Thursday, May 21, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Thursday's disclosures center on critical infrastructure components, with Cisco Secure Workload, NLnet Labs Unbound DNSSEC resolver, and Netatalk file sharing facing maximum-severity flaws. The brief covers 10 critical CVEs (down 58% from prior day) and 44 high-priority vulnerabilities (down 31%), reflecting a narrower but more impactful disclosure set. Notable entries include CVE-2026-20223 (CVSS 10) in Cisco Secure Workload, CVE-2026-42960 (CVSS 10) in NLnet Labs Unbound, and CVE-2026-44050 (CVSS 9.9) in Netatalk. Attack patterns skew toward remote code execution and authentication bypass against network appliances, DNS infrastructure, and WordPress ecosystem plugins, with embedded SMS gateway devices also appearing twice. No vendor patches are currently published for these disclosures, and nine CVEs carry confirmed active exploitation including a Cisco Catalyst SD-WAN flaw and multiple Microsoft Defender issues.

  • Cisco Secure Workload (CVE-2026-20223) and NLnet Labs Unbound DNSSEC (CVE-2026-42960) both carry CVSS 10 ratings affecting core network and DNS infrastructure
  • 10 critical CVEs disclosed, down 58% from the prior day's 24
  • 44 high-priority CVEs disclosed, down 31% from the prior day's 64
  • Remote code execution and authentication bypass dominate, hitting Netatalk file sharing, WordPress plugins, and embedded SMS alert gateways
  • Patch availability sits at 0% across this disclosure set, leaving administrators to rely on mitigations and network controls
  • 9 CVEs with confirmed active exploitation include Cisco Catalyst SD-WAN (CVE-2026-20182) and Microsoft Defender (CVE-2026-45498, CVE-2026-41091)

Immediate action: Prioritize inventory and mitigation for Cisco Secure Workload, Cisco Catalyst SD-WAN, NLnet Labs Unbound resolvers, Netatalk deployments, and Microsoft Defender installations, since these account for the highest-severity and actively exploited issues. With no patches yet available, apply vendor-recommended workarounds, restrict management interfaces, and increase monitoring on affected DNS and network infrastructure until fixes ship.

πŸ’‘ Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation