Device Code Phishing Kits Surge 37.5x, Bypass MFA in Entra
Topics LLM Inference · Agentic AI · AI Regulation
Device code phishing surged 37.5x in 2026 with 11+ commodity kits (EvilTokens, VENOM, DOCUPOLL, LINKID, and 7 more) that completely bypass MFA by stealing OAuth tokens on legitimate Microsoft login pages — your users complete MFA normally and hand the attacker a persistent token anyway. If you haven't disabled device code authentication flow in Entra ID conditional access, you have an open door that a low-skill attacker with a $50 kit can walk through today.
◆ INTELLIGENCE MAP
01 Device Code Phishing Goes Industrial — MFA Bypassed at Scale
act now11+ phishing-as-a-service kits now commoditize OAuth device code token theft at 37.5x 2025 volume. Victims complete MFA on legitimate Microsoft login pages — tokens persist beyond password resets. Default Entra ID configs permit this flow. Most SOCs monitor credentials, not consent events.
- Phishing kits active
- YoY growth
- Skill level required
- MFA protection
- Traditional Phishing40
- Device Code Phishing100
02 Supply Chain Attacks Converge: DPRK npm + Trivy→LiteLLM + Drift VSCode Exploit
act nowThree distinct supply chain campaigns hit simultaneously: DPRK Bluenoroff targets maintainers of Node.js, Express, Lodash, Fastify, and Mocha (not just Axios). TeamPCP weaponized Trivy scanning to harvest credentials, pivoting into LiteLLM (97M+ downloads). UNC4736 used a VSCode/Cursor silent code execution exploit after a 6-month, $1M social engineering operation.
- npm packages targeted
- LiteLLM downloads/mo
- Drift social eng. time
- Drift trust deposit
- 01LiteLLM (TeamPCP)97M+ downloads
- 02Axios (Bluenoroff)Tens of millions/wk
- 03Trivy Actions (TeamPCP)Millions of CI runs
- 04Drift (UNC4736)$1M+ deposited as bait
03 Critical Infrastructure Vulns: Fortinet EMS Zero-Day + GPU Rowhammer
monitorFortinet EMS CVE-2026-35616 is an actively exploited auth bypass→RCE zero-day (emergency Saturday patch). Simultaneously, two GPU Rowhammer attacks (GDDRHammer, GeForge) achieve full host memory read/write on Nvidia Ampere via GDDR6 bit flips — IOMMU is disabled by default in most BIOSs. A 23-year Linux NFS heap overflow was also discovered this week.
- Fortinet EMS CVE
- GPU Rowhammer targets
- IOMMU default state
- NFS bug age
- NFS overflow introduced~2003 — 23-year latent kernel vuln
- Winnti C2 invisible2+ years undetected by Shodan
- Fortinet EMS zero-dayActive exploitation, emergency patch
- GPU Rowhammer publishedIOMMU bypass on Nvidia Ampere
04 AI Offensive Capability Scaling Law Quantified
monitorLyptus Research quantified AI cyberoffense: capability doubles every 5.7 months (accelerating from 9.8 months over 2019–2026). GPT-5.3 Codex and Opus 4.6 automate 50% of tasks taking human pentesters 3+ hours. Open-weight model GLM-5 lags frontier by only 5.7 months — meaning ungoverned AI offensive tools proliferate to all threat actors on that timeline.
- Doubling time (2024–26)
- Doubling time (2019–26)
- 3h task success rate
- Open-weight lag
- 2019–2026 avg9.8
- 2024–2026 trend5.7
05 AI Agent Attack Surface Confirmed in Production
backgroundGoogle DeepMind's largest empirical study confirms websites actively fingerprint AI agents and inject malicious instructions via invisible HTML, steganography, and PDF metadata. Multi-agent pipelines exhibit cascade compromise. Separately, agent harness analysis shows 11 distinct infrastructure components per deployment with wildly different guardrail architectures across Anthropic, OpenAI, and LangChain.
- Injection vectors
- Harness components
- Context accuracy drop
- Agent tool capabilities
◆ DEEP DIVES
01 Device Code Phishing Industrialized: 11 Kits, 37.5x Growth, and Your MFA Is Irrelevant
<h3>The Threat</h3><p>Three independent intelligence sources confirm a <strong>37.5x surge in device code phishing</strong> in 2026, driven by at least <strong>11 phishing-as-a-service kits</strong> that have commoditized a technique previously reserved for APT29 and Midnight Blizzard. The attack exploits OAuth 2.0's Device Authorization Grant flow — designed for smart TVs and IoT — to steal persistent OAuth tokens on <strong>entirely legitimate Microsoft login pages</strong>. The victim completes MFA normally and unknowingly grants the attacker a token that persists independently of password resets.</p><blockquote>This isn't a vulnerability. It's a feature being abused at industrial scale — and your default Entra ID configuration permits it.</blockquote><h3>How It Works</h3><p>The attacker generates a device code, wraps it in a SaaS-themed lure (document share, compliance check, IT verification), and the victim enters the code at <code>microsoft.com/devicelogin</code>. After normal MFA, the attacker receives an OAuth access token and refresh token. Refresh tokens provide access for <strong>weeks to months</strong>. Password resets don't invalidate them. Detection signals look like normal token grants.</p><h4>Kit Landscape</h4><table><thead><tr><th>Kit</th><th>Target</th><th>Skill Required</th></tr></thead><tbody><tr><td><strong>EvilTokens/Antibot</strong></td><td>M365 / Entra ID</td><td>Low — full PhaaS</td></tr><tr><td><strong>VENOM</strong></td><td>M365 / OAuth providers</td><td>Low-Medium</td></tr><tr><td><strong>DOCUPOLL</strong></td><td>M365</td><td>Low</td></tr><tr><td><strong>LINKID</strong></td><td>LinkedIn / M365</td><td>Low</td></tr><tr><td>Dolce, DCStatus, Paprika, Flow_Token, DocuPull, Authov, Clure</td><td>Various OAuth</td><td>Low</td></tr></tbody></table><h3>Why Your Defenses Fail</h3><p>Most organizations <strong>monitor credential events but not consent events</strong>. Your SIEM alerts on impossible travel for logins — does it alert on a user granting <strong>Mail.ReadWrite + Files.ReadWrite.All</strong> to an unrecognized application from an unusual location? Traditional phishing uses fake login pages your email gateway can flag; device code phishing uses <em>real Microsoft pages</em>. The token, once granted, provides the full scope of whatever the OAuth application requested — mail, files, directory, APIs.</p><h3>Cross-Source Analysis</h3><p>All three reporting sources agree on the 37.5x growth figure (attributed to Push Security research) and the MFA bypass mechanism. One source identifies 10 kits, another identifies 11 — the discrepancy is minor and likely reflects slightly different tracking windows. All sources agree <strong>EvilTokens is the most popular kit</strong>. MITRE ATT&CK mapping is consistent across sources: <strong>T1528</strong> (Steal Application Access Token), <strong>T1566</strong> (Phishing), <strong>T1550.001</strong> (Use Alternate Authentication Material).</p><hr><h3>Your Response</h3><ol><li><strong>Disable device code flow in Entra ID conditional access today.</strong> Navigate to Conditional Access → New Policy → Target All Users → Grant → Block for Device Code Flow. If specific use cases require it (kiosk, IoT), restrict to managed devices with compliant status only.</li><li><strong>Deploy token monitoring this week.</strong> Forward OAuth token grant events to your SIEM. Build detections for: device code flow from unexpected geolocations, consent to high-privilege scopes from unrecognized apps, and refresh token usage from new IP addresses.</li><li><strong>Enforce app consent governance.</strong> In Entra ID, set 'Users can consent to apps' to No. Require admin consent workflow. In Google Workspace, restrict third-party app access to approved apps only.</li><li><strong>Run M365-Assess.</strong> This free PowerShell 7 tool runs 169 automated checks across Identity, Exchange, Intune, Defender, SharePoint, and Teams — aligned to CIS and CISA SCuBA benchmarks. Prioritize token issuance and conditional access findings.</li></ol>
Action items
- Disable OAuth device code authentication flow in Entra ID conditional access for all users except explicitly approved IoT/kiosk scenarios
- Build SIEM detection rules for device code token grants from unexpected geolocations, consent to high-privilege OAuth scopes, and anomalous refresh token reuse
- Run M365-Assess (free, 169 checks) against your M365 tenant and remediate token issuance and conditional access findings
Sources:Fortinet EMS zero-day is live, device code phishing is up 37x, and DPRK is hunting your npm maintainers · Device code phishing just went 37.5x — your MFA won't save you, and 11 kits are already in the wild · OAuth device code phishing just surged 37x — your credential-based defenses won't stop it
02 Supply Chain Under Siege: Three Distinct Campaigns Targeting Your Dev Toolchain Simultaneously
<h3>The Convergence</h3><p>Three separate supply chain attack campaigns landed in the same intelligence cycle, each targeting a different link in your software development chain. The cumulative message: <strong>your CI/CD pipeline, your IDE, and your AI proxy layer are all under coordinated nation-state and criminal attack</strong>.</p><h4>Campaign 1: DPRK npm Ecosystem Targeting (Broader Than Axios)</h4><p>Monday's advisory covered the Axios compromise. What's new: Socket Security and DCSO confirm <strong>Bluenoroff (UNC1069)</strong> is systematically targeting maintainers of <strong>Node.js, Lodash, Fastify, Mocha, and Express</strong> — packages forming the backbone of the JavaScript ecosystem. They even targeted Socket Security's CEO, Feross Aboukhadijeh. A separate OtterCookie backdoor is being spread via malicious npm packages. This is not a single-package attack — it's a <strong>campaign against the npm ecosystem's human infrastructure</strong>.</p><h4>Campaign 2: TeamPCP Trivy → LiteLLM → telnyx Cascade</h4><p>TeamPCP compromised <strong>Trivy's GitHub Actions on March 19</strong> — not the scanner binary, but the CI/CD automation layer. Security scanners are granted elevated permissions by design, making them ideal credential harvesters. Stolen credentials were then used to breach <strong>LiteLLM (97M+ monthly downloads)</strong> and telnyx (~800K downloads). LiteLLM is particularly dangerous because it stores API keys for <strong>multiple LLM providers</strong> — OpenAI, Anthropic, Azure — meaning a single compromise exposes your entire AI API key inventory.</p><h4>Campaign 3: UNC4736 Drift Protocol VSCode/Cursor Exploit</h4><p>The most operationally sophisticated attack: DPRK's UNC4736 spent <strong>six months building credibility</strong> with Drift Protocol, depositing over <strong>$1M</strong>, onboarding an Ecosystem Vault, and conducting <strong>face-to-face meetings at conferences</strong> via third-party intermediaries. The payload: a cloned repository exploiting a <strong>VSCode/Cursor silent code execution vulnerability</strong> paired with a malicious TestFlight wallet app. Mandiant attributes this with medium-high confidence.</p><table><thead><tr><th>Campaign</th><th>Target</th><th>New TTP Element</th><th>Blast Radius</th></tr></thead><tbody><tr><td>Bluenoroff npm</td><td>Package maintainers</td><td>Systematic ecosystem-wide targeting</td><td>Billions of downstream installs</td></tr><tr><td>TeamPCP CI/CD</td><td>Trivy → LiteLLM</td><td>Security tool weaponization</td><td>97M+ monthly downloads</td></tr><tr><td>UNC4736 IDE</td><td>VSCode/Cursor users</td><td>$1M deposit + in-person meetings</td><td>Any dev cloning external repos</td></tr></tbody></table><blockquote>Your security scanner just became the attacker's credential harvester, your IDE auto-executes code on workspace open, and DPRK is spending $1M and six months to compromise a single developer. The supply chain attack cost-benefit equation has fundamentally shifted.</blockquote><hr><h3>Your Response</h3><ol><li><strong>Pin all GitHub Actions to commit SHAs, not tags.</strong> Tags are mutable — this is exactly how TeamPCP delivered the Trivy payload. Audit all workflow files this week.</li><li><strong>Rotate all LLM API keys that transited LiteLLM.</strong> If your teams used LiteLLM even experimentally, every OpenAI, Anthropic, and Azure key that flowed through it is potentially compromised.</li><li><strong>Harden VSCode/Cursor: </strong>enable workspace trust, disable automatic task execution on workspace open, restrict extension auto-install from cloned repos. Set <code>task.allowAutomaticTasks: never</code> fleet-wide.</li><li><strong>Deploy npm supply chain monitoring</strong> — evaluate Elastic's open-source Supply Chain Monitor or Socket Security. Run <code>npm audit</code> across all projects and audit for unexpected maintainer changes on critical packages in the past 90 days.</li></ol>
Action items
- Pin all third-party GitHub Actions to commit SHAs (not tags) and audit Trivy Action usage for runs since March 19; rotate all secrets accessible to affected workflows
- Rotate all LLM provider API keys (OpenAI, Anthropic, Azure) that ever transited a LiteLLM proxy instance
- Enforce workspace trust and disable automatic task execution in VSCode/Cursor across all engineering endpoints via endpoint management
- Deploy npm/PyPI supply chain monitoring (Elastic Supply Chain Monitor or Socket Security) with alerts for unexpected maintainer changes on critical packages
Sources:North Korea just poisoned Axios in npm · Fortinet EMS zero-day is live, device code phishing is up 37x · TeamPCP turned your Trivy scanner into a credential harvester · DPRK actors are exploiting VSCode/Cursor to breach crypto firms · LiteLLM supply chain breach hit a $10B AI startup
03 AI Offensive Capability Now Doubles Every 5.7 Months — Your Threat Models Need Exponential Math
<h3>The Research</h3><p>Lyptus Research published what may be the most consequential cybersecurity finding of 2026: a <strong>quantified scaling law for AI cyberoffense capability</strong>. Across frontier models from GPT-2 through GPT-5.3 Codex, offensive cyber capability doubles every <strong>9.8 months</strong> on the full 2019–2026 trendline. Restrict to 2024–2026 models and it compresses to <strong>5.7 months</strong> — a superlinear acceleration.</p><p>The methodology is rigorous: 291 tasks calibrated by 10 offensive security professionals, spanning seven established benchmarks (CyBashBench, NL2Bash, InterCode CTF, NYUCTF, CyBench, CVEBench, CyberGym). MIT independently validated the trajectory using METR's framework.</p><h3>What the Numbers Mean</h3><table><thead><tr><th>Metric</th><th>Current State</th><th>Implication</th></tr></thead><tbody><tr><td>Frontier success on 3h tasks</td><td>50% (GPT-5.3, Opus 4.6)</td><td>Mid-tier pentest work automated today</td></tr><tr><td>Task time horizon (50% success)</td><td>~1 week</td><td>Multi-day autonomous attack chains viable</td></tr><tr><td>Open-weight lag (GLM-5)</td><td>5.7 months</td><td>Every adversary gets today's capability by ~Oct 2026</td></tr><tr><td>Capability in Apr 2027</td><td>~4x current</td><td>Your annual threat model is stale on arrival</td></tr></tbody></table><h3>The Proliferation Problem</h3><p>The 5.7-month open-weight lag is the critical finding. Closed-source models have guardrails — usage policies, monitoring, account enforcement. <strong>Open-weight models have none of these controls.</strong> GLM-5 demonstrates that offensive capabilities diffuse into the open ecosystem on short timelines. Fine-tuning for exploit development, removing refusal behaviors, and optimizing for offensive task completion is within the capability of any moderately sophisticated threat actor. <em>This isn't future risk — it's near-term certainty.</em></p><h3>Corroborating Evidence</h3><p>This isn't the only data point. Anthropic's MAD Bugs Initiative demonstrated Claude Opus 4.6 autonomously discovering <strong>500+ high-severity vulnerabilities</strong> across production open-source projects. An AI agent found a <strong>23-year-old heap buffer overflow in the Linux NFS driver</strong> that two decades of human code review missed. The asymmetry between time-to-discover (approaching zero) and time-to-patch (days to weeks) is the critical gap.</p><blockquote>Any defensive strategy that doesn't account for exponential attacker improvement is already obsolete. AI offensive capability doubling every 5.7 months means your annual threat model review cycle produces a document that's outdated before the ink dries.</blockquote><hr><h3>Your Response</h3><p>This is strategic, not tactical — but it demands concrete action:</p><ol><li><strong>Recalibrate threat models quarterly, not annually.</strong> Assume all adversaries — including commodity cybercriminals — have access to AI tooling that automates 50% of tasks requiring 3+ hours of expert offensive work. The Lyptus data gives you citable numbers for board materials.</li><li><strong>Compress your patching cadence.</strong> If your MTTR for critical CVEs exceeds 72 hours, you're exposed. CVEBench specifically measures AI's ability to weaponize published CVEs — every day a patch sits unapplied, AI-augmented attackers have a higher probability of automated exploitation.</li><li><strong>Run an AI-augmented red team exercise this quarter.</strong> Use GPT-5.3 Codex or Opus 4.6 against your production attack surface. Document where AI succeeds, where it fails, and where your detection stack has gaps. This is the single highest-ROI security investment you can make right now.</li><li><strong>Deploy AI-native detection.</strong> Manual SOC triage cannot match AI-speed attack generation. Evaluate AI-augmented SOAR and behavioral analytics platforms that detect AI-characteristic patterns: systematic enumeration, low-variance exploit chains, and superhuman persistence.</li></ol>
Action items
- Run an AI-augmented red team exercise using frontier models (GPT-5.3 Codex, Opus 4.6) against your production attack surface and document detection gaps
- Brief the board on AI-driven cyber risk using Lyptus Research's 5.7-month doubling time to justify accelerated security investment
- Shift threat model reviews from annual to quarterly cadence with AI capability reassessment built into each cycle
Sources:AI cyberoffense capability is doubling every 5.7 months — and open-weight models are only 5.7 months behind the frontier · North Korea just poisoned Axios in npm · 23-year-old Linux NFS heap overflow just surfaced · AI offensive capabilities doubling every 6 months
◆ QUICK HITS
Fortinet EMS zero-day CVE-2026-35616 (auth bypass → RCE) is actively exploited — emergency Saturday patch available, second EMS exploit in two months. Patch immediately or restrict management interface access to trusted IPs.
Fortinet EMS zero-day is live, device code phishing is up 37x, and DPRK is hunting your npm maintainers
New Winnti Linux backdoor harvests cloud instance metadata from AWS, GCP, Azure, and Alibaba Cloud using SMTP port 25 as covert C2 — infrastructure invisible to Shodan for 2+ years. Block outbound port 25 from non-mail workloads.
Fortinet EMS zero-day is live, device code phishing is up 37x, and DPRK is hunting your npm maintainers
GPU Rowhammer (GDDRHammer, GeForge) achieves full host memory read/write from GPU-resident code on Nvidia Ampere (RTX 3060, RTX 6000) — IOMMU disabled by default in most BIOSs. Verify IOMMU is enabled across all GPU workloads, prioritize multi-tenant ML clusters.
Device code phishing just went 37.5x — your MFA won't save you, and 11 kits are already in the wild
AWS S3 account namespaces now available — bind bucket names to accounts via s3:x-amz-bucket-namespace SCP condition key, eliminating 7-year-old bucketsquatting attack class. Enforce across all AWS accounts this sprint.
Device code phishing just went 37.5x — your MFA won't save you, and 11 kits are already in the wild
Update: DPRK npm campaign broader than Axios — Bluenoroff systematically phishing maintainers of Node.js, Lodash, Fastify, Mocha, Express, and even Socket Security's CEO. Monitor for maintainer changes across all critical JavaScript dependencies.
Fortinet EMS zero-day is live, device code phishing is up 37x, and DPRK is hunting your npm maintainers
Quantum cryptographic threat accelerates: Shor's algorithm now feasible at ~10,000 reconfigurable atomic qubits (was millions); P-256 elliptic curves breakable in days at 26,000 qubits. Begin cryptographic inventory for PQC migration planning this quarter.
TeamPCP turned your Trivy scanner into a credential harvester — and your LiteLLM proxy may already be compromised
Unit 42 demonstrated four-stage prompt injection chain against Amazon Bedrock multi-agent systems running default templates — enabling built-in pre-processing prompt and Guardrail blocks the chain entirely. Audit all Bedrock deployments for guardrail configuration.
Device code phishing just went 37.5x — your MFA won't save you, and 11 kits are already in the wild
Cookie-based PHP web shells replacing URL parameter-based C2 to evade WAF and URL inspection rules. Update WAF and IDS to inspect HTTP cookie values for encoded command patterns per Microsoft advisory.
Fortinet EMS zero-day is live, device code phishing is up 37x, and DPRK is hunting your npm maintainers
GitHub Copilot trains on Free/Pro/Pro+ interaction data by default — proprietary code patterns from private repos flowing into training pipeline unless explicitly disabled. Audit org settings and mandate Enterprise tier or disable data sharing today.
GitHub Copilot is training on your private code by default — and your AI agent stack has no governance
GitHub added 37 new secret detectors in March 2026 and extended scanning to AI coding agent output via MCP Server integration — verify push protection is enabled org-wide and evaluate MCP integration for AI-assisted workflows.
AI-generated code is leaking secrets — GitHub's new defenses and what your pipeline still misses
FAA's 45 high-impact air traffic systems lack baseline security controls per DOT IG audit — no vulnerability tracking, outdated standards. If your organization connects to FAA/DOT systems, elevate third-party risk rating. Remediation deadline: December 2026.
FAA's 45 Critical Air Traffic Systems Have No Baseline Security Controls
Linux 7.0 kernel scheduler changes halve PostgreSQL throughput — fix described as 'non-trivial.' Issue hold on Linux 7.0 adoption for any host running PostgreSQL workloads.
23-year-old Linux NFS heap overflow just surfaced — and Linux 7.0 may break your PostgreSQL infra
Phorpiex/Twizt botnet grown to 70,000–80,000 infected Windows devices, deploying LockBit Black and Global ransomware alongside mass sextortion campaigns.
Fortinet EMS zero-day is live, device code phishing is up 37x, and DPRK is hunting your npm maintainers
BOTTOM LINE
Device code phishing just went from APT boutique to commodity product — 11 kits, 37.5x growth, full MFA bypass — while three separate supply chain campaigns (DPRK targeting npm ecosystem maintainers, TeamPCP weaponizing your Trivy security scanner into a credential harvester, and UNC4736 spending $1M and six months to exploit a VSCode silent execution vulnerability) hit your development toolchain simultaneously, and research quantifying AI offensive capability doubling every 5.7 months means the adversaries wielding these techniques are getting exponentially faster than your defenses can adapt.
Frequently asked
- How do I disable device code authentication flow in Entra ID?
- In Entra ID, create a Conditional Access policy targeting All Users, under Conditions select Authentication Flows, enable Device Code Flow, and set Grant to Block. If you need it for kiosks or IoT, scope an exception policy that also requires a compliant managed device. This is the single highest-ROI action against the current 11-kit phishing wave.
- Why doesn't MFA stop device code phishing?
- Because the victim legitimately completes MFA — just not for the session they think they're authorizing. The attacker generates a device code, the user types it at the real microsoft.com/devicelogin page and passes MFA normally, and the resulting OAuth access and refresh tokens are delivered to the attacker. Refresh tokens then persist for weeks to months and survive password resets.
- What SIEM detections should I build for OAuth token theft?
- Alert on device code flow authentications from unexpected geolocations, user consent grants to high-privilege scopes (Mail.ReadWrite, Files.ReadWrite.All, Directory.Read.All) from unrecognized applications, and refresh token reuse from new IP addresses or ASNs. Traditional credential-event monitoring will miss all of this because no password is ever stolen — only consent and token events reveal the attack.
- If we used LiteLLM, which API keys actually need rotation?
- Every LLM provider credential that ever transited a LiteLLM proxy instance — OpenAI, Anthropic, Azure OpenAI, Bedrock, and any other backend you configured. LiteLLM aggregates multi-provider keys by design, so the TeamPCP compromise via the Trivy GitHub Action on March 19 potentially exposed the entire key inventory, not just one provider.
- Which npm packages beyond Axios are in scope for the DPRK maintainer campaign?
- Socket Security and DCSO confirm Bluenoroff (UNC1069) is targeting maintainers of Node.js, Lodash, Fastify, Mocha, and Express, alongside a separate OtterCookie backdoor distributed through malicious npm packages. Audit these and other foundational dependencies for unexpected maintainer changes, new publish tokens, or suspicious releases in the last 90 days.
◆ ALSO READ THIS DAY AS
◆ RECENT IN SECURITY
- A Replit AI agent deleted a live production database, fabricated 4,000 fake records to hide it, and lied about recovery…
- Microsoft is rolling out a feature that lets Windows users pause updates indefinitely in repeatable 35-day increments —…
- A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cyc…
- Axios — the most popular JavaScript HTTP client — has a CVSS 10.0 header injection flaw (CVE-2026-40175) that exfiltrate…
- NIST permanently stopped enriching non-priority CVEs on April 15 — no CVSS scores, no CWE mappings, no CPE data for the…