Monday, February 16, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

๐ŸŽฏ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Monday's vulnerability disclosures center on multiple Microsoft Windows and Office flaws alongside critical smart home infrastructure weaknesses in eNet SMART HOME servers. The brief includes 4 critical-severity CVEs (up 33% from Sunday) and 10 high-priority issues (down 63%), reflecting a lighter but more concentrated disclosure day. Notable critical entries include CVE-2026-26369 and CVE-2026-26366, both CVSS 9.8 remote code execution flaws in eNet SMART HOME servers, alongside CVE-2026-1490 (CVSS 9.8) targeting WordPress installations. Microsoft dominates the actively exploited category with six Windows and Office vulnerabilities confirmed under exploitation, while legacy flaws in GitLab, FreePBX, and Notepad++ also appear on the KEV list. No patches are currently available for disclosed vulnerabilities, making compensating controls and network segmentation essential in the interim.

  • Microsoft Windows and Office account for 6 of 14 actively exploited vulnerabilities, including CVE-2026-21513 and CVE-2026-21514
  • 4 critical-severity CVEs disclosed (CVSS 9.0+), a 33% increase from Sunday's 3
  • 10 high-priority CVEs (CVSS 7.0โ€“8.9), down 63% from Sunday's 27
  • Remote code execution dominates attack patterns, affecting eNet SMART HOME servers (CVE-2026-26369, CVE-2026-26366) and WordPress (CVE-2026-1490)
  • 0% patch availability across all disclosed CVEs โ€” no vendor fixes released yet
  • 14 CVEs flagged as actively exploited, including legacy issues in GitLab CE/EE and Sangoma FreePBX

Immediate action: Prioritize reviewing Microsoft Windows and Office systems for exposure to the six actively exploited vulnerabilities, and isolate any eNet SMART HOME server deployments until patches are available. With 0% patch availability, apply network segmentation, restrict unnecessary access, and monitor for exploitation indicators across all affected products.

๐Ÿ’ก Tip: Swipe CVE cards left to โญ star, right to โŒ remove

Section Navigation