Wednesday, November 19, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Wednesday's vulnerability landscape demonstrates continued disclosure activity with 6 critical vulnerabilities (50% increase from yesterday's 4) and 86 high-priority vulnerabilities (69% increase from 51). The primary concerns include three CVSS 9.8 vulnerabilities enabling unauthenticated remote code execution across multiple affected devices, alongside three CVSS 9.1 vulnerabilities in SolarWinds Serv-U requiring administrative privileges for exploitation. Patch availability improved modestly to 10% from yesterday's 7%, requiring organizations to maintain compensating controls for the majority of newly disclosed vulnerabilities. Ten actively exploited CISA KEV vulnerabilities continue to require priority remediation across VMware, Fortinet, Microsoft, and Samsung products.

  • Critical vulnerability count increased 50% from 4 to 6 CVEs, with three unauthenticated remote code execution vulnerabilities rated CVSS 9.8
  • CVE-2025-41734 (CVSS 9.8) enables unauthenticated remote attackers to execute arbitrary PHP files and gain full device access
  • CVE-2025-9312 (CVSS 9.8) exposes missing authentication enforcement in mutual TLS implementations across affected devices
  • High-priority vulnerabilities increased 69% from 51 to 86 CVEs, indicating sustained midweek disclosure activity
  • Patch availability improved to 10% (up from 7%), requiring continued deployment of WAF rules, network segmentation, and access restrictions for unpatched vulnerabilities
  • Ten actively exploited CISA KEV vulnerabilities require continued priority remediation, including VMware Aria Operations, Fortinet FortiWeb, and Microsoft Windows flaws

Immediate action: Security teams must immediately address the three unauthenticated remote code execution vulnerabilities (CVE-2025-41734, CVE-2025-9312, CVE-2025-41733) by applying vendor patches where available or implementing network segmentation and access controls. Organizations running SolarWinds Serv-U should evaluate the three CVSS 9.1 vulnerabilities (CVE-2025-40547, CVE-2025-40548, CVE-2025-40549) and restrict administrative access as a compensating control. With 90% of new vulnerabilities lacking vendor patches, implement Web Application Firewalls with command injection and authentication bypass detection rules. Continue priority remediation of the ten actively exploited vulnerabilities while monitoring for the six new critical disclosures.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation