Thursday, March 12, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Thursday's vulnerability disclosures include 24 critical and 100 high-priority CVEs across major enterprise platforms, with two maximum-severity (CVSS 10.0) flaws in Microsoft Azure Entra (CVE-2026-31957) and Apple App Store (CVE-2026-31852) requiring immediate attention. Critical CVE volume decreased slightly from 25 to 24 (-4%), while high-priority disclosures held steady at 100. Additional critical vulnerabilities affect Zoom Workplace (CVE-2026-30903, CVSS 9.6), Kubernetes Argo Workflows (CVE-2026-28229, CVSS 9.8), and HP products (CVE-2026-27591, CVSS 9.9). Attack patterns span remote code execution, authentication bypass, and privilege escalation across cloud infrastructure, mobile platforms, and enterprise management tools. No patches are currently available for these disclosures; organizations should implement compensating controls and monitor vendor advisories closely.

  • Two CVSS 10.0 vulnerabilities disclosed in Microsoft Azure Entra (CVE-2026-31957) and Apple App Store (CVE-2026-31852)
  • 24 critical CVEs disclosed, down slightly from 25 the prior day (-4%)
  • 100 high-priority CVEs disclosed, unchanged from the prior day
  • RCE and authentication bypass patterns affect Zoom Workplace, Kubernetes Argo Workflows, HP products, and WordPress plugins
  • 0% patch availability across all disclosed vulnerabilities; compensating controls recommended
  • 13 actively exploited vulnerabilities including Roundcube Webmail, Ivanti EPM, VMware Aria Operations, and Qualcomm chipsets

Immediate action: Prioritize assessment of Microsoft Azure Entra, Apple App Store, Zoom Workplace, and Kubernetes Argo Workflows environments for exposure to the maximum-severity flaws disclosed this cycle. With no patches currently available, apply network segmentation, restrict access to affected services, and enable enhanced logging while monitoring vendor channels for remediation guidance.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation