23-29 March 2026 Cybersecurity Roundup: Critical Vulnerabilities, Major Breaches, and Key Releases

23-29 March 2026 Cybersecurity Roundup

Critical Router Flaws, AI Exploits, Node.js Risks, Healthcare Breaches, and EU Cyberattack

4/3/2026
23-29 March 2026 Cybersecurity Roundup: Critical Vulnerabilities, Major Breaches, and Key Releases

Reading time: 5 minutes

In the 23-29 March 2026 Cyber Security Bulletin, there is a wave of critical cybersecurity challenges, from high-severity vulnerabilities in popular routers, AI frameworks, and Node.js to major data breaches and high-profile attacks

1. Vulnerability Details

TP-Link Archer NX Router Vulnerabilities (Multiple CVEs)

TP-Link disclosed multiple high-severity vulnerabilities (CVE-2025-15517, CVE-2025-15518, CVE-2025-15519, CVE-2025-15605) affecting Archer NX series routers (NX200, NX210, NX500, NX600), enabling authentication bypass, command injection, and configuration decryption.

Attackers can exploit these flaws to gain unauthorized administrative access, execute arbitrary commands, and decrypt or tamper with router configurations, potentially leading to full device compromise, remote code execution, credential exposure, and network-wide attacks such as MITM.

TP-Link has released firmware updates to address these issues. Users are strongly advised to update immediately, restrict admin access, disable unnecessary remote management, enforce strong credentials, and monitor for suspicious activity to reduce risk.

Reference: TP-Link Security Advisory and Firmware Update Details

NVIDIA AI Frameworks Vulnerabilities (Multiple CVEs)

NVIDIA disclosed multiple vulnerabilities across its AI ecosystem (including Apex, Triton Inference Server, NeMo, and Megatron-LM), with one critical flaw (CVE-2025-33244, CVSS 9.8) enabling remote code execution and several others allowing DoS and privilege escalation.

These vulnerabilities can compromise AI training and inference environments, leading to model theft, data exposure, service disruption, and unauthorized control over ML pipelines.

Organizations should urgently apply NVIDIA’s March 2026 patches, restrict access to AI systems, enforce least-privilege controls, and monitor workloads to mitigate risks and prevent potential exploitation.

Reference: NVIDIA Product Security and Vulnerability Updates

Node.js Vulnerabilities (Multiple CVEs)

Node.js released security updates on March 24, 2026, for versions 20.x, 22.x, 24.x, and 25.x, addressing high-severity flaws like CVE-2026-21637 and CVE-2026-21710 that enable DoS via uncaught exceptions in TLS and HTTP processing, plus permission bypasses and side-channel attacks.

These issues allow attackers to crash processes, evade filesystem/network restrictions (e.g., via Unix Domain Sockets or crafted headers), cause memory leaks, HashDoS in V8, and leak info through cryptographic timing flaws.

Upgrade immediately to Node.js 20.20.2, 22.22.2, 24.14.1, or 25.8.2; validate inputs, use safe error handling, review permission models, and monitor for crashes or resource spikes.

Reference: Node.js March 2026 Security Release Notes

2. Attack Campaigns

QualDerm Data Breach (3.1M Affected)

QualDerm Partners disclosed a March 2026 data breach impacting 3,117,874 individuals after attackers accessed its network from December 24-26, 2025.

Exposed data includes names, addresses, DOB, emails, medical records, diagnoses, insurance details, and in some cases, government IDs and dates of death, raising risks of identity theft, medical fraud, and phishing.

QualDerm contained the breach, notified HHS, is informing victims with 12 months of free identity protection, and emphasizes ongoing investigations amid rising healthcare cyber threats.

Reference: QualDerm Notice of Data Privacy Event

HHS Breach Report Portal Entry

Hightower Holding Data Breach (131K Affected)

Hightower Holding disclosed a March 2026 breach impacting 131,483 individuals after attackers used compromised credentials to access systems on January 8-9.

Exposed data includes names, Social Security numbers, and driver's license numbers, heightening risks of identity theft, financial fraud, and phishing.

The company reviewed data with experts, found no misuse yet, notified victims and regulators like Maine AG, and offers 12 months of free identity protection, stressing MFA and monitoring needs.

Reference: Maine Attorney General Breach Notification

Vermont Consumer Breach Notice Document

3. Security News

Claude Chrome Extension Zero-Click Vulnerability

Researchers uncovered a critical zero-click flaw in the Claude Chrome Extension, exposing over 3 million users to silent prompt injection attacks via malicious websites.

Attackers exploited permissive subdomain trust on *.claude.ai and a DOM-based XSS in Arkose Labs CAPTCHA scripts to hijack Claude, enabling unauthorized access to Gmail, Google Drive, OAuth tokens, chat histories, and email sending without user interaction.

Anthropic patched it in January/February 2026 (update to v1.0.41+); the incident underscores risks in AI browser agents from broad trust models and third-party components.

Reference: Claude Extension Vulnerability Technical Analysis

Kali Linux 2026.1 Release

Kali Linux 2026.1 launched on March 24, 2026, featuring kernel 6.18, 183 package updates, 25 new tools for vulnerability assessment and red teaming, plus a refreshed 2026 theme and BackTrack mode for legacy interface support.

Key enhancements target mobile pentesting via Kali NetHunter, with Qualcomm wireless injection improvements, better device compatibility, and vehicle-based testing demos, despite temporary SDR/radio tool instability.

The release advances offensive security through automation, modern UI, and hardware integration for pentesters.

Reference: Kali Linux 2026.1 Official Release Notes

European Commission AWS Cyberattack

The European Commission confirmed a March 2026 cyberattack after attackers compromised its AWS account hosting the public Europa.eu platform, detected on March 24.

Data exfiltration occurred from external cloud systems, but internal IT networks remained secure due to segmentation, with no service disruptions or public website downtime.

The Commission contained the breach, notified EU entities, and continues forensic analysis, highlighting cloud risks and the value of rapid response and isolation strategies.

Reference: European Commission Cyberattack Press Release

Know your cyber threat posture. Take Complimentary Assessment: Take Complimentary Assessment

Our Cyber Threat Management Services: Cyber Threat Management & Security Services UAE | Crowe UAE

For details: Call / WA +971 52 373 4662 | [email protected]

Dawn Thomas
Dawn Thomas
Senior Partner - Governance Risk & Compliance
Ahmed Ali Bin Haider
Ahmed Ali Bin Haider
Partner - GRC Technology
shahnawaz.sheik@crowe.ae
Shahnawaz Sheik
Director – Cyber Threat Management