Saturday, December 27, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures included 4 critical vulnerabilities (CVSS 9.0+), a notable increase from zero critical issues the prior day. High-priority CVEs decreased 76% to 23 from the previous day's 95. Eleven actively exploited vulnerabilities remain on the CISA KEV list, including CVE-2025-66644 affecting Array Networks ArrayOS AG, CVE-2025-6218 in RARLAB WinRAR, and CVE-2025-62221 targeting Microsoft Windows. Notable critical disclosures include CVE-2025-66203 (CVSS 9.9) in StreamVault video download integration, CVE-2025-68668 (CVSS 9.9), and CVE-2025-13915 (CVSS 9.8) affecting IBM API Connect. Patch availability stands at 0%, requiring organizations to implement compensating controls until vendor fixes become available.

  • 4 critical vulnerabilities disclosed, up from 0 the prior day
  • 23 high-priority CVEs, a 76% decrease from 95 the previous day
  • 11 actively exploited vulnerabilities including D-Link Routers, Microsoft Windows, Google Chromium, and Apple products
  • 0% patch availability for disclosed vulnerabilities
  • IBM API Connect, StreamVault, Array Networks, and WinRAR among affected products

Immediate action: Priority review is recommended for organizations using IBM API Connect, Array Networks ArrayOS AG, RARLAB WinRAR, and Microsoft Windows systems. With no patches currently available, implement network segmentation and enhanced monitoring for affected products while awaiting vendor updates.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation