Thursday, December 25, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

This disclosure includes 29 critical-severity vulnerabilities (CVSS 9.0+), a 32% increase from yesterday's 22 critical CVEs. High-priority vulnerabilities remain steady at 100 entries with no change from the previous day. Twelve actively exploited vulnerabilities require attention, including CVE-2025-14733 affecting WatchGuard Firebox, CVE-2022-37055 targeting D-Link Routers, CVE-2025-6218 in RARLAB WinRAR, and CVE-2025-62221 impacting Microsoft Windows. Notable critical disclosures include multiple SQL injection and filename control vulnerabilities (CVE-2025-68506, CVE-2025-68519, CVE-2025-68590) and legacy issues in Smartwares HOME easy and devolo dLAN products. Current patch availability stands at 0%, requiring organizations to implement compensating controls.

  • 29 critical CVEs disclosed, up 32% from yesterday's 22 critical vulnerabilities
  • 100 high-priority CVEs remain consistent with previous day totals
  • 12 actively exploited vulnerabilities including WatchGuard, D-Link, Microsoft Windows, and Google Chromium
  • 0% patch availability requires immediate compensating control deployment
  • Affected systems include WinRAR, GeoServer, Apple products, ASUS Live Update, and Gladinet CentreStack

Immediate action: Prioritize review of the 12 actively exploited vulnerabilities, particularly those affecting perimeter devices (WatchGuard Firebox, D-Link Routers, Array Networks) and widely deployed software (WinRAR, Microsoft Windows, Google Chromium). With no patches currently available, implement network segmentation, enhanced monitoring, and access restrictions for affected systems. Given the holiday period, ensure security operations coverage and incident response procedures are in place.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation