Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Flaws in Popular IDE Extensions Allow Data Exfiltration

February 20, 2026

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

February 20, 2026

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

February 20, 2026
Facebook X (Twitter) Instagram
Friday, February 20
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
News

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

Team-CWDBy Team-CWDFebruary 19, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services.

Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition.

Elsewhere, Adobe released updates for Audition, After Effects, InDesign Desktop, Substance 3D, Bridge, Lightroom Classic, and DNG SDK. The company said it’s not aware of in-the-wild exploitation of any of the shortcomings.

SAP shipped fixes for two critical-severity vulnerabilities, including a code injection bug in SAP CRM and SAP S/4HANA (CVE-2026-0488, CVSS score: 9.9) that an authenticated attacker could use to run an arbitrary SQL statement and lead to a full database compromise.

The second critical vulnerability is a case of a missing authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform (CVE-2026-0509, CVSS score: 9.6) that could permit an authenticated, low-privileged user to perform certain background Remote Function Calls without the required S_RFC authorization.

“To patch the vulnerability, customers must implement a kernel update and set a profile parameter,” Onapsis said. “Adjustments in user roles and UCON settings might be required to not interrupt business processes.”

Rounding off the list, Intel and Google said they teamed up to examine the security of Intel Trust Domain Extensions (TDX) 1.5, uncovering five vulnerabilities in the module (CVE-2025-32007, CVE-2025-27940, CVE-2025-30513, CVE-2025-27572, and CVE-2025-32467), and nearly three dozen weaknesses, bugs, and improvement suggestions.

“Intel TDX 1.5 introduces new features and functionality that bring confidential computing significantly closer to feature parity with traditional virtualization solutions,” Google said. “At the same time, these features have increased the complexity of a highly privileged software component in the TCB [Trusted Computing Base].”

Software Patches from Other Vendors

Security updates have also been released by other vendors in recent weeks to rectify several vulnerabilities, including —

  • ABB
  • Amazon Web Services
  • AMD
  • AMI
  • Apple
  • ASUS
  • AutomationDirect
  • AVEVA
  • Broadcom (including VMware)
  • Canon
  • Check Point
  • Cisco
  • Citrix
  • Commvault
  • ConnectWise
  • D-Link
  • Dassault Systèmes
  • Dell
  • Devolutions
  • dormakaba
  • Drupal
  • F5
  • Fortinet
  • Foxit Software
  • FUJIFILM
  • Fujitsu
  • Gigabyte
  • GitLab
  • Google Android and Pixel
  • Google Chrome
  • Google Cloud
  • Grafana
  • Hikvision
  • Hitachi Energy
  • HP
  • HP Enterprise (including Aruba Networking and Juniper Networks)
  • IBM
  • Intel
  • Ivanti
  • Lenovo
  • Linux distributions AlmaLinux, Alpine Linux, Amazon Linux, Arch Linux, Debian, Gentoo, Oracle Linux, Mageia, Red Hat, Rocky Linux, SUSE, and Ubuntu
  • MediaTek
  • Mitsubishi Electric
  • MongoDB
  • Moxa
  • Mozilla Firefox and Thunderbird
  • n8n
  • NVIDIA
  • Phoenix Contact
  • QNAP
  • Qualcomm
  • Ricoh
  • Rockwell Automation
  • Samsung
  • Schneider Electric
  • ServiceNow
  • Siemens
  • SolarWinds
  • Splunk
  • Spring Framework
  • Supermicro
  • Synology
  • TP-Link
  • WatchGuard
  • Zoho ManageEngine
  • Zoom, and
  • Zyxel



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRemcos RAT Expands Real-Time Surveillance Capabilities
Next Article Is Poshmark safe? How to buy and sell without getting scammed
Team-CWD
  • Website

Related Posts

News

Flaws in Popular IDE Extensions Allow Data Exfiltration

February 20, 2026
News

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

February 20, 2026
News

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.