Sunday, March 22, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Sunday's vulnerability disclosures include 2 critical and 93 high-priority CVEs, a significant reduction from Saturday's 20 critical findings. Ivanti Endpoint Manager (CVE-2026-1603), Broadcom VMware Aria Operations (CVE-2026-22719), and Google Chrome components (CVE-2026-3910, CVE-2026-3909) are among the most notable new entries with active exploitation confirmed. Legacy vulnerabilities in Apple, Hikvision, and Rockwell products continue to see exploitation activity, underscoring persistent risk from unpatched older flaws. Infor WebCTRL (CVE-2026-24060, CVSS 9.1) presents a critical building automation risk, while Qualcomm chipset vulnerabilities affect a broad mobile device footprint. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring until vendor fixes are released.

  • Ivanti EPM, VMware Aria Operations, and Google Chrome/Skia under active exploitation with CVSS 9.5 ratings
  • Critical CVE count dropped to 2, down 90% from Saturday's 20 critical disclosures
  • 93 high-priority vulnerabilities disclosed, a 7% decrease from the prior day
  • Remote code execution and authentication bypass patterns dominate, affecting n8n, Craft CMS, Laravel Livewire, and Wing FTP Server
  • 0% patch availability across all disclosed CVEs β€” compensating controls and network segmentation recommended
  • 19 actively exploited vulnerabilities spanning Apple, Qualcomm, Hikvision, and Rockwell legacy products

Immediate action: Prioritize network-level mitigations for Ivanti EPM, VMware Aria Operations, and Google Chrome components given confirmed active exploitation. With 0% patch availability, implement compensating controls including network segmentation, enhanced monitoring, and restricting access to affected services until vendor patches are released.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation