Monday, January 26, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures contained zero new critical vulnerabilities, a complete decrease from the prior day's 2 critical CVEs. High-priority vulnerabilities dropped substantially to 11, representing a 72% decrease from the previous 39. The actively exploited (KEV) count remains steady at 10 vulnerabilities, including legacy threats like CVE-2009-0556 affecting Microsoft Office alongside recent entries such as CVE-2026-20805 targeting Microsoft Windows and CVE-2026-20045 impacting Cisco Unified Communications Manager. Notable KEV additions include CVE-2025-37164 in HPE OneView, CVE-2025-68645 in Zimbra Collaboration Suite, and CVE-2024-37079 affecting VMware vCenter Server. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring until vendor remediation becomes available.

  • Zero critical CVEs disclosed, down 100% from prior day's 2 critical vulnerabilities
  • 11 high-priority vulnerabilities, a 72% decrease from the previous 39
  • 10 actively exploited vulnerabilities spanning Microsoft, Cisco, HPE, Zimbra, and VMware products
  • 0% patch availability necessitates compensating controls and enhanced monitoring
  • Enterprise infrastructure heavily represented: vCenter Server, Unified Communications Manager, OneView, and Zimbra

Immediate action: Organizations running Microsoft Windows, Cisco Unified Communications Manager, HPE OneView, Zimbra Collaboration Suite, or VMware vCenter Server should immediately assess exposure to the 10 actively exploited vulnerabilities. With no patches currently available, implement network segmentation, enhanced logging, and access restrictions for affected systems until vendor fixes are released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation