Skip to content
.ca
5 minhigh

Cyber Centre Daily Advisory Digest — 2026-04-20 (6 advisories)

The Canadian Centre for Cyber Security published a daily digest of six security advisories on April 20, 2026. The advisories cover critical vulnerabilities and updates for various IBM, Dell, Ubuntu, Red Hat, and ICS/SCADA products, including a specific NTP vulnerability (CVE-2020-11868) in Moxa Ethernet switches.

Conf:highAnalyzed:2026-04-20reports

Authors: Canadian Centre for Cyber Security

Source:Canadian Centre for Cyber Security

Key Takeaways

  • Multiple critical vulnerabilities addressed in IBM products including API Connect, Aspera, and Watson.
  • Linux kernel vulnerabilities patched across multiple Ubuntu (14.04 LTS to 25.10) and Red Hat Enterprise Linux versions.
  • CISA and Moxa released ICS advisories affecting AVEVA, Anviz, Delta Electronics, Horner Automation, and Moxa PT series switches.
  • Dell released security updates for PowerEdge Servers, Connectrix Switches, and Storage Manager.

Affected Systems

  • I
  • B
  • M
  • p
  • r
  • o
  • d
  • u
  • c
  • t
  • s
  • (
  • A
  • P
  • I
  • C
  • o
  • n
  • n
  • e
  • c
  • t
  • ,
  • A
  • s
  • p
  • e
  • r
  • a
  • ,
  • W
  • a
  • t
  • s
  • o
  • n
  • ,
  • e
  • t
  • c
  • .
  • )
  • ,
  • D
  • e
  • l
  • l
  • p
  • r
  • o
  • d
  • u
  • c
  • t
  • s
  • (
  • P
  • o
  • w
  • e
  • r
  • E
  • d
  • g
  • e
  • ,
  • C
  • o
  • n
  • n
  • e
  • c
  • t
  • r
  • i
  • x
  • ,
  • C
  • o
  • m
  • m
  • a
  • n
  • d
  • |
  • U
  • p
  • d
  • a
  • t
  • e
  • )
  • ,
  • U
  • b
  • u
  • n
  • t
  • u
  • (
  • 1
  • 4
  • .
  • 0
  • 4
  • L
  • T
  • S
  • t
  • o
  • 2
  • 5
  • .
  • 1
  • 0
  • )
  • ,
  • R
  • e
  • d
  • H
  • a
  • t
  • E
  • n
  • t
  • e
  • r
  • p
  • r
  • i
  • s
  • e
  • L
  • i
  • n
  • u
  • x
  • ,
  • I
  • C
  • S
  • p
  • r
  • o
  • d
  • u
  • c
  • t
  • s
  • (
  • A
  • V
  • E
  • V
  • A
  • ,
  • A
  • n
  • v
  • i
  • z
  • ,
  • D
  • e
  • l
  • t
  • a
  • E
  • l
  • e
  • c
  • t
  • r
  • o
  • n
  • i
  • c
  • s
  • ,
  • H
  • o
  • r
  • n
  • e
  • r
  • A
  • u
  • t
  • o
  • m
  • a
  • t
  • i
  • o
  • n
  • )
  • ,
  • M
  • o
  • x
  • a
  • P
  • T
  • S
  • e
  • r
  • i
  • e
  • s
  • s
  • w
  • i
  • t
  • c
  • h
  • e
  • s
  • .

Vulnerabilities (CVEs)

  • CVE-2020-11868

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

N/A

Detection Engineering Assessment

EDR Visibility: None — The article is a digest of vulnerability advisories and does not contain behavioral indicators or attack chains visible to EDR. Network Visibility: None — No specific network signatures or traffic patterns are provided in the advisory digest. Detection Difficulty: N/A — This is a patch management and vulnerability advisory, not an active threat detection report.

Required Log Sources

  • Vulnerability Management
  • Asset Inventory

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Monitor for anomalous NTP traffic patterns or exploitation attempts targeting Moxa PT series Ethernet switches, which may indicate attempts to exploit CVE-2020-11868.Network IDS/IPS, Firewall LogsInitial AccessMedium

Control Gaps

  • Patch Management

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Review the provided web links for IBM, Dell, Ubuntu, CISA, Red Hat, and Moxa advisories.
  • Apply the necessary updates to affected systems immediately, prioritizing critical infrastructure and internet-facing assets.

Infrastructure Hardening

  • Ensure ICS/SCADA devices are isolated from corporate networks and the internet.
  • Implement a robust patch management lifecycle for both IT and OT environments.

User Protection

  • N/A

Security Awareness

  • Monitor official vendor security advisories for newly disclosed vulnerabilities.