Wednesday, February 11, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Yesterday's disclosures revealed critical vulnerabilities across SAP, Microsoft, Apache, and WordPress ecosystems, with two CVSS 9.9 flaws affecting SAP CRM and the Catalyst Game Server Platform. The day's 109 total CVEs include 9 critical-severity issues (down 40% from the prior day) and 100 high-priority vulnerabilities (up 23%). Notable critical entries include CVE-2026-0488 in SAP CRM, CVE-2026-26009 in Catalyst Game Server Platform, and CVE-2026-23906 in Apache Druid, all scoring 9.8 or above. Attack patterns center on remote code execution and authentication bypass across enterprise platforms, with 21 vulnerabilities confirmed as actively exploited in the wild, including long-standing flaws in Zimbra Collaboration Suite, VMware vCenter Server, and multiple SmarterMail instances. No patches have been confirmed available at this time, making compensating controls and network segmentation essential for affected systems.

  • Two CVSS 9.9 vulnerabilities disclosed in SAP CRM (CVE-2026-0488) and Catalyst Game Server Platform (CVE-2026-26009)
  • 9 critical-severity CVEs, down 40% from the prior day's 15 critical disclosures
  • 100 high-priority CVEs (CVSS 7.0-8.9), up 23% from 81 the prior day
  • Remote code execution and authentication bypass patterns across WordPress, Apache Druid, Azure SDK, and Agentflow
  • 0% confirmed patch availability across all 109 disclosed vulnerabilities
  • 21 actively exploited vulnerabilities including legacy flaws in FreePBX, Linux kernel, and GitLab dating back to 2018-2021

Immediate action: Prioritize review of SAP CRM, SAP NetWeaver, Microsoft Office, and Microsoft Windows deployments, as these vendors have both critical-severity and actively exploited vulnerabilities in yesterday's disclosures. With no confirmed patches currently available, implement network segmentation, restrict access to affected services, and monitor for indicators of compromise while awaiting vendor advisories.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation