Tuesday, February 10, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Yesterday's disclosures include 15 critical-severity CVEs (CVSS 9.0+), a 114% increase from the prior day's 7 critical issues. High-priority vulnerabilities (CVSS 7.0-8.9) rose modestly to 81, a 13% increase over the previous 72. Sixteen actively exploited vulnerabilities remain on the CISA KEV catalog, including CVE-2026-20045 affecting Cisco Unified Communications Manager, CVE-2025-68645 targeting Zimbra Collaboration Suite, and CVE-2024-37079 in VMware vCenter Server. Notable critical disclosures include CVE-2026-0488 (CVSS 9.9) in SAP CRM, CVE-2026-1868 (CVSS 9.9) in GitLab, and CVE-2026-22903 (CVSS 9.8) in lighttpd. Patch availability stands at 0%, requiring organizations to prioritize compensating controls and monitoring until vendor remediations are released.

  • 15 critical-severity CVEs disclosed, up 114% from 7 the prior day
  • 81 high-priority CVEs (CVSS 7.0-8.9), a 13% increase from 72
  • 16 actively exploited KEV entries including Cisco, Zimbra, VMware vCenter, Microsoft Office, and FreePBX
  • 0% patch availability across all 96 disclosed CVEs β€” compensating controls recommended
  • SAP (CRM, NetWeaver), GitLab, lighttpd, and Agentflow among the most affected products in critical disclosures

Immediate action: Organizations running SAP CRM, SAP NetWeaver, GitLab, Cisco Unified Communications Manager, Zimbra, and VMware vCenter Server should assess exposure immediately and apply network-level mitigations. With 0% patch availability, implement compensating controls such as network segmentation, enhanced logging, and access restrictions for affected systems until vendor patches are released.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation