Monday, February 2, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Yesterday's disclosures included 5 critical-severity CVEs (CVSS 9.0+), a notable increase from the prior day's zero critical vulnerabilities. High-priority CVEs numbered 24, representing a 43% decrease from the previous day's 42. Twelve actively exploited vulnerabilities were added to the KEV catalog, affecting Microsoft Windows (CVE-2026-20805), Cisco Unified Communications Manager (CVE-2026-20045), VMware vCenter Server (CVE-2024-37079), and Microsoft Office (CVE-2026-21509). Critical vulnerabilities include CVE-2026-25202 affecting database credentials in multiple products and CVE-2024-2356 involving local file inclusion. Patch availability currently stands at 0%, requiring organizations to implement compensating controls until vendor fixes are released.

  • 5 critical CVEs disclosed (CVSS 9.0+), up from 0 the prior day
  • 24 high-priority CVEs (CVSS 7.0-8.9), down 43% from 42
  • 12 actively exploited vulnerabilities affecting Microsoft, Cisco, VMware, and Zimbra
  • 0% patch availability across disclosed vulnerabilities
  • Affected systems include Windows, vCenter Server, Unified Communications Manager, and SmarterMail

Immediate action: Prioritize review of Microsoft Windows, Cisco Unified Communications Manager, and VMware vCenter Server environments given active exploitation. With no patches currently available, implement network segmentation and enhanced monitoring for affected systems until vendor remediation is released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation