Friday, January 30, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Friday's vulnerability landscape includes 9 critical CVEs (CVSS 9.0+), a 44% decrease from Thursday's 16 critical disclosures. High-priority vulnerabilities remain steady at 91 (down 5% from 96), while actively exploited CVEs hold constant at 14 KEV entries. Notable critical vulnerabilities include CVE-2026-1340, a code injection flaw in Ivanti Endpoint Manager Mobile enabling unauthenticated RCE, and CVE-2026-1453, a missing authentication vulnerability in KiloView Encoder Series allowing unauthorized admin account manipulation. The 14 actively exploited vulnerabilities span multiple vendors including Microsoft Windows and Office, Cisco Unified Communications Manager, VMware vCenter Server, and Zimbra Collaboration Suite. Current patch availability sits at 0%, requiring organizations to implement compensating controls until vendor fixes become available.

  • 9 critical CVEs disclosed (44% decrease from Thursday's 16)
  • 91 high-priority vulnerabilities (5% decrease from 96)
  • 14 actively exploited CVEs affecting Microsoft, Cisco, VMware, Zimbra, and Linux systems
  • 0% patch availability requires compensating controls and monitoring
  • Ivanti EPMM and KiloView Encoder Series face critical authentication and code injection flaws

Immediate action: Priority assessment needed for environments running Microsoft Windows/Office, Cisco UCM, VMware vCenter, and Zimbraβ€”all present in the active exploitation list. With zero patches currently available, implement network segmentation, enhanced monitoring, and access restrictions for affected systems until vendor remediations are released.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation