with translation lag of 12–48 hours. Russian-language Tier 2 sources (SecurityLab.ru, FSTEC, xakep.ru, Kaspersky Securelist) produced no new vulnerability disclosures or APT reporting in the window. Chinese-language (FreeBuf, Anquanke, ThreatBook), Iranian (CERTFA, ClearSky), and Indian (CERT-In, CloudSEK) sources: no significant items identified in the 09–11 May window. No [First in English] flag is warranted for any of these channels based on the sweep results.
Priority Action Matrix
| Priority | Item | Action | Deadline |
|---|---|---|---|
| 🔴 P0 | CVE-2026-42208 (LiteLLM) | Upgrade ≥1.83.7; rotate all provider keys | Today, 11 May 2026 |
| 🔴 P0 | CVE-2026-0300 (PAN-OS) | Apply PSIRT mitigations; monitor for patch release | Immediate |
| 🔴 P0 | JDownloader 6–7 May downloads | Identify, isolate, rebuild affected hosts | Immediate |
| 🟠 P1 | CVE-2026-6973 (Ivanti EPMM) | Upgrade to fixed version; rotate admin credentials | Federal deadline expired 10 May |
| 🟠 P1 | Claude.ai shared-chat macOS campaign | Block staging domains; issue user-awareness alert | Immediate |
| 🟡 P2 | CVE-2025-33073 PoC refresh | Verify SMB signing enforced; June 2025 KB applied | Hardening |
| 🟡 P2 | GeoVision / Totolink CVE cluster | Segment from internet; no patch available | Containment |
Intelligence Gaps and Collection Requirements
PIR-1: Whether the JDownloader CMS compromise extended to the signed AppWork GmbH Windows installer or the auto-updater channel. Resolution requires vendor confirmation with a named spokesperson, VirusTotal retrohunt against installer hashes for the 6–7 May window, and review of jdownloader.org changelog entries. If the auto-updater was affected, the impacted population expands by orders of magnitude and KJ-3's bounded 48-hour framing collapses.
PIR-2: Whether CL-STA-1132 is a Unit 42 cluster identifier for a previously named China-nexus actor (Volt Typhoon, APT41) or a genuinely new operator. Resolution requires a direct URL to the Unit 42 attribution publication, cross-referencing with Mandiant and CrowdStrike cluster databases, and OSINT correlation of EarthWorm and ReverseSocks5 sample hashes against known toolsets.
PIR-3: Whether the Claude.ai shared-chat abuse represents a campaign with persistent infrastructure or a short-lived test. Resolution requires ongoing OSINT monitoring of Claude shared-chat URLs surfaced in Google Ads telemetry and pivoting from the three identified staging domains.
PIR-4: Whether CVE-2026-42208 has been exploited beyond the single Sysdig-reported actor, and whether exploitation predates the disclosure window by weeks (analogous to the CVE-2026-0300 timeline). Resolution requires GreyNoise mass-scanning telemetry, honeypot deployment, and CISA exploitation reporting. If exploitation predates disclosure by weeks, credential rotation today does not contain the breach — stolen upstream API keys may already be in active use against providers.
PIR-5: Whether CVE-2026-7821 (cited in prior reporting as a chaining partner to CVE-2026-6973) is a confirmed Ivanti EPMM vulnerability with a public advisory. This CVE does not appear in the pre-gathered KEV, PSIRT, or high-risk CVE feed; it requires verification against Ivanti's PSIRT portal before it can be cited in this brief.
PIR-6: Whether the AI-stack vulnerability pattern (CVE-2026-42208 as first KEV entry for an agentic-AI component; Claude.ai as a delivery substrate) represents a durable trend or coincidence. Resolution requires monitoring for additional KEV entries involving AI orchestration components over the next 30 days.
Policy Implications
Agentic-AI infrastructure as an attack surface. CVE-2026-42208 is the first CISA KEV entry for an agentic-AI orchestration component. LiteLLM proxy is widely deployed as the API-routing layer in enterprise AI stacks, sitting between internal applications and upstream providers (OpenAI, Anthropic, Azure OpenAI, AWS Bedrock). A successful pre-authentication SQL injection against this layer does not merely compromise a single application — it potentially exposes every upstream provider API key managed by the proxy, enabling an attacker to impersonate the organization against those providers, incur costs, exfiltrate model outputs, or inject into model-mediated workflows. The procurement implication is that AI orchestration components should be subject to the same vulnerability management lifecycle as network edge devices, not treated as application-layer software with longer patch cycles.
LLM vendor user-content hosting as a delivery substrate. The Claude.ai shared-chat campaign does not exploit a vulnerability in Anthropic's platform. It exploits a feature — shared chats — as designed. This creates a category of threat that URL-reputation controls, domain blocklists, and certificate transparency monitoring cannot address, because the hosting domain is legitimate and the content is user-generated. The policy question this raises for LLM vendors is whether shared-chat content that contains shell commands or download instructions should be subject to automated scanning or user-warning overlays. If Anthropic implements such controls, it sets a precedent for user-content security obligations that other LLM vendors will face. If it does not, the shared-chat delivery vector will be replicated across other platforms.
Edge-device exploitation convergence. CVE-2026-0300 and CVE-2026-6973 together represent continued adversary focus on network edge devices (firewalls, MDM appliances) as initial-access vectors. The CERT-UA watch item below notes that if Russian services adopt the same edge-device playbook currently being run by China-nexus actors, the strategic implications for NATO-adjacent network defenders change materially.
What to Watch
- If a second exploitation cluster is named for CVE-2026-0300 within the next 7 days, mass exploitation by lower-tier actors is likely underway and the 5,800+ exposed firewall population should be treated as substantially compromised.
- If Palo Alto's mid-May patch release slips, the mitigation-only window extends through late May with thousands of exposed firewalls; assume successful compromise of a non-trivial fraction by month-end.
- If a second AI-stack component is added to CISA KEV within 30 days of CVE-2026-42208, the agentic-AI infrastructure attack surface has statistical weight as a trend, not merely precedent weight from a single entry.
- If Anthropic implements shared-chat content scanning or command-execution warning overlays, LLM vendors are absorbing user-content security obligations previously held by hosting providers — a precedent with industry-wide implications.
- If CERT-UA publishes a UAC advisory referencing PAN-OS or Ivanti EPMM exploitation in Ukraine, Russian services are adopting the same edge-device exploitation playbook currently attributed to China-nexus actors, materially changing the threat model for NATO-adjacent defenders.
- If CVE-2026-7821 appears in a verifiable Ivanti PSIRT advisory, the chaining risk with CVE-2026-6973 should be reassessed and this brief updated accordingly.
Named Actors
Researchers and Analysts
- Lawrence Abrams (BleepingComputer) — reported the JDownloader website compromise, 9 May 2026.
- Ax Sharma (BleepingComputer) — reported the Claude.ai shared-chat macOS malware campaign, 10 May 2026.
- Thomas Klemenc (independent researcher, via BleepingComputer) — analyzed the JDownloader trojanized payload.
- Berk Albayrak (security engineer, Trendyol Group) — first identified the malicious Claude.ai shared chat.
Vendor and Government Entities
- Palo Alto Networks Unit 42 — attribution analysis of CL-STA-1132 exploitation of CVE-2026-0300; source for post-exploitation TTP timeline and HA-failover technique description.
- Sysdig Threat Research Team — single-source reporting on CVE-2026-42208 in-the-wild SQL injection targeting behavior.
- Shadowserver Foundation — exposure scan reporting more than 5,800 PAN-OS VM-Series firewalls exposed to the public internet.
- CISA — KEV catalog maintainer; remediation deadlines for CVE-2026-42208 (11 May), CVE-2026-6973 (10 May), CVE-2026-0300 (9 May). (The pre-gathered KEV feed shows "due None" for all three entries; deadline dates are drawn from NVD structured records and should be verified at cisa.gov/known-exploited-vulnerabilities-catalog.)
- Check Point Research — CPAI-2026-4267 (PAN-OS, 6 May / updated 10 May) and CPAI-2026-4262 (RustFS XSS CVE-2026-27822, 10 May).
- Ivanti PSIRT — disclosure of CVE-2026-6973; advisory available at Ivanti's PSIRT portal.
- BerriAI — vendor of LiteLLM; published fixed version 1.83.7 and recommends 1.83.10-stable per GitHub Security Advisory.
- Anthropic — operator of Claude.ai; the shared-chat feature was abused as a delivery substrate without any vulnerability in Anthropic's platform.
Threat Actors / Clusters
- CL-STA-1132 (Unit 42 designation) — likely state-sponsored cluster exploiting CVE-2026-0300; assessed China-nexus by Unit 42 based on tooling overlap.
- Volt Typhoon, UAT-8337, APT41, CL-STA-0046 — China-nexus clusters previously observed using EarthWorm tunneling tool. Named here solely to convey the TTP-overlap context established by Unit 42; none of these actors is formally attributed to CVE-2026-0300 activity.
References
-
Cybersecurity and Infrastructure Security Agency. (2026, May 8). Known exploited vulnerabilities catalog — CVE-2026-42208. Retrieved from https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
Cybersecurity and Infrastructure Security Agency. (2026, May 7). Known exploited vulnerabilities catalog — CVE-2026-6973. Retrieved from https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
Cybersecurity and Infrastructure Security Agency. (2026, May 6). Known exploited vulnerabilities catalog — CVE-2026-0300. Retrieved from https://www.cisa.gov/known-exploited-vulnerabilities-catalog
-
National Vulnerability Database. (2026). CVE-2026-42208. Retrieved from https://nvd.nist.gov/vuln/detail/[CVE-2026-42208](https://blacklensintelligence.com/cve-2026-42208/)
-
BerriAI. (2026, May). LiteLLM security advisory — pre-authentication SQL injection. Retrieved from https://github.com/BerriAI/litellm/security/advisories
-
Palo Alto Networks PSIRT. (2026). CVE-2026-0300: PAN-OS unauthenticated user-initiated buffer overflow vulnerability in User-ID authentication portal. Retrieved from https://security.paloaltonetworks.com/[CVE-2026-0300](https://blacklensintelligence.com/cve-2026-0300/)
-
Palo Alto Networks Unit 42. (2026, May). Attribution analysis of CL-STA-1132 exploitation of CVE-2026-0300, including post-exploitation TTP timeline and HA-failover technique. Retrieved from https://unit42.paloaltonetworks.com
-
Shadowserver Foundation. (2026, May 6–10). Exposure scan: PAN-OS VM-Series firewalls exposed to public internet. Retrieved from https://shadowserver.org
-
Sysdig Threat Research Team. (2026, May). Analysis of in-the-wild CVE-2026-42208 exploitation targeting behavior. Retrieved from https://sysdig.com/blog
-
Abrams, L. (2026, May 9). JDownloader site hacked to replace installers with Python RAT malware. BleepingComputer. Retrieved from https://www.bleepingcomputer.com/news/security/jdownloader-site-hacked-to-replace-installers-with-python-rat-malware/
-
Sharma, A. (2026, May 10). Hackers abuse Google Ads, Claude.ai chats to push Mac malware. BleepingComputer. Retrieved from https://www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-claudeai-chats-to-push-mac-malware/
-
Ivanti PSIRT. (2026, May). CVE-2026-6973 advisory. Retrieved from https://www.ivanti.com
-
Check Point Research. (2026, May 6). CPAI-2026-4267: Palo Alto Networks PAN-OS buffer overflow. Retrieved from https://research.checkpoint.com
-
Check Point Research. (2026, May 10). CPAI-2026-4262: RustFS cross-site scripting (CVE-2026-27822). Retrieved from https://research.checkpoint.com
-
0xMarcio. (2026, May 10–11). CVE repository. Retrieved from https://github.com/0xMarcio/cve
-
CERT-UA. (2026, May 9–11). Cert.gov.ua advisory feed. Retrieved from https://cert.gov.ua/articles
Confidence Note
High confidence:
- CVE-2026-42208 KEV listing and 11 May federal deadline — corroborated by CISA KEV catalog and NVD structured record. (Pre-gathered KEV feed showed "due None"; NVD record is treated as authoritative for the deadline value.)
- CVE-2026-0300 KEV listing and active exploitation — corroborated by CISA KEV, Palo Alto PSIRT advisory, and Unit 42 reporting.
- Palo Alto PSIRT's Critical severity rating for CVE-2026-0300 — drawn directly from the PSIRT advisory at security.paloaltonetworks.com/CVE-2026-0300. (No confirmed CVSS numeric score was available in the pre-gathered context; a previously cited figure of 9.3 has been removed as unsourced.)
Moderate confidence:
- CL-STA-1132 as a "likely state-sponsored" China-nexus cluster — Unit 42 assessment; TTP overlap with Volt Typhoon and APT41 is suggestive but not dispositive. No second independent attribution source has been identified.
- Sysdig's reporting on CVE-2026-42208 in-the-wild exploitation targeting behavior — single Tier 2 source; not independently corroborated at publication time.
- JDownloader compromise (KJ-3) — single BleepingComputer report with named researcher and IoCs; no independent corroboration identified. Rated Moderate, not High, for this reason.
- Claude.ai shared-chat campaign (KJ-4) — single BleepingComputer report; the "second variant" was identified by the same outlet, not an independent source. Rated Moderate, not High.
- Patch timing estimates for CVE-2026-0300 — vendor projections drawn from Unit 42 and PSIRT reporting; not confirmed release dates.
Low confidence / unverified:
- The negative finding on CERT-UA activity (no UAC advisory 09–11 May) — silence, not verified absence; reporting lag is plausible.
- Whether CVE-2026-42208 exploitation extends beyond the single Sysdig-reported actor or predates disclosure by weeks.
- Whether the JDownloader compromise extended beyond the documented 6–7 May window or affected the signed installer or auto-updater channel.
- MacSync family attribution for the Claude.ai campaign payload — BleepingComputer characterization; no independent malware analysis report cited.
- CIS-locale skip behavior as an indicator of CIS-origin operators — behavioral inference, not confirmed attribution.
Sourcing transparency note: References 7, 8, and 9 (Unit 42 attribution analysis, Shadowserver exposure scan, Sysdig TRT report) lack direct URLs in the pre-gathered context. These are cited with the caveat that readers should verify against the named organizations' publication portals. The absence of direct URLs does not negate the sourced claims but does reduce independent verifiability.
Red Team
Falsifier 1 — The JDownloader incident is broader than reported. If forensic analysis surfaces tampering with the signed AppWork GmbH Windows installer or the auto-updater channel during a period broader than 6–7 May, then KJ-3's bounded 48-hour window collapses and the affected population expands by orders of magnitude. The Priority Action Matrix's P0 framing for JDownloader becomes insufficient; a public disclosure and mass-notification obligation would follow.
Falsifier 2 — CVE-2026-42208 exploitation predates disclosure by weeks. If the actor described by Sysdig has been exploiting LiteLLM proxies for weeks prior to disclosure — analogous to the CVE-2026-0300 timeline where exploitation predated disclosure by nearly a month — then credential rotation today does not contain the breach. Stolen upstream OpenAI, Anthropic, and Azure API keys may already be in active use against providers, not merely against the proxies. The actionable framing of KJ-1 becomes insufficient, and the incident scope expands to include provider-side abuse investigation.
Falsifier 3 — CL-STA-1132 is financially motivated, not state-sponsored. If subsequent reporting reveals CL-STA-1132 as a financially motivated initial-access broker reselling firewall footholds rather than a state-nexus espionage operator, then the AD enumeration and HA-failover SAML flood reframe as ransomware-precursor staging rather than long-dwell intelligence collection. The defender prioritization shifts from counter-espionage hunting to ransomware-precursor detection, and the assessed dwell-time risk profile changes materially.
Falsifier 4 — The AI-stack vulnerability pattern is coincidence, not trend. This brief identifies CVE-2026-42208 as the first KEV entry for an agentic-AI orchestration component and the Claude.ai shared-chat campaign as a novel delivery substrate, and frames both as potentially indicative of a new attack surface. The alternative hypothesis is that these are independent events with no structural connection: LiteLLM is simply a web application with a SQL injection bug, and Claude.ai shared chats are simply a convenient hosting platform no different from any other user-content site. If no additional AI-stack KEV entries appear in the next 30 days and no further LLM-platform delivery campaigns are documented, the trend framing in the Policy Implications section should be retracted. The 30-day monitoring trigger in the What to Watch section is the appropriate resolution mechanism.