Saturday, December 13, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Saturday's vulnerability landscape shows nine critical vulnerabilities (CVSS 9.0+), a 31% decrease from Friday's thirteen issues, while high-priority disclosures increased to 100 CVEs representing a 32% increase. The actively exploited vulnerability count expanded to eleven issues including newly added Sierra Wireless AirLink ALEOS and additional Android Framework entries. Notable critical vulnerabilities include WordPress plugin arbitrary file deletion (CVE-2025-14344), Apache insufficiently protected credentials (CVE-2025-58130), and Dormakaba Saflok physical access control system vulnerabilities (CVE-2024-58311). Zero patch availability across all 109 vulnerabilities continues to require compensating controls and enhanced weekend monitoring given reduced staffing levels.

  • Nine critical vulnerabilities (CVSS 9.0+), a 31% decrease from Friday's thirteen critical issues
  • 100 high-priority vulnerabilities (CVSS 7.0-8.9), a 32% increase from Friday's 76 issues
  • Eleven actively exploited vulnerabilities requiring priority remediation, including newly cataloged Sierra Wireless AirLink and additional Android Framework entries
  • Zero patch availability across all 109 vulnerabilities requires implementation of compensating controls
  • Critical infrastructure affected: Dormakaba Saflok physical access systems, OpenPLC SCADA, D-Link network devices
  • WordPress ecosystem vulnerabilities include Gravity Forms plugin arbitrary file deletion and LazyTasks privilege escalation

Immediate action: Security teams should prioritize the eleven actively exploited vulnerabilities, particularly the newly cataloged Sierra Wireless AirLink ALEOS and Android Framework issues. Organizations using Dormakaba Saflok physical access systems, OpenPLC SCADA, or D-Link network devices should implement network segmentation and enhanced monitoring. Given zero patch availability and weekend staffing reductions, teams should establish clear escalation procedures and ensure monitoring coverage for critical infrastructure systems.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation