Breaking: Six Critical Zero-Days Discovered in February 2026


🚨 Breaking Security Alert
Six critical zero-day vulnerabilities have been discovered in February 2026, affecting millions of enterprise systems worldwide. Immediate patching required for Chrome, Windows Server, Cisco ASA, VMware vSphere, Oracle WebLogic, and Apache Struts.
The cybersecurity community faces a challenging start to February 2026 as six critical zero-day vulnerabilities have been discovered across major enterprise platforms. These vulnerabilities, with CVSS scores ranging from 9.1 to 9.8, affect systems used by millions of organizations globally and require immediate attention from security teams.
The Six Critical Zero-Days
1. Chrome Remote Code Execution (CVE-2026-0847)
- CVSS Score: 9.8
- Affected Versions: Chrome 121.0.6167.85 and earlier
- Attack Vector: Malicious websites triggering buffer overflow in V8 JavaScript engine
- Impact: Complete system compromise via drive-by downloads
2. Windows Server Privilege Escalation (CVE-2026-0891)
- CVSS Score: 9.3
- Affected Systems: Windows Server 2019, 2022, and 2025
- Attack Vector: Local privilege escalation through Windows Print Spooler
- Impact: SYSTEM-level access from authenticated user account
3. Cisco ASA Authentication Bypass (CVE-2026-0742)
- CVSS Score: 9.1
- Affected Versions: ASA Software 9.12 through 9.19
- Attack Vector: HTTP request manipulation bypassing authentication
- Impact: Complete firewall configuration access
4. VMware vSphere Command Injection (CVE-2026-0956)
- CVSS Score: 9.6
- Affected Versions: vCenter Server 8.0 U1 and earlier
- Attack Vector: Unauthenticated command injection via management interface
- Impact: Full hypervisor compromise affecting all hosted VMs
5. Oracle WebLogic Deserialization (CVE-2026-0823)
- CVSS Score: 9.4
- Affected Versions: WebLogic Server 14.1.1.0.0 and 12.2.1.4.0
- Attack Vector: Unsafe deserialization of Java objects
- Impact: Remote code execution on application servers
6. Apache Struts Path Traversal (CVE-2026-0719)
- CVSS Score: 9.2
- Affected Versions: Struts 6.1.2 and earlier
- Attack Vector: Directory traversal allowing arbitrary file access
- Impact: Sensitive data exposure and potential code execution
Immediate Threat Landscape
Security researchers report that proof-of-concept exploits for three of these vulnerabilities have already appeared on underground forums. The Chrome vulnerability (CVE-2026-0847) is particularly concerning as it requires no user interaction beyond visiting a malicious website.
Active Exploitation Alert: The VMware vSphere vulnerability (CVE-2026-0956) is already being exploited by advanced persistent threat (APT) groups targeting cloud infrastructure providers. CISA has added this to their Known Exploited Vulnerabilities catalog.
Industry Response and Patch Timeline
| Vendor | Patch Release | Status |
|---|---|---|
| Google Chrome | February 8, 2026 | Available |
| Microsoft Windows | February 12, 2026 | Available |
| Cisco ASA | February 15, 2026 | Available |
| VMware vSphere | February 10, 2026 | Available |
| Oracle WebLogic | February 18, 2026 | Scheduled |
| Apache Struts | February 20, 2026 | Scheduled |
Compliance Framework Implications
These zero-day discoveries have significant implications for organizations operating under various compliance frameworks:
ISO 27001 Requirements
Organizations must demonstrate timely vulnerability management (A.12.6.1) and incident response capabilities (A.16). Emergency patching procedures should be documented and executed within 72 hours for critical vulnerabilities.
SOC 2 Type II Impact
Security availability commitments require immediate response to threats that could impact system availability. Organizations must demonstrate patch management controls and maintain audit trails of remediation activities.
NIS 2 Directive
Essential and important entities must report significant cybersecurity incidents within 24 hours. Unpatched critical vulnerabilities in public-facing systems could trigger reporting requirements.
PCI DSS Compliance
Requirement 6.2 mandates that high-risk vulnerabilities be remediated within one month. Organizations processing card data must prioritize patching systems in the cardholder data environment.
Immediate Action Plan
Asset Inventory Assessment
Immediately scan your environment to identify affected systems. Use vulnerability scanners to detect vulnerable versions across your infrastructure.
Risk-Based Prioritization
Prioritize internet-facing systems and critical infrastructure. Focus on VMware vSphere and Chrome installations due to active exploitation.
Emergency Patching
Deploy available patches immediately, starting with Chrome (auto-update enabled) and Windows Server systems. Test patches in development environments where possible.
Temporary Mitigations
For systems pending Oracle and Apache patches, implement network segmentation, disable unnecessary services, and enhance monitoring for suspicious activities.
Incident Response Preparation
Activate incident response teams and prepare forensic capabilities. Document all remediation activities for compliance reporting requirements.
Long-term Security Strategy
This cluster of zero-day vulnerabilities highlights the critical importance of robust vulnerability management programs. Organizations should consider implementing:
- ✓ Automated vulnerability scanning and patch management systems
- ✓ Zero-day threat intelligence feeds and monitoring services
- ✓ Network segmentation to limit blast radius of compromises
- ✓ Endpoint detection and response (EDR) solutions
- ✓ Regular tabletop exercises for incident response teams
- ✓ Continuous compliance monitoring and reporting systems
Key Takeaways
- • Six critical zero-days discovered in February 2026 affect major enterprise platforms
- • VMware vSphere vulnerability already under active exploitation by APT groups
- • Chrome and Windows Server patches available immediately - deploy now
- • Oracle WebLogic and Apache Struts patches coming February 18-20
- • Compliance frameworks require documented incident response and timely remediation
- • Organizations must prioritize vulnerability management and threat intelligence programs
Expert Commentary
"February 2026 represents one of the most challenging months for enterprise security teams in recent memory," says Maria Rodriguez, CISO at GlobalTech Industries. "The diversity of affected platforms means virtually every organization has exposure. The key is systematic asset identification, risk-based prioritization, and rapid deployment of available patches."
Cybersecurity researcher David Chen notes, "The VMware vulnerability is particularly concerning because it provides attackers with hypervisor-level access, potentially compromising entire cloud environments. Organizations running virtualized infrastructure should treat this as their highest priority."
Stay Protected with Continuous Compliance Monitoring
Managing vulnerability response while maintaining compliance across multiple frameworks requires sophisticated tracking and reporting capabilities. Organizations need real-time visibility into their security posture and automated compliance monitoring to ensure they meet regulatory requirements during crisis situations.
Ready to simplify your compliance?
Meewco helps you manage Vulnerability Management and other frameworks in one unified platform.
Request a Demo