Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Toyota Motor Manufacturing Canada to deploy Agility Robotics’ Digit humanoids

    February 19, 2026

    Exposing biases, moods, personalities, and summary ideas hidden in massive language fashions | MIT Information

    February 19, 2026

    Pricing Construction and Fundamental Capabilities

    February 19, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»The Week In Vulnerabilities: SolarWinds, Ivanti, And Vital ICS Publicity
    AI Ethics & Regulation

    The Week In Vulnerabilities: SolarWinds, Ivanti, And Vital ICS Publicity

    Declan MurphyBy Declan MurphyFebruary 19, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    The Week In Vulnerabilities: SolarWinds, Ivanti, And Vital ICS Publicity
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Vital SolarWinds, Ivanti EPMM, Microsoft Workplace, and Siemens ICS vulnerabilities are being mentioned on underground boards, whereas 15 CISA ICS advisories impacted Power and Vital Manufacturing sectors.

    Cyble Analysis & Intelligence Labs (CRIL) tracked 1,158 vulnerabilities final week. Of those, 251 vulnerabilities have already got publicly out there Proof-of-Idea (PoC) exploits, considerably growing the probability of real-world assaults. 

    A complete of 94 vulnerabilities have been rated crucial below CVSS v3.1, whereas 43 have been rated crucial below CVSS v4.0.

    In parallel, CISA issued 15 ICS advisories masking 87 vulnerabilities affecting industrial environments. These vulnerabilities impacted distributors together with Siemens, Yokogawa, AVEVA, Hitachi Power, ZLAN, ZOLL, and Airleader. 

    Moreover, 8 vulnerabilities have been added to CISA’s Identified Exploited Vulnerabilities (KEV) catalog, reflecting confirmed exploitation within the wild. 

    The Week’s High Vulnerabilities 

    CVE-2025-40554 — SolarWinds Internet Assist Desk (Vital) 

    CVE-2025-40554 is a crucial authentication bypass vulnerability affecting SolarWinds Internet Assist Desk variations previous to 2026.1. The flaw permits unauthenticated distant attackers to invoke privileged performance with out legitimate credentials, doubtlessly resulting in full compromise of helpdesk programs. 

    Cyble noticed this vulnerability being mentioned on underground boards shortly after disclosure, and a public PoC is offered. The vulnerability’s presence in enterprise environments will increase the danger of preliminary entry and lateral motion. 

    CVE-2026-1340 — Ivanti Endpoint Supervisor Cellular (Vital) 

    CVE-2026-1340 is a crucial code injection vulnerability in Ivanti Endpoint Supervisor Cellular (EPMM). A distant, unauthenticated attacker can exploit the flaw to realize arbitrary distant code execution with out consumer interplay. 

    The vulnerability has been captured in darkish internet discussions and has a publicly out there PoC , considerably reducing the barrier to exploitation. 

    CVE-2026-21509 — Microsoft Workplace (Excessive Severity, Actively Exploited) 

    CVE-2026-21509 is a feature-bypass vulnerability in Microsoft Workplace that enables crafted paperwork to avoid built-in safety protections. Attackers can ship malicious Workplace recordsdata that execute payloads as soon as opened by the sufferer. 

    The flaw has been actively exploited by risk actors together with APT28 and RomCom , highlighting its operational impression. 

    CVE-2026-1529 — Keycloak (Excessive Affect) 

    CVE-2026-1529 impacts Pink Hat’s Keycloak and entails improper validation of JWT invitation token signatures. Attackers can manipulate trusted token contents to achieve unauthorized entry to organizational assets. 

    A PoC is offered, and the vulnerability surfaced on underground boards shortly after disclosure. 

    CVE-2026-23906 — Apache Druid (Vital) 

    CVE-2026-23906 is a crucial authentication bypass vulnerability in Apache Druid, enabling unauthorized entry to delicate information shops. 

    CVE-2026-0488 — SAP CRM & SAP S/4HANA (Vital) 

    CVE-2026-0488 is a crucial code injection vulnerability affecting SAP CRM and SAP S/4HANA. An authenticated attacker can exploit improper perform module calls to execute arbitrary SQL statements, doubtlessly leading to full database compromise. 

    Vulnerabilities Added to CISA KEV 

    CISA added 8 vulnerabilities to the KEV catalog in the course of the reporting interval. A very powerful of those have been: 

    • CVE-2026-24423 — SmarterTools SmarterMail unauthenticated RCE 
    • CVE-2026-21510 — Microsoft Home windows Shell safety mechanism bypass 

    KEV additions mirror confirmed exploitation within the wild and sometimes sign heightened ransomware or espionage exercise. 

    Vital ICS Vulnerabilities 

    CISA issued 15 ICS advisories masking 87 vulnerabilities, with the bulk rated excessive severity. 

    CVE-2026-25084 & CVE-2026-24789 — ZLAN5143D (Vital) 

    These crucial vulnerabilities in ZLAN Info Know-how Co.’s ZLAN5143D gadget contain lacking authentication for crucial capabilities. 

    Profitable exploitation may permit attackers to bypass authentication controls or reset gadget passwords, doubtlessly enabling unauthorized configuration modifications and interference with industrial communications. Researchers additionally recognized internet-facing cases, growing publicity threat. 

    CVE-2025-52533 — Siemens SINEC OS (Vital) 

    CVE-2025-52533 is a crucial out-of-bounds write vulnerability in Siemens SINEC OS earlier than model 3.3, doubtlessly enabling reminiscence corruption and system compromise in industrial community environments. 

    CVE-2026-1358 — Airleader Grasp (Vital) 

    CVE-2026-1358 is a crucial, unrestricted file-upload vulnerability in Airleader Grasp programs. Profitable exploitation may permit attackers to add malicious recordsdata, doubtlessly leading to distant code execution in OT environments. 

    Impacted Vital Infrastructure Sectors 

    Evaluation of the ICS advisories exhibits that Vital Manufacturing and Power sectors seem in 98.9% of reported vulnerabilities, showcasing concentrated publicity in these environments. 

    The cross-sector nature of those vulnerabilities underscores the interdependencies between Power, Manufacturing, Transportation, Water, and Meals programs. 

    Conclusion 

    The convergence of high-volume IT vulnerabilities and important ICS publicity highlights the continued growth of the assault floor throughout enterprise and industrial environments. With over 250 PoCs publicly out there and a number of KEV additions confirming energetic exploitation, organizations should prioritize speedy remediation and risk-based vulnerability administration. 

    Safety finest practices embrace: 

    • Prioritizing vulnerabilities primarily based on threat and exploit availability 
    • Defending web-facing and internet-exposed property 
    • Implementing strict IT/OT community segmentation 
    • Deploying multi-factor authentication and robust entry controls 
    • Conducting common vulnerability assessments and penetration testing 
    • Monitoring underground boards and KEV updates for early warning indicators 
    • Establishing ransomware-resistant backup methods 
    • Sustaining OT-specific incident response procedures 

    Cyble’s complete assault floor administration options assist organizations constantly monitor inside and exterior property, prioritize remediation, and detect early warning indicators of exploitation. Moreover, Cyble’s risk intelligence and third-party threat intelligence capabilities present visibility into vulnerabilities actively mentioned in underground communities, enabling proactive protection in opposition to each IT and ICS threats.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Infostealer Discovered Stealing OpenClaw AI Id and Reminiscence Information

    February 19, 2026

    Citizen Lab Finds Cellebrite Software Used on Kenyan Activist’s Cellphone in Police Custody

    February 19, 2026

    Dalhousie’s Case Diversification: Sexual Orientation and Gender Identification (Half 2)

    February 19, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Toyota Motor Manufacturing Canada to deploy Agility Robotics’ Digit humanoids

    By Arjun PatelFebruary 19, 2026

    Digit moved bins at a GXO Logistics facility in a RaaS mannequin. Supply: Agility Robotics…

    Exposing biases, moods, personalities, and summary ideas hidden in massive language fashions | MIT Information

    February 19, 2026

    Pricing Construction and Fundamental Capabilities

    February 19, 2026

    The Week In Vulnerabilities: SolarWinds, Ivanti, And Vital ICS Publicity

    February 19, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.