Tuesday, April 14, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Tuesday's disclosures reveal 19 critical vulnerabilities spanning SAP, Talend, HP, Totolink, and GitHub Actions, with SAP Business Planning carrying the highest severity at CVSS 9.9. Critical CVEs increased 36% from the prior day's 14, while high-priority vulnerabilities rose 61% to 87. CVE-2026-27681 affects SAP Business Planning with near-maximum severity, CVE-2026-6264 impacts Talend across multiple products, and CVE-2026-6138 targets Totolink A7100RU routersβ€”all scoring CVSS 9.8 or above. Nine vulnerabilities have confirmed active exploitation, including Fortinet FortiClient EMS, Google Dawn, Microsoft Exchange Server, and Adobe Acrobat. No vendor patches are currently available for the newly disclosed vulnerabilities, requiring organizations to prioritize compensating controls and network segmentation.

  • SAP Business Planning CVE-2026-27681 rated CVSS 9.9β€”highest severity in today's disclosures
  • 19 critical CVEs disclosed, up 36% from 14 the prior day
  • 87 high-priority CVEs, a 61% increase over the prior day's 54
  • Remote code execution and object deserialization flaws affect Talend, HP, and Totolink networking equipment
  • Patch availability stands at 0% for newly disclosed vulnerabilitiesβ€”compensating controls recommended
  • 9 actively exploited vulnerabilities span Fortinet, Google, Microsoft, and Adobe products

Immediate action: Prioritize network-level mitigations for SAP Business Planning, Talend, Totolink routers, and HP systems where critical unpatched vulnerabilities exist. For the nine actively exploited flaws in Fortinet FortiClient EMS, Google Dawn, Microsoft Exchange Server, and Adobe Acrobat, verify exposure and apply any available vendor advisories or workarounds immediately, as no patches have been released for the newly disclosed issues.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation