Thursday, February 26, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Thursday's vulnerability disclosures reveal 8 critical and 100 high-priority CVEs affecting major cloud providers, network infrastructure, and enterprise software. Critical CVE count dropped 62% from the prior day's 21, while high-priority disclosures rose 27% from 79 to 100. Notable critical vulnerabilities include CVE-2026-27597 (CVSS 10.0) in Enclave VM, CVE-2026-27702 (CVSS 9.9) exposing AWS keys, and CVE-2026-27941 (CVSS 9.9) in Google Cloud services. Microsoft Windows and Office products dominate the actively exploited landscape, with multiple confirmed exploitation chains targeting Windows kernel and Office components alongside a Cisco Catalyst SD-WAN vulnerability rated CVSS 10.0. No patches are currently available for the disclosed vulnerabilities, requiring organizations to prioritize compensating controls and network-level mitigations.

  • Enclave VM CVE-2026-27597 rated CVSS 10.0 — maximum severity with potential full system compromise
  • 8 critical CVEs disclosed, down 62% from prior day's 21, spanning AWS, Google Cloud, HP, and Acer products
  • 100 high-priority CVEs disclosed, up 27% from 79, indicating broadening attack surface across enterprise software
  • Cloud infrastructure and healthcare software heavily affected — AWS key exposure (CVE-2026-27702) and dual OpenEMR vulnerabilities (CVE-2026-24908, CVE-2026-24849) both at CVSS 9.9
  • 0% patch availability across all disclosed vulnerabilities — no vendor fixes currently released
  • 19 actively exploited vulnerabilities confirmed, including 6 targeting Microsoft Windows and a Cisco Catalyst SD-WAN flaw at CVSS 10.0

Immediate action: Prioritize network segmentation and access controls for AWS, Google Cloud, Cisco SD-WAN, and Microsoft Windows environments where active exploitation is confirmed. With 0% patch availability, implement compensating controls including WAF rules, privilege restrictions, and enhanced monitoring for exploitation indicators across affected cloud services and endpoint systems.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation