Thursday, February 19, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Thursday's vulnerability disclosures are dominated by multiple critical HP product vulnerabilities and a CVSS 10.0 Dell RecoverPoint flaw under active exploitation. The disclosure volume includes 20 critical CVEs (up 186% from the prior day) and 82 high-priority vulnerabilities (up 71%), reflecting a significant escalation in disclosed risk. Notable critical entries include CVE-2026-27175, CVE-2026-27174, and CVE-2026-27180 affecting HP products with CVSS 9.8 scores, alongside CVE-2026-1937 targeting WordPress. Microsoft Windows and Office account for six actively exploited vulnerabilities, with additional confirmed exploitation in GitLab, Apple OS, and Google Chromium. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring for all affected systems.

  • Dell RecoverPoint CVE-2026-22769 carries a perfect CVSS 10.0 score with confirmed active exploitation
  • 20 critical CVEs disclosed, a 186% increase over the prior day's 7 critical vulnerabilities
  • 82 high-priority CVEs represent a 71% increase from the previous day's 48 high-priority disclosures
  • HP products account for at least 7 critical vulnerabilities with CVSS 9.4-9.8, indicating widespread exposure across HP environments
  • Microsoft Windows and Office have 6 actively exploited CVEs spanning remote code execution and privilege escalation vectors
  • 0% patch availability across all 102 disclosed CVEs; 20 vulnerabilities have confirmed active exploitation

Immediate action: Prioritize Dell RecoverPoint, HP product lines, Microsoft Windows, and Microsoft Office for immediate review and apply compensating controls such as network segmentation and enhanced monitoring. With no patches currently available for any of the 102 disclosed vulnerabilities, organizations should implement detection rules for known exploitation patterns and restrict access to affected services until vendor remediations are released.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation