Monday, February 9, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Yesterday's disclosures included 7 critical-severity CVEs (CVSS 9.0+), a 40% increase from the prior day's 5 critical issues. High-priority vulnerabilities (CVSS 7.0-8.9) totaled 72, reflecting an 8% decrease from the previous 78. Sixteen actively exploited vulnerabilities remain on the CISA KEV catalog, spanning Cisco Unified Communications Manager, Zimbra Collaboration Suite, VMware vCenter Server, Microsoft Office, and multiple SmarterTools SmarterMail instances. Notable critical disclosures include CVE-2026-1868 (CVSS 9.9) affecting GitLab, CVE-2026-22903 (CVSS 9.8) in lighttpd, and CVE-2025-15027 (CVSS 9.8) targeting WordPress installations. Patch availability stands at 0%, requiring organizations to prioritize compensating controls and monitoring until vendor remediations are released.

  • 7 critical CVEs disclosed, up 40% from the prior day's 5 critical vulnerabilities
  • 72 high-priority CVEs (CVSS 7.0-8.9), down 8% from the previous 78
  • 16 actively exploited KEV entries spanning Cisco, Zimbra, VMware, Microsoft Office, SmarterMail, and FreePBX
  • 0% patch availability across disclosed vulnerabilities β€” compensating controls recommended
  • GitLab (CVE-2026-1868, CVSS 9.9), lighttpd (CVE-2026-22903, CVSS 9.8), and WordPress (CVE-2025-15027, CVSS 9.8) among top critical issues

Immediate action: Organizations running Cisco Unified Communications Manager, Zimbra, VMware vCenter, Microsoft Office, SmarterMail, GitLab, lighttpd, or WordPress should review exposure to the listed CVEs and apply network-level mitigations. With no patches currently available, implement compensating controls such as access restrictions, enhanced monitoring, and WAF rules for affected systems.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation