Wednesday, February 18, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

๐ŸŽฏ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Wednesday's vulnerability disclosures include 7 critical and 48 high-priority CVEs affecting Microsoft Windows, Dell RecoverPoint, WordPress, and Linux systems. Critical CVE volume increased 250% from the prior day while high-priority disclosures nearly doubled with a 92% rise. CVE-2026-22769 carries a maximum CVSS 10 score targeting Dell RecoverPoint, CVE-2026-1937 affects WordPress installations with a 9.8 rating, and CVE-2025-70830 exposes Datart instances using the Freemarker engine at CVSS 9.9. Multiple Microsoft Windows and Office CVEs are confirmed actively exploited, alongside older vulnerabilities in GitLab, Zimbra, and Sangoma FreePBX being leveraged in ongoing campaigns. No vendor patches have been released yet for the newly disclosed vulnerabilities, making compensating controls and network segmentation essential in the interim.

  • Dell RecoverPoint CVE-2026-22769 rated CVSS 10 โ€” maximum severity with potential for full system compromise
  • 7 critical CVEs disclosed, a 250% increase over the prior day's 2 critical vulnerabilities
  • 48 high-priority CVEs represent a 92% jump from the previous day's 25 high-severity disclosures
  • Remote code execution and authentication bypass patterns dominate, affecting WordPress, Linux kernel, and Datart deployments
  • 0% patch availability across all newly disclosed CVEs โ€” no vendor fixes released at time of publication
  • 18 actively exploited vulnerabilities span Microsoft Windows and Office, Apple OS, Google Chromium, and legacy systems including Zimbra and FreePBX

Immediate action: Prioritize reviewing exposure to Microsoft Windows and Office, Dell RecoverPoint, WordPress, and Apple systems where active exploitation is confirmed. With no patches currently available for newly disclosed vulnerabilities, implement network segmentation, restrict access to affected services, and monitor for indicators of compromise as an interim mitigation strategy.

๐Ÿ’ก Tip: Swipe CVE cards left to โญ star, right to โŒ remove

Section Navigation