Tuesday, February 17, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

๐ŸŽฏ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Tuesday's vulnerability disclosures reveal 27 CVEs affecting SAP, Microsoft, Apple, and several open-source projects. Critical disclosures dropped 50% from the prior day to 2, while high-priority CVEs surged 150% to 25. A maximum-severity SAP WhatsApp bridge flaw (CVE-2026-2577, CVSS 10.0) and a critical EFM/iptime router vulnerability (CVE-2026-2550, CVSS 9.8) stand out among the new disclosures. Microsoft Windows and Office account for six actively exploited vulnerabilities, alongside confirmed exploitation targeting GitLab, Sangoma FreePBX, and Apple OS. No patches are currently available for the disclosed CVEs, requiring organizations to prioritize compensating controls and monitoring.

  • SAP WhatsApp bridge CVE-2026-2577 carries a maximum CVSS 10.0 score, representing the most severe disclosure of the day
  • Critical CVE count decreased to 2 from 4 the prior day (-50%), while high-priority CVEs rose sharply to 25 from 10 (+150%)
  • Six Microsoft Windows and Office CVEs are confirmed actively exploited, including CVE-2026-21513, CVE-2026-21525, and CVE-2026-21514
  • Remote code execution and authentication bypass patterns appear across SAP, GitLab, FreePBX, and Notepad++ disclosures
  • Patch availability stands at 0% across all 27 disclosed CVEs, requiring immediate compensating controls
  • 14 CVEs have confirmed active exploitation, spanning Microsoft, Apple, GitLab, Sangoma, and React Native CLI

Immediate action: Prioritize compensating controls for Microsoft Windows and Office systems, SAP WhatsApp bridge integrations, and Apple OS environments where active exploitation is confirmed. With 0% patch availability across all disclosures, implement network segmentation, enhanced monitoring, and access restrictions for affected products until vendor patches are released.

๐Ÿ’ก Tip: Swipe CVE cards left to โญ star, right to โŒ remove

Section Navigation