Friday, May 22, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Friday's vulnerability landscape is led by three maximum-severity (CVSS 10) flaws in Ubiquiti UniFi OS and multiple critical WordPress plugin issues affecting widely deployed infrastructure. Critical CVE volume rose 10% to 11, while high-priority disclosures climbed 45% to 64, indicating broader product impact across the disclosure cycle. Notable critical entries include CVE-2026-34908/34909/34910 in Ubiquiti UniFi OS, CVE-2026-48207 in Apache Fory PyFory, and CVE-2026-5433 in Honeywell Control Network. Attack patterns skew toward remote code execution and authentication bypass against network appliances, endpoint security platforms, and content management systems. Patches are not yet broadly published for today's disclosures, so defenders should prioritize compensating controls and monitor vendor advisories closely.

  • Three CVSS 10 vulnerabilities in Ubiquiti UniFi OS (CVE-2026-34908, 34909, 34910) affecting network infrastructure
  • Critical CVEs up 10% day-over-day to 11, including WordPress plugin flaws CVE-2026-6960 and CVE-2026-5118 at CVSS 9.8
  • High-priority disclosures up 45% to 64, reflecting wider product exposure across vendors
  • Trend Micro Apex One Management Console hit by twin CVSS 9.8 flaws (CVE-2025-71210, CVE-2025-71211) enabling remote compromise
  • Apache Fory PyFory deserialization issue (CVE-2026-48207, CVSS 9.8) threatens Python-based data pipelines
  • 10 actively exploited CVEs tracked, including CVE-2026-42897 in Microsoft and CVE-2026-34926 in Trend Micro Apex One

Immediate action: Prioritize Ubiquiti UniFi OS, Trend Micro Apex One, and WordPress plugin environments for immediate review, as these carry the highest combination of severity and exposure. With 0% patch availability reported for today's disclosures, restrict management interface exposure, apply vendor-provided mitigations, and monitor advisories for forthcoming fixes.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation