Friday, December 26, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Friday's vulnerability disclosure yielded no new critical CVEs (CVSS 9.0+), a notable decrease from Thursday's 29 critical issues. High-priority vulnerabilities remained steady at 95, representing a 5% decrease from the prior day's 100. Eleven actively exploited CVEs appear in CISA's Known Exploited Vulnerabilities catalog, including CVE-2025-66644 affecting Array Networks ArrayOS AG, CVE-2025-6218 targeting RARLAB WinRAR, and CVE-2025-62221 impacting Microsoft Windows. Additional KEV entries include CVE-2025-14174 in Google Chromium, CVE-2025-14611 affecting Gladinet CentreStack/Triofox, and CVE-2025-43529 impacting multiple Apple products. Patch availability stands at 0%, indicating organizations should implement compensating controls while monitoring for vendor updates.

  • Zero critical CVEs disclosed, down 100% from Thursday's 29 critical vulnerabilities
  • 95 high-priority CVEs tracked, a 5% decrease from the prior day's 100
  • 11 actively exploited vulnerabilities including D-Link routers, WinRAR, Microsoft Windows, and Google Chromium
  • 0% patch availability for disclosed vulnerabilities requires compensating controls
  • Affected systems span enterprise infrastructure: Array Networks, Sierra Wireless AirLink, ASUS Live Update, and GeoServer

Immediate action: Organizations using Array Networks, Microsoft Windows, Google Chrome, Apple products, WinRAR, or Gladinet solutions should prioritize reviewing the eleven actively exploited vulnerabilities. With zero patches currently available, implement network segmentation, enhanced monitoring, and access restrictions for affected systems.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation