Breaking CVE-2026-42897 — Microsoft Exchange OWA zero-day exploited in the wild, no permanent patch, CISA deadline May 29 • MiniPlasma — Windows SYSTEM zero-day, public PoC, no patch until June 10 • CVE-2026-46300 “Fragnesia” — 3rd Linux kernel root exploit in 2 weeks • CVE-2026-20182 — Cisco SD-WAN CVSS 10.0, CISA Emergency Directive • CVE-2026-42945 “NGINX Rift” — now actively exploited in the wild • CVE-2026-45185 “Dead.Letter” — Exim CVSS 9.8 RCE
Latest

Threats & Attacks

Email Security
CVE-2026-42897: Exchange OWA Zero-Day — One Email, No Patch, Active Exploitation

A crafted email executes JavaScript inside an authenticated OWA session. No credentials required. No permanent patch. CISA KEV — federal deadline May 29. Exchange Online is not affected.

May 19, 2026
Windows Zero-Day
MiniPlasma: Microsoft “Fixed” This in 2020 — SYSTEM Shell on Every Fully Patched Windows PC

Standard user in, SYSTEM shell out. Public exploit on GitHub. No patch until June 10. The 6th zero-day in 6 weeks from the same rogue researcher — first 3 were used in real attacks.

May 19, 2026
Linux Kernel
Fragnesia (CVE-2026-46300): The Linux LPE the Dirty Frag Patch Accidentally Created

No race condition. Public PoC. Container escape. The Dirty Frag kernel patch alone does NOT protect you — a separate patch is required. Third Linux root exploit in two weeks.

May 18, 2026
Network Infrastructure
CVE-2026-20182: CVSS 10.0 Cisco SD-WAN Auth Bypass — 11 Clusters Exploiting Now

Four DTLS packets. No credentials. Full administrative access to the entire enterprise SD-WAN fabric. CISA Emergency Directive. Active exploitation confirmed.

May 16, 2026
Web Server
NGINX Rift (CVE-2026-42945): 18-Year Heap Overflow — Now Actively Exploited in the Wild

VulnCheck confirms real-world attacks days after public disclosure. CVSS 9.2. ~34% of all internet web servers running a vulnerable version. Patch to NGINX 1.30.1 immediately.

May 14, 2026
Critical RCE
Dead.Letter (CVE-2026-45185): Exim CVSS 9.8 — No Login, No Config Workaround

One malformed SMTP sequence corrupts the heap and opens a shell. An autonomous AI built the full exploit in 7 days. Patch to Exim 4.99.3 immediately.

May 13, 2026
Deep Dive

Analysis & Intelligence

More

Further Coverage

The DataWater Intelligence Brief

Weekly cybersecurity analysis and CISO-level insights — no noise, no vendor pitches. Just signal.