Wednesday, March 18, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Wednesday's vulnerability landscape includes 9 critical and 100 high-priority CVEs affecting Oracle Edge Cloud, ConnectWise ScreenConnect, and DrangSoft audit software. Critical disclosures dropped 62% from the prior day's 24, while high-priority CVEs rose 6% to 100. CVE-2026-21994 (CVSS 9.8) targets Oracle Edge Cloud and CVE-2026-4312 (CVSS 9.8) affects DrangSoft GCB/FCB Audit Software, both carrying the highest severity scores in yesterday's disclosures. Attack patterns span remote code execution in jsPDF (CVE-2026-31938) and authentication weaknesses in Wazuh Manager (CVE-2026-25769, CVE-2026-25770), with ConnectWise ScreenConnect (CVE-2026-3564) also requiring attention given its widespread enterprise deployment. No patches are currently available for these disclosures, making network-level mitigations and monitoring essential in the interim.

  • Oracle Edge Cloud (CVE-2026-21994, CVSS 9.8) and DrangSoft GCB/FCB Audit Software (CVE-2026-4312, CVSS 9.8) carry the highest severity ratings
  • 9 critical CVEs disclosed, down 62% from 24 the prior day
  • 100 high-priority CVEs, up 6% from 94 the prior day
  • RCE vectors identified in jsPDF Library and Spinnaker Clouddriver/Orca; authentication weaknesses in Wazuh Manager across two CVEs
  • 0% patch availability across all disclosed CVEs β€” compensating controls and monitoring recommended
  • 13 actively exploited vulnerabilities include Ivanti EPM, VMware Aria Operations, Google Chrome V8, and legacy Hikvision flaws

Immediate action: Prioritize reviewing exposure to Oracle Edge Cloud, ConnectWise ScreenConnect, DrangSoft audit tools, and Wazuh Manager deployments, as these carry the highest severity scores with no patches currently available. Implement network segmentation and enhanced monitoring for systems affected by the 13 actively exploited vulnerabilities, particularly Ivanti EPM, VMware Aria Operations, and Google Chrome components. Monitor vendor advisories closely for patch releases and apply them immediately when available.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation