Wednesday, January 28, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's vulnerability disclosures included 22 critical-severity CVEs (CVSS 9.0+), a substantial increase from the prior day's 3 critical issues. High-priority vulnerabilities totaled 84, up 140% from 35 the previous day. Fourteen actively exploited vulnerabilities were added to the KEV catalog, including CVE-2026-20805 affecting Microsoft Windows, CVE-2026-20045 in Cisco Unified Communications Manager, and CVE-2024-37079 targeting Broadcom VMware vCenter Server. Notable critical disclosures include CVE-2026-23830 (CVSS 10.0) in SandboxJS, CVE-2025-21589 (CVSS 9.8) an authentication bypass in Juniper Networks Session Smart Router, and multiple SolarWinds Web Help Desk deserialization vulnerabilities. Patch availability currently stands at 0%, requiring organizations to prioritize compensating controls and monitoring.

  • 22 critical CVEs disclosed, up from 3 the prior day (633% increase)
  • 84 high-priority vulnerabilities identified, up 140% from 35
  • 14 actively exploited CVEs including Microsoft Windows, Cisco UCM, VMware vCenter, and Zimbra
  • 0% patch availability for disclosed vulnerabilities
  • Affected vendors include SolarWinds, Juniper Networks, Microsoft, Cisco, Broadcom, and SmarterTools

Immediate action: Organizations running Microsoft Windows, Cisco Unified Communications Manager, VMware vCenter Server, SolarWinds Web Help Desk, or Juniper Session Smart Router should assess exposure to actively exploited and critical vulnerabilities immediately. With no patches currently available, implement network segmentation, enhanced monitoring, and vendor-recommended mitigations where possible.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation