Vulnerability Report - February 2026

All vulnerability reports

Introduction

This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.

It highlights the most frequently mentioned vulnerability for February 2026, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, SPLOITUS, Metasploit, and more. For further details, please visit this page.

The Month at a Glance

February 2026 was led by CVE-2026-1731, a Critical-severity issue affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA), with 158 sightings. It was followed closely by CVE-2026-2441 in Google Chrome with 143 sightings.

Microsoft-related vulnerabilities were also prominent in the top 10, including CVE-2026-20841 (Windows Notepad) and CVE-2026-21509 (Microsoft 365 Apps for Enterprise). Other heavily sighted entries spanned enterprise recovery and networking products such as Dell RecoverPoint for Virtual Machines (CVE-2026-22769) and Cisco Catalyst SD-WAN Manager (CVE-2026-20127), as well as platform and tooling ecosystems like Apple macOS (CVE-2026-20700), Ivanti Endpoint Manager Mobile (CVE-2026-1281), and n8n (CVE-2026-25049).

February continued to be an active month for known exploited vulnerabilities. The CISA Known Exploited Vulnerabilities catalog added 28 new entries during the month. Notable additions include:

The CIRCL Known Exploited Vulnerabilities catalog added three entries (CVE-2026-25108, CVE-2026-1340, and CVE-2026-1281), while the ENISA KEV catalog had no new entries in February.

The Ghost CVE Report highlights eight vulnerability identifiers that were observed in sightings despite limited or missing public records. The most frequently sighted were CVE-2023-42344 (5 occurrences) and CVE-2026-1584 (4 occurrences), followed by CVE-2026-23456 (3 occurrences).

Contributor insights this month covered Cisco Catalyst SD-WAN vulnerabilities, an IceWarp command-injection RCE, analysis of CVEs affecting the Svelte ecosystem, TP-Link VIGI IP camera issues, and reporting on UAC-0001 (APT28) activity leveraging CVE-2026-21509.

Top 10 Vendors of the Month

Top 10 Vendors of the Month

Top 10 Assigners of the Month

Top 10 Assigners of the Month

Top 10 vulnerabilities of the Month

VulnerabilitySighting CountVendorProductVLAI Severity
CVE-2026-1731158BeyondTrustRemote Support(RS) & Privileged Remote Access(PRA)Critical (confidence: 0.9914)
CVE-2026-2441143GoogleChromeHigh (confidence: 0.9908)
CVE-2026-20841131MicrosoftWindows NotepadHigh (confidence: 0.9833)
CVE-2026-21509113MicrosoftMicrosoft 365 Apps for EnterpriseHigh (confidence: 0.9687)
CVE-2026-2276991DellRecoverPoint for Virtual MachinesCritical (confidence: 0.9356)
CVE-2026-2012776CiscoCisco Catalyst SD-WAN ManagerCritical (confidence: 0.9411)
CVE-2026-2070069ApplemacOSHigh (confidence: 0.9705)
CVE-2026-128169IvantiEndpoint Manager MobileCritical (confidence: 0.9791)
CVE-2026-2525355OpenClawOpenClawHigh (confidence: 0.7975)
CVE-2026-2504954n8n-ion8nCritical (confidence: 0.617)

Known Exploited Vulnerabilities

New entries have been added to major Known Exploited Vulnerabilities catalogs.

CISA

CVE IDDate AddedVendorProductVLAI Severity
CVE-2026-201272026-02-25CiscoCisco Catalyst SD-WAN ManagerHigh (confidence: 0.9183)
CVE-2022-207752026-02-25CiscoCisco Catalyst SD-WANHigh (confidence: 0.9894)
CVE-2026-251082026-02-24Soliton Systems K.K.FileZenHigh (confidence: 0.8244)
CVE-2025-491132026-02-20RoundcubeWebmailHigh (confidence: 0.7952)
CVE-2025-684612026-02-20RoundcubeWebmailMedium (confidence: 0.9892)
CVE-2021-221752026-02-18GitLabGitLabMedium (confidence: 0.7533)
CVE-2026-227692026-02-18DellRecoverPoint for Virtual MachinesCritical (confidence: 0.9356)
CVE-2020-77962026-02-17synacorzimbra_collaboration_suiteCritical (confidence: 0.5846)
CVE-2024-76942026-02-17TeamT5ThreatSonar Anti-RansomwareHigh (confidence: 0.9626)
CVE-2008-00152026-02-17MicrosoftWindowsHigh (confidence: 0.981)
CVE-2026-24412026-02-17GoogleChromeHigh (confidence: 0.9908)
CVE-2026-17312026-02-13BeyondTrustRemote Support(RS) & Privileged Remote Access(PRA)Critical (confidence: 0.9914)
CVE-2025-155562026-02-12notepad-plus-plusnotepad-plus-plusHigh (confidence: 0.9083)
CVE-2026-207002026-02-12AppleMacOSHigh (confidence: 0.9705)
CVE-2024-434682026-02-12MicrosoftMicrosoft Configuration ManagerHigh (confidence: 0.8181)
CVE-2025-405362026-02-12SolarWindsWeb Help DeskHigh (confidence: 0.7215)
CVE-2026-215332026-02-10MicrosoftWindows 10 Version 1607High (confidence: 0.9889)
CVE-2026-215102026-02-10MicrosoftWindows 10 Version 1607High (confidence: 0.5272)
CVE-2026-215132026-02-10MicrosoftWindows 10 Version 1607High (confidence: 0.8378)
CVE-2026-215142026-02-10MicrosoftMicrosoft 365 Apps for EnterpriseHigh (confidence: 0.9769)
CVE-2026-215192026-02-10MicrosoftWindows 10 Version 1607High (confidence: 0.9183)
CVE-2026-215252026-02-10MicrosoftWindows 10 Version 1607Medium (confidence: 0.9918)
CVE-2026-244232026-02-05SmarterToolsSmarterMailCritical (confidence: 0.9798)
CVE-2025-119532026-02-05react-native-communityreact_native_community_cliCritical (confidence: 0.987)
CVE-2019-190062026-02-03sangomafreepbxCritical (confidence: 0.6005)
CVE-2025-643282026-02-03FreePBXfilestoreHigh (confidence: 0.7976)
CVE-2021-399352026-02-03GitLabGitLabMedium (confidence: 0.8559)
CVE-2025-405512026-02-03SolarWindsWeb Help DeskCritical (confidence: 0.9385)

More KEV entries from the CISA Catalog.

CIRCL

CVE IDDate AddedVendorProductVLAI Severity
CVE-2026-251082026-02-26Soliton Systems K.K.FileZenHigh (confidence: 0.8244)
CVE-2026-13402026-02-03IvantiEndpoint Manager MobileCritical (confidence: 0.9791)
CVE-2026-12812026-02-03IvantiEndpoint Manager MobileCritical (confidence: 0.9791)

More KEV entries from the CIRCL Catalog.

ENISA

No new entry in February.

More KEV entries from the ENISA Catalog.

Top 10 Weaknesses of the Month

Top 10 Weaknesses of the Month

Click the image for more information.

Ghost CVE Report

A ghost CVE is a vulnerability identifier that’s already popped up in the wild but is still listed as RESERVED or NOT_FOUND in official registries like NVD or MITRE.

Sightings detected between 2026-02-01 and 2026-02-28 that are associated with vulnerabilities without public records.

Vulnerability IDOccurrencesComment
CVE-2023-423445OpenCMS Unauthenticated XXE Vulnerability
CVE-2026-15844libgnutls: Fix NULL pointer dereference in PSK binder verification
CVE-2026-234563YoSmart YoLink Smart Hub
CVE-2025-155762FreeBSD 14.3 and 13.5 (Jail chroot escape via fd exchange with a different jail)
CVE-2026-30382All supported versions of FreeBSD (Local DoS and possible privilege escalation via routing sockets)
CVE-2025-130502Multiple vulnerabilities in Centreon products
CVE-2025-125232Multiple vulnerabilities in Centreon products
CVE-2025-712102Multiple vulnerabilities in Trend Micro products (KA-0022458)

Insights from Contributors

Thank you

Thank you to all the contributors and our diverse sources!

If you want to contribute to the next report, you can create your account.

Feedback and Support

If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Funding

eu_funded_en

The main objective of Federated European Team for Threat Analysis (FETTA) is improvement of Cyber Threat Intelligence (CTI) products available to the public and private sector in Poland, Luxembourg, and the European Union as a whole.
Developing actionable CTI products (reports, indicators, etc) is a complex task and requires an in-depth understanding of the threat landscape and the ability to analyse and interpret large amounts of data. Many SOCs and CSIRTs build their capabilities in this area independently, leading to a fragmented approach and duplication of work.

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents. The organization brings to the table its extensive experience in cybersecurity incident management, threat intelligence, and proactive response strategies. With a strong background in developing innovative open source cybersecurity tools and solutions, CIRCL’s contribution to the FETTA project is instrumental in achieving enhanced collaboration and intelligence sharing across Europe.

Press release