<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="/rss-styles.xsl" type="text/xsl"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Postinstall Dispatch</title><description>A weekly brief for the security-adjacent practitioner. What to patch today, what to investigate this week, what to add to the monthly review. Short items, clear actions, no vendor pitch.</description><link>https://postinstall.dev/</link><language>en-us</language><copyright>Personal work by Steven Lorenz. All rights reserved.</copyright><item><title>Dispatch 001: The first dispatch: A Fortinet EMS advisory, an Acrobat zero-day, and a Looming Secure Boot deadline</title><link>https://postinstall.dev/weekly/dispatch-001/</link><guid isPermaLink="true">https://postinstall.dev/weekly/dispatch-001/</guid><description>Three actively-exploited flaws in software every SMB runs (Fortinet EMS, Adobe Reader, Chrome), a Microsoft 365 device-code phishing wave that walks past MFA, and the Secure Boot cert deadline that&apos;ll get you before you notice it.</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><content:encoded>&lt;h2&gt;Patch today&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;&lt;h3&gt;CVE-2026-35616 + CVE-2026-21643 in Fortinet FortiClient EMS, both actively exploited&lt;/h3&gt;&lt;p&gt;&lt;em&gt;Patch FortiClient EMS today. If it&amp;apos;s reachable from the internet, that&amp;apos;s the actual problem.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why it matters:&lt;/strong&gt; If your MSP runs your Fortinet and hasn&amp;apos;t called you about this one yet, that&amp;apos;s its own finding. EMS is the management server that pushes policy to every endpoint agent you own, and it has an unauthenticated RCE being actively exploited right now. The federal patch deadline was last Thursday. Meanwhile, roughly two thousand of these are sitting on the open internet because somewhere along the way, someone decided the management plane didn&amp;apos;t need to be behind anything. It does.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to do:&lt;/strong&gt; Push the 7.4.5/7.4.6 hotfix through to the EMS host before lunch, or jump to 7.4.7 when it lands. If the EMS web interface answers to anything outside your office or VPN subnets, ACL it down to those today and while that should have been the case in 2023, fix it now. Then pull the EMS auth log and look for admin accounts or API tokens created since March 31. On 7.4.4? You have the sibling bug (CVE-2026-21643), same urgency, same window.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://fortiguard.fortinet.com/psirt/FG-IR-26-099&quot;&gt;Fortinet PSIRT advisory&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;h3&gt;CVE-2026-34621 in Adobe Acrobat Reader, exploited in the wild since December&lt;/h3&gt;&lt;p&gt;&lt;em&gt;Patch Acrobat on every endpoint. This has been a live zero-day since December and you just didn&amp;apos;t know.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why it matters:&lt;/strong&gt; A crafted PDF runs code on the endpoint. Adobe patched it yesterday. The exploit&amp;apos;s been in the wild since December. Four months where Acrobat was quietly shipping a zero-day and nobody knew except the people using it. Every SMB has Acrobat. Every SMB&amp;apos;s users open PDFs from strangers with subject lines like &amp;apos;Invoice_Q1_FINAL.pdf.&amp;apos; You know how this ends.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to do:&lt;/strong&gt; Push the update through your RMM today. If you&amp;apos;re on Kaseya, NinjaOne, or Datto, the patch is already in the catalog so just approve it and send it. If you&amp;apos;re still doing Acrobat updates by hand across fifteen endpoints on a Sunday, the patch is half the problem and we should talk about the other half separately. As a stopgap for anything still unpatched: set Protected View to &amp;apos;All files&amp;apos; in Preferences &amp;gt; Security (Enhanced). And drop in a detection method if you have the capability, if acrobat.exe or acrord32.exe ever spawns cmd, powershell, or wscript, that is not a false positive. Alternatively, Microsoft provided ASR rules cover this pattern.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://helpx.adobe.com/security/products/acrobat.html&quot;&gt;Adobe Acrobat security bulletin&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;h3&gt;Chrome CVE-2026-5281 and CVE-2026-5289, both actively exploited, CISA deadline April 15&lt;/h3&gt;&lt;p&gt;&lt;em&gt;Force-relaunch Chrome to 146.0.7680.178 fleet-wide. Federal deadline is tomorrow. Actively exploited. You&amp;apos;re out of runway.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why it matters:&lt;/strong&gt; Two use-after-free bugs, both under active exploitation. 5289 is a full sandbox escape, which means a user visits a bad page and the attacker owns the endpoint — no click, no download, no warning. Here&amp;apos;s the uncomfortable part: Chrome updates on relaunch, and half your users haven&amp;apos;t relaunched Chrome since February. The fix has been sitting there for — what, almost two weeks now? — ready, ignored. If your security posture leans on &amp;apos;Chrome auto-updates, we&amp;apos;re fine,&amp;apos; this is your reminder that auto-update is a promise, not a control.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to do:&lt;/strong&gt; Push 146.0.7680.178 through whatever manages your browsers: Intune, GPO, Chrome Browser Cloud Management, or Workspace. Set RelaunchNotification to &amp;apos;Required&amp;apos; with a 24-hour window so the user physically cannot keep dismissing the prompt. Same story for Edge, Brave, Opera, and Vivaldi since these are all Chromium, all shipped fixes, and all waiting on a relaunch. If any of your users run Chrome as a local admin, fix that today too.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html&quot;&gt;Chrome Releases blog&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;This week&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;&lt;h3&gt;EvilTokens / Microsoft device-code phishing campaign bypassing MFA at scale&lt;/h3&gt;&lt;p&gt;&lt;em&gt;Block device code flow in Conditional Access this week. Your MFA will not save you from this one.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why it matters:&lt;/strong&gt; The attack doesn&amp;apos;t steal a password. It doesn&amp;apos;t fake a login page. It asks the user to type a code on the real microsoft.com/devicelogin, the actual Microsoft domain, and in doing so authorizes the attacker&amp;apos;s session. MFA fires, the user approves it (it&amp;apos;s Microsoft!), and the token lands in a criminal&amp;apos;s hands. Once in, attackers register persistent devices inside ten minutes and set inbox rules to forward anything with &amp;apos;payroll&amp;apos; or &amp;apos;invoice&amp;apos; in the subject. The reason this works in SMB tenants specifically: device code flow is on by default, almost nobody uses it legitimately, and very few are actually turning it off.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to do:&lt;/strong&gt; Block device code flow tenant-wide in Conditional Access. Policy: Users = All, Cloud apps = All, Conditions &amp;gt; Authentication flows &amp;gt; Block device code flow. Pilot on a small group for 24 hours in case you have one weird IoT or kiosk scenario (you probably don&amp;apos;t), then enforce everywhere. While you&amp;apos;re in the tenant: filter Entra sign-in logs to authenticationProtocol = deviceCode for the last 30 days. If anything listed the results that isn&amp;apos;t quickly explainable, or a legitimate flow, you have an incident. Then check Enterprise Applications for OAuth apps consented since March 1 that you don&amp;apos;t recognize. Revoke, block, write down what you found, and sleep slightly better.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-block-authentication-flows&quot;&gt;Microsoft Learn: block device code flow&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;h3&gt;Microsoft Patch Tuesday drops Tuesday April 14, so prep your rings now&lt;/h3&gt;&lt;p&gt;&lt;em&gt;Pilot ring this week, production by SLA. Do not skip the pilot.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why it matters:&lt;/strong&gt; Q1 averaged 85 CVEs a month with nine actively-exploited zero-days across the quarter, and the April forecast is 80-100+ including a Windows 11 24H2/25H2 critical. The cycle also keeps rolling the Secure Boot replacement certs (see the monthly item). The actual risk here isn&amp;apos;t the patches themselves but the pattern since February: patch ships, patch breaks Outlook or Teams, SMBs hold off, SMBs forget. By the time April gets deployed in mid-May, May&amp;apos;s cycle lands on top of it. This is how fleets end up three cycles behind and nobody is quite sure when it started.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to do:&lt;/strong&gt; Today: confirm the pilot ring actually exists and is healthy (yes, that is the hard part), and that the April maintenance window is on the calendar. Wednesday April 15: deploy to pilot, watch for Outlook-Classic and Teams add-in regressions. Microsoft flagged both in the pre-release notes, so at least you know where to look. Then on schedule: production, if pilot is clean. Do not skip the pilot. February broke things. March broke things. Nothing about April suggests it&amp;apos;s the cycle that finally doesn&amp;apos;t.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://msrc.microsoft.com/update-guide/&quot;&gt;Microsoft Security Update Guide&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;Monthly or quarterly review&lt;/h2&gt;&lt;ol&gt;&lt;li&gt;&lt;h3&gt;Secure Boot 2011 certificates expire June 26, 2026. Don&amp;apos;t procrastinate, as that is only 75 days out&lt;/h3&gt;&lt;p&gt;&lt;em&gt;Inventory your fleet by OEM this month. Plan firmware deployment for May. Use June as your cleanup buffer, not the initial deployment runway.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why it matters:&lt;/strong&gt; Nobody&amp;apos;s telling you about this yet because it doesn&amp;apos;t cause pain until June, and security news doesn&amp;apos;t do June in April. The short version: the Secure Boot root certs Microsoft issued in 2011 expire June 26. Windows Update is shipping the replacements, which handles the easy half. The other half is OEM firmware updates across all of your hardware providers. Each of those vendors has their own portal, their own update tool, and their own opinions about what still qualifies for support. The portal logins alone will eat a day. This is the exact kind of thing that&amp;apos;s easy in April and a disaster in late June.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to do:&lt;/strong&gt; At your next tenant/fleet review (you know, on the quarterly calendar) and if you don&amp;apos;t have one scheduled, schedule one and pull the Secure Boot readiness report (Microsoft&amp;apos;s playbook is linked below). Inventory devices by OEM and model. For each OEM, find the current firmware advisory and flag any device that hasn&amp;apos;t taken February through April&amp;apos;s Windows cumulative updates plus the matching firmware update. Plan the firmware push for May. If any device on the list is out of OEM support, that&amp;apos;s a replacement conversation, not a patch conversation. Better to have that conversation now than on June 25.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://learn.microsoft.com/en-us/windows/security/operating-system-security/system-security/secure-boot-certificate-expiration&quot;&gt;Microsoft Secure Boot certificate playbook&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;&lt;/ol&gt;</content:encoded><author>Steven Lorenz</author></item></channel></rss>