Vulnerability Report - March 2026

All vulnerability reports

Introduction

This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.

It highlights the most frequently mentioned vulnerability for March 2026, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, SPLOITUS, Metasploit, and more. For further details, please visit this page.

The Month at a Glance

March 2026 was led by CVE-2026-3055, a Critical-severity memory overread in Citrix NetScaler ADC and Gateway when configured as a SAML IDP, with 154 sightings. Active exploitation was confirmed in the wild by multiple sources including honeypot operators, and a proof-of-concept was publicly released by watchTowr. It was followed by CVE-2026-20131 in Cisco Secure Firewall Management Center (FMC) with 121 sightings – notably flagged by CISA as having known ransomware campaign use.

Network appliances and edge devices dominated the threat landscape in March, with Citrix NetScaler, Cisco FMC, and F5 BIG-IP (CVE-2025-53521) all appearing in both the top sightings and the CISA KEV catalog. AI and workflow automation tools also drew significant attention, with Langflow (CVE-2026-33017) suffering an unauthenticated RCE via code injection and n8n (CVE-2025-68613) being added to CISA KEV. A notable supply-chain entry was the Aquasecurity Trivy embedded malicious code vulnerability (CVE-2026-33634), which could expose CI/CD credentials.

On the Linux side, CVE-2026-3888, a local privilege escalation in snapd affecting multiple Ubuntu LTS versions, attracted 96 sightings. Qualcomm chipset memory corruption (CVE-2026-21385) was added to CISA KEV early in the month via the Android Security Bulletin. Legacy IoT devices continued to be targeted by botnets such as Mozi, with Zyxel (CVE-2017-18368) and D-Link (CVE-2015-2051) routers still appearing in the top 10 sightings despite being years old.

The CISA Known Exploited Vulnerabilities catalog added 26 new entries during the month. Notable additions include:

The CIRCL Known Exploited Vulnerabilities catalog added five entries, all confirmed via sinkhole and CTI feed evidence: CVE-2024-13030 (D-Link DIR-823G), CVE-2021-35394 (Realtek Jungle SDK), CVE-2017-17215 (Huawei HG532), CVE-2014-8361 (Realtek SDK), and GCVE-1-2026-0020 (Eir D1000 router). The ENISA KEV catalog had no new entries in March.

Contributor insights this month covered Citrix NetScaler CVE-2026-3055 exploitation analysis and PoC details, F5 BIG-IP indicators of compromise, Oracle Identity Manager critical vulnerabilities, BMC FootPrints pre-auth RCE chains, Veeam Backup & Replication security updates, and Lantronix industrial device vulnerabilities.

Top 10 vulnerabilities of the Month

VulnerabilitySighting CountVendorProductVLAI Severity
CVE-2026-3055154CitrixNetScaler ADC & GatewayCritical (confidence: 0.9651)
CVE-2026-20131121CiscoSecure Firewall Management Center (FMC)Critical (confidence: 0.978)
CVE-2026-33017101LangflowLangflowCritical (confidence: 0.9904)
CVE-2026-388896Canonicalsnapd (Ubuntu)High (confidence: 0.9876)
CVE-2026-2138593QualcommSnapdragonHigh (confidence: 0.9871)
CVE-2025-5352187F5BIG-IPCritical (confidence: 0.9364)
CVE-2026-2199281OracleIdentity Manager & Web Services ManagerCritical (confidence: 0.9929)
CVE-2026-3274672GNUinetutils (telnetd)Critical (confidence: 0.8862)
CVE-2017-1836862ZyxelP660HN-T1A RouterMedium (confidence: 0.5886)
CVE-2015-205160D-LinkDIR-645 RouterCritical (confidence: 0.7862)

Known Exploited Vulnerabilities

New entries have been added to major Known Exploited Vulnerabilities catalogs.

CISA

CVE IDDate AddedVendorProductVLAI Severity
CVE-2026-30552026-03-30CitrixNetScalerCritical (confidence: 0.9651)
CVE-2025-535212026-03-27F5BIG-IPCritical (confidence: 0.9364)
CVE-2026-336342026-03-26AquasecurityTrivyCritical (confidence: 0.9963)
CVE-2026-330172026-03-25LangflowLangflowCritical (confidence: 0.9904)
CVE-2025-312772026-03-20AppleMultiple ProductsHigh (confidence: 0.9935)
CVE-2025-435202026-03-20AppleMultiple ProductsHigh (confidence: 0.891)
CVE-2025-435102026-03-20AppleMultiple ProductsMedium (confidence: 0.7061)
CVE-2025-540682026-03-20LaravelLivewireCritical (confidence: 0.9685)
CVE-2025-324322026-03-20Craft CMSCraft CMSHigh (confidence: 0.8744)
CVE-2026-201312026-03-19CiscoSecure Firewall Management Center (FMC)Critical (confidence: 0.978)
CVE-2026-209632026-03-18MicrosoftSharePointCritical (confidence: 0.6657)
CVE-2025-663762026-03-18SynacorZimbra Collaboration Suite (ZCS)Medium (confidence: 0.9952)
CVE-2025-478132026-03-16Wing FTP ServerWing FTP ServerMedium (confidence: 0.8028)
CVE-2026-39092026-03-13GoogleSkiaHigh (confidence: 0.9471)
CVE-2026-39102026-03-13GoogleChromium V8High (confidence: 0.98)
CVE-2025-686132026-03-11n8nn8nCritical (confidence: 0.8146)
CVE-2026-16032026-03-09IvantiEndpoint Manager (EPM)High (confidence: 0.9622)
CVE-2025-263992026-03-09SolarWindsWeb Help DeskCritical (confidence: 0.9655)
CVE-2021-220542026-03-09OmnissaWorkspace One UEMHigh (confidence: 0.9505)
CVE-2023-419742026-03-05AppleiOS and iPadOSHigh (confidence: 0.997)
CVE-2021-309522026-03-05AppleMultiple ProductsHigh (confidence: 0.9971)
CVE-2023-430002026-03-05AppleMultiple ProductsHigh (confidence: 0.9948)
CVE-2021-226812026-03-05RockwellMultiple ProductsHigh (confidence: 0.5079)
CVE-2017-79212026-03-05HikvisionMultiple ProductsCritical (confidence: 0.9056)
CVE-2026-213852026-03-03QualcommMultiple ChipsetsHigh (confidence: 0.9871)
CVE-2026-227192026-03-03BroadcomVMware Aria OperationsCritical (confidence: 0.5026)

More KEV entries from the CISA Catalog.

CIRCL

Vulnerability IDDate AddedVendorProductVLAI Severity
CVE-2024-130302026-03-12D-LinkDIR-823GCritical (confidence: 0.5827)
CVE-2021-353942026-03-12RealtekJungle SDKCritical (confidence: 0.9847)
CVE-2017-172152026-03-12HuaweiHG532High (confidence: 0.4429)
CVE-2014-83612026-03-12RealtekSDKCritical (confidence: 0.9846)
GCVE-1-2026-00202026-03-23EirD1000Critical (confidence: 0.944)

More KEV entries from the CIRCL Catalog.

ENISA

No new entry in March.

More KEV entries from the ENISA Catalog.

Insights from Contributors

Thank you

Thank you to all the contributors and our diverse sources!

If you want to contribute to the next report, you can create your account.

Feedback and Support

If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Funding

eu_funded_en

The main objective of Federated European Team for Threat Analysis (FETTA) is improvement of Cyber Threat Intelligence (CTI) products available to the public and private sector in Poland, Luxembourg, and the European Union as a whole.
Developing actionable CTI products (reports, indicators, etc) is a complex task and requires an in-depth understanding of the threat landscape and the ability to analyse and interpret large amounts of data. Many SOCs and CSIRTs build their capabilities in this area independently, leading to a fragmented approach and duplication of work.

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents. The organization brings to the table its extensive experience in cybersecurity incident management, threat intelligence, and proactive response strategies. With a strong background in developing innovative open source cybersecurity tools and solutions, CIRCL’s contribution to the FETTA project is instrumental in achieving enhanced collaboration and intelligence sharing across Europe.

Press release