Cyber Security Advisories – MS-ISAC The latest MS-ISAC cyber security advisories. Feed provided by Center for Internet Security.
- A Vulnerability in Dell RecoverPoint for Virtual Machines Could Allow for Arbitrary Code Executionon February 18, 2026 at 6:58 pm
A vulnerability has been discovered in Dell RecoverPoint for Virtual Machines which could allow for arbitrary code execution. Dell RecoverPoint for Virtual Machines is an enterprise-grade solution for VMware Virtual Machines (VMs) enabling local, remote, and concurrent local and remote replication with continuous cyber resilience for on premises recovery to any point-in time (PiT).Successful exploitation of the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- A Vulnerability in Google Chrome Could Allow for Arbitrary Code Executionon February 18, 2026 at 6:52 pm
A vulnerability has been discovered in Google Chrome which could allow for arbitrary code execution. Successful exploitation of the vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Authentication Bypasson February 10, 2026 at 8:24 pm
Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for authentication bypass. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation of the most severe of these vulnerabilities could a remote unauthenticated attacker to leak specific stored credential data.
- Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Executionon February 10, 2026 at 8:19 pm
Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution.FortiAuthenticator is a centralized identity and access management (IAM) solution that secures network access by managing user identities, Multi-Factor Authentication (MFA), and certificate management.FortiClientEMS is a centralized management platform for deploying, configuring, monitoring, and enforcing security policies across numerous endpoints (computers) running the FortiClient agent.FortiClient is a Fabric Agent that delivers protection, compliance, and secure access in a single, modular lightweight client.FortiOS is the Fortinetโs proprietary Operation System which is utilized across multiple product lines.FortiSandbox is an advanced threat detection solution from Fortinet that uses sandboxing to analyze suspicious files and network traffic for advanced threats like zero-day malware and ransomware.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Critical Patches Issued for Microsoft Products, February 10, 2026on February 10, 2026 at 8:16 pm
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Executionon February 10, 2026 at 7:53 pm
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.Adobe After Effects is a digital effects, motion graphics, and compositing application.Adobe Audition is a comprehensive toolset that includes multitrack, waveform, and spectral display for creating, mixing, editing, and restoring audio content.Adobe Bridge is a creative asset manager that lets you preview, organize, edit, and publish multiple creative assets quickly and easily.Adobe DNG Software Development Kit (SDK) is a free set of tools and code that helps developers add support for Adobe’s Digital Negative (DNG) universal RAW file format into their own applications and cameras.Adobe InDesign is a professional page layout and desktop publishing software used for designing and publishing content for both print and digital media.Adobe Lightroom is a cloud-based photo editing and management software designed for photographers to organize, edit, store, and share images across desktop, mobile, and web.Adobe Substance 3D is a suite of tools for creating 3D content, including modeling, texturing, and rendering.Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
- Multiple Vulnerabilities in Ivanti Endpoint Manager Mobile Could Allow for Remote Code Executionon January 30, 2026 at 6:53 am
Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager Mobile which could allow for remote code execution. Ivanti Endpoint Manager Mobile is a mobile management software engine that enables IT to set policies for mobile devices, applications and content. Successful exploitation of these vulnerabilities could allow for remote code execution in the context of the user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; make configuration changes on devices; or create new accounts with full user rights.
- Multiple Vulnerabilities in SolarWinds Web Help Desk Could Allow for Arbitrary Code Executionon January 28, 2026 at 2:32 pm
Multiple vulnerabilities have been discovered in SolarWinds Web Help Desk, the most severe of which could allow for arbitrary code execution. SolarWinds Web Help Desk (WHD) is a web-based software that provides IT help desk and asset management functionality, allowing IT teams to manage service requests, track IT assets, and offer self-service options to end-users. Successful exploitation of the most severe of these vulnerabilities could allow an actor to execute code in the context of SYSTEM. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- A Vulnerability in Microsoft Office Could Allow for Security Feature Bypasson January 27, 2026 at 6:58 pm
A vulnerability has been discovered in Microsoft Office which could allow for a security feature bypass. Microsoft Office is a suite of applications designed to help with productivity and completing common tasks on a computer. You can create and edit documents containing text and images, work with data in spreadsheets and databases, and create presentations and posters. Successful exploitation of the flaw relies on an attacker sending a specially crafted Office file and convincing recipients to open it. It also noted that the Preview Pane is not an attack vector.
- A Vulnerability in Cisco Unified Communications Products Could Allow for Remote Code Executionon January 21, 2026 at 9:32 pm
A vulnerability has been discovered in Cisco Unified Communications Products which could allow for remote code execution. Cisco Unified Communications (UC) Products are an integrated suite of IP-based hardware and software that combine voice, video, messaging, and data into a single platform. Successful exploitation of this vulnerability could allow for remote code execution as root, which may lead to the complete compromise of the affected device.





