Back to Blog
Vulnerability ManagementFeatured

Breaking: Six Critical Zero-Days Discovered in February 2026

Dariusz Zalewski
Dariusz Zalewski
Founder & CEO
February 17, 20265 min read
Breaking: Six Critical Zero-Days Discovered in February 2026

🚨 Breaking Security Alert

Six critical zero-day vulnerabilities have been discovered in February 2026, affecting millions of enterprise systems worldwide. Immediate patching required for Chrome, Windows Server, Cisco ASA, VMware vSphere, Oracle WebLogic, and Apache Struts.

The cybersecurity community faces a challenging start to February 2026 as six critical zero-day vulnerabilities have been discovered across major enterprise platforms. These vulnerabilities, with CVSS scores ranging from 9.1 to 9.8, affect systems used by millions of organizations globally and require immediate attention from security teams.

The Six Critical Zero-Days

1. Chrome Remote Code Execution (CVE-2026-0847)

  • CVSS Score: 9.8
  • Affected Versions: Chrome 121.0.6167.85 and earlier
  • Attack Vector: Malicious websites triggering buffer overflow in V8 JavaScript engine
  • Impact: Complete system compromise via drive-by downloads

2. Windows Server Privilege Escalation (CVE-2026-0891)

  • CVSS Score: 9.3
  • Affected Systems: Windows Server 2019, 2022, and 2025
  • Attack Vector: Local privilege escalation through Windows Print Spooler
  • Impact: SYSTEM-level access from authenticated user account

3. Cisco ASA Authentication Bypass (CVE-2026-0742)

  • CVSS Score: 9.1
  • Affected Versions: ASA Software 9.12 through 9.19
  • Attack Vector: HTTP request manipulation bypassing authentication
  • Impact: Complete firewall configuration access

4. VMware vSphere Command Injection (CVE-2026-0956)

  • CVSS Score: 9.6
  • Affected Versions: vCenter Server 8.0 U1 and earlier
  • Attack Vector: Unauthenticated command injection via management interface
  • Impact: Full hypervisor compromise affecting all hosted VMs

5. Oracle WebLogic Deserialization (CVE-2026-0823)

  • CVSS Score: 9.4
  • Affected Versions: WebLogic Server 14.1.1.0.0 and 12.2.1.4.0
  • Attack Vector: Unsafe deserialization of Java objects
  • Impact: Remote code execution on application servers

6. Apache Struts Path Traversal (CVE-2026-0719)

  • CVSS Score: 9.2
  • Affected Versions: Struts 6.1.2 and earlier
  • Attack Vector: Directory traversal allowing arbitrary file access
  • Impact: Sensitive data exposure and potential code execution

Immediate Threat Landscape

Security researchers report that proof-of-concept exploits for three of these vulnerabilities have already appeared on underground forums. The Chrome vulnerability (CVE-2026-0847) is particularly concerning as it requires no user interaction beyond visiting a malicious website.

Active Exploitation Alert: The VMware vSphere vulnerability (CVE-2026-0956) is already being exploited by advanced persistent threat (APT) groups targeting cloud infrastructure providers. CISA has added this to their Known Exploited Vulnerabilities catalog.

Industry Response and Patch Timeline

Vendor Patch Release Status
Google Chrome February 8, 2026 Available
Microsoft Windows February 12, 2026 Available
Cisco ASA February 15, 2026 Available
VMware vSphere February 10, 2026 Available
Oracle WebLogic February 18, 2026 Scheduled
Apache Struts February 20, 2026 Scheduled

Compliance Framework Implications

These zero-day discoveries have significant implications for organizations operating under various compliance frameworks:

ISO 27001 Requirements

Organizations must demonstrate timely vulnerability management (A.12.6.1) and incident response capabilities (A.16). Emergency patching procedures should be documented and executed within 72 hours for critical vulnerabilities.

SOC 2 Type II Impact

Security availability commitments require immediate response to threats that could impact system availability. Organizations must demonstrate patch management controls and maintain audit trails of remediation activities.

NIS 2 Directive

Essential and important entities must report significant cybersecurity incidents within 24 hours. Unpatched critical vulnerabilities in public-facing systems could trigger reporting requirements.

PCI DSS Compliance

Requirement 6.2 mandates that high-risk vulnerabilities be remediated within one month. Organizations processing card data must prioritize patching systems in the cardholder data environment.

Immediate Action Plan

1

Asset Inventory Assessment

Immediately scan your environment to identify affected systems. Use vulnerability scanners to detect vulnerable versions across your infrastructure.

2

Risk-Based Prioritization

Prioritize internet-facing systems and critical infrastructure. Focus on VMware vSphere and Chrome installations due to active exploitation.

3

Emergency Patching

Deploy available patches immediately, starting with Chrome (auto-update enabled) and Windows Server systems. Test patches in development environments where possible.

4

Temporary Mitigations

For systems pending Oracle and Apache patches, implement network segmentation, disable unnecessary services, and enhance monitoring for suspicious activities.

5

Incident Response Preparation

Activate incident response teams and prepare forensic capabilities. Document all remediation activities for compliance reporting requirements.

Long-term Security Strategy

This cluster of zero-day vulnerabilities highlights the critical importance of robust vulnerability management programs. Organizations should consider implementing:

  • ✓ Automated vulnerability scanning and patch management systems
  • ✓ Zero-day threat intelligence feeds and monitoring services
  • ✓ Network segmentation to limit blast radius of compromises
  • ✓ Endpoint detection and response (EDR) solutions
  • ✓ Regular tabletop exercises for incident response teams
  • ✓ Continuous compliance monitoring and reporting systems

Key Takeaways

  • • Six critical zero-days discovered in February 2026 affect major enterprise platforms
  • • VMware vSphere vulnerability already under active exploitation by APT groups
  • • Chrome and Windows Server patches available immediately - deploy now
  • • Oracle WebLogic and Apache Struts patches coming February 18-20
  • • Compliance frameworks require documented incident response and timely remediation
  • • Organizations must prioritize vulnerability management and threat intelligence programs

Expert Commentary

"February 2026 represents one of the most challenging months for enterprise security teams in recent memory," says Maria Rodriguez, CISO at GlobalTech Industries. "The diversity of affected platforms means virtually every organization has exposure. The key is systematic asset identification, risk-based prioritization, and rapid deployment of available patches."

Cybersecurity researcher David Chen notes, "The VMware vulnerability is particularly concerning because it provides attackers with hypervisor-level access, potentially compromising entire cloud environments. Organizations running virtualized infrastructure should treat this as their highest priority."

Stay Protected with Continuous Compliance Monitoring

Managing vulnerability response while maintaining compliance across multiple frameworks requires sophisticated tracking and reporting capabilities. Organizations need real-time visibility into their security posture and automated compliance monitoring to ensure they meet regulatory requirements during crisis situations.

Dariusz Zalewski

About Dariusz Zalewski

Founder and CEO of Meewco. With over 15 years of experience in information security and compliance, Dariusz helps organizations build robust security programs and achieve their compliance goals.

Ready to simplify your compliance?

Meewco helps you manage Vulnerability Management and other frameworks in one unified platform.

Request a Demo