Sunday, March 15, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Sunday's disclosures highlight 13 actively exploited vulnerabilities affecting enterprise infrastructure from Ivanti, Broadcom VMware, Qualcomm, and Apple. No new critical-severity CVEs were published, a sharp drop from Saturday's 9, while 40 high-priority vulnerabilities were disclosed, down 60% from the prior day's 100. Notably, CVE-2026-1603 targets Ivanti Endpoint Manager, CVE-2026-22719 affects VMware Aria Operations, and CVE-2026-25108 impacts Soliton FileZen, all carrying CVSS 9.5 scores under active exploitation. Attack patterns include remote code execution and authentication bypass across endpoint management platforms, network appliances, and mobile chipsets. No patches are currently available for Sunday's disclosures, requiring defenders to apply compensating controls and monitor vendor advisories closely.

  • Ivanti Endpoint Manager (CVE-2026-1603) and VMware Aria Operations (CVE-2026-22719) under active exploitation with CVSS 9.5 scores
  • Zero critical CVEs disclosed, down from 9 the prior day (-100%)
  • 40 high-priority vulnerabilities published, a 60% decrease from Saturday's 100
  • RCE and authentication bypass patterns dominate across endpoint management, automation platforms (n8n), and Qualcomm chipsets
  • 0% patch availability across Sunday's disclosures; compensating controls recommended
  • 13 vulnerabilities confirmed actively exploited, including legacy issues in Hikvision and Rockwell products dating to 2017 and 2021

Immediate action: Prioritize reviewing exposure to Ivanti Endpoint Manager, VMware Aria Operations, Soliton FileZen, and Apple products, as all have confirmed active exploitation at CVSS 9.5. With no patches currently available, apply network segmentation, restrict administrative access, and monitor vendor channels for emergency updates.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation