Tuesday, February 3, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Yesterday's CVE disclosures included 14 critical vulnerabilities (CVSS 9.0+), a 180% increase from the prior day's 5 critical issues. High-priority vulnerabilities (CVSS 7.0-8.9) totaled 73, representing a 204% increase from the previous 24. Eleven vulnerabilities are actively exploited, including CVE-2026-20045 affecting Cisco Unified Communications Manager, CVE-2025-68645 in Zimbra Collaboration Suite, and CVE-2024-37079 targeting VMware vCenter Server. Notable critical disclosures include CVE-2026-25142 (CVSS 10.0) in SandboxJS, CVE-2026-22778 (CVSS 9.8) affecting vLLM inference engine, and CVE-2026-21509 (CVSS 9.5) impacting Microsoft Office. Patch availability currently stands at 0%, requiring organizations to implement compensating controls while monitoring for vendor updates.

  • 14 critical CVEs disclosed (180% increase from prior day's 5)
  • 73 high-priority CVEs identified (204% increase from 24)
  • 11 actively exploited vulnerabilities including Cisco, Zimbra, VMware, and Microsoft products
  • 0% patch availability across disclosed vulnerabilities
  • Affected systems include enterprise communications (Cisco UCM), collaboration suites (Zimbra), virtualization platforms (VMware vCenter), and productivity software (Microsoft Office)

Immediate action: Organizations using Cisco Unified Communications Manager, Zimbra Collaboration Suite, VMware vCenter Server, and Microsoft Office should prioritize assessment and implement network segmentation or access restrictions as compensating controls. Monitor vendor security advisories for patch releases, as no fixes are currently available for yesterday's disclosures.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation