Monday, March 2, 2026

Today's Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Today's Security Brief

Monday's vulnerability disclosures reveal 3 critical-severity flaws affecting Changing IDExpert Windows Logon Agent and e-Excellence U-Office Force, all scoring CVSS 9.8. Critical CVE count rose from 0 to 3 compared to the prior day, while high-priority vulnerabilities dropped 57% from 35 to 15. CVE-2026-2999 and CVE-2026-3000 target Changing IDExpert's Windows Logon Agent, and CVE-2026-3422 impacts e-Excellence U-Office Force, each enabling potential remote code execution or authentication bypass. Active exploitation spans 17 vulnerabilities across Microsoft Windows, Microsoft Office, Apple OS, Google Chromium, GitLab, Roundcube Webmail, and Notepad++, indicating broad targeting of enterprise infrastructure and productivity tools. No patches are currently available for the newly disclosed CVEs, requiring organizations to prioritize compensating controls and monitoring.

  • Changing IDExpert Windows Logon Agent affected by two CVSS 9.8 critical vulnerabilities (CVE-2026-2999, CVE-2026-3000) enabling potential authentication bypass
  • Critical CVE count increased from 0 to 3 (+100%), including e-Excellence U-Office Force CVE-2026-3422 at CVSS 9.8
  • High-priority CVEs declined 57% from 35 to 15, narrowing the day's disclosure scope to fewer but more severe issues
  • Active exploitation observed across Microsoft Windows, Office, Apple OS, Google Chromium, GitLab, and Roundcube Webmail, spanning remote code execution and privilege escalation vectors
  • Patch availability at 0% for newly disclosed CVEs β€” compensating controls and network segmentation recommended
  • 17 vulnerabilities confirmed actively exploited, including legacy CVEs dating back to 2008 and 2020

Immediate action: Prioritize review of Changing IDExpert Windows Logon Agent and e-Excellence U-Office Force deployments, applying network segmentation and access restrictions until patches are released. Monitor for exploitation activity targeting Microsoft Windows, Apple OS, Google Chromium, and Roundcube Webmail, and apply any available vendor mitigations for the 17 actively exploited vulnerabilities.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation