CyberLeveling Logo
Patch Roundup: What Matters Beyond the Big Names

Patch Roundup February 10

February’s patch cycle was not just about Microsoft and Adobe.

If you’ve already reviewed our breakdowns of Microsoft, Adobe, GitLab, WAGO, SAP, and FortiOS, and WPvivid, this post looks at the vulnerabilities that did not grab headlines but still deserve attention, especially across databases, firmware, infrastructure appliances, and enterprise middleware.

There was a clear pattern this month: a heavy focus on firmware, management interfaces, and denial of service conditions. Not flashy remote code execution, but real operational risk.

Let’s walk through what actually matters.

MongoDB: Pre-Authentication Denial of Service (CVE-2026-25611)

Severity: 8.7 (High)

Affected: MongoDB Server 7.0, 8.0, 8.2 prior to fixed releases

This is the standout issue outside the traditional Patch Tuesday players.

CVE-2026-25611 allows an unauthenticated attacker to send specially crafted messages that exhaust server memory and crash the MongoDB instance.

Key points:

  • No authentication required
  • Network reachable
  • Direct availability impact

If MongoDB is exposed, intentionally or not, this becomes a straightforward disruption vector.

MongoDB also addressed several other server-side issues this month:

  • Query planner crashes
  • Segmentation faults
  • Stack exhaustion via deeply nested expressions
  • Resource collisions in internal locking mechanisms

Most of these require authorized access, but they reinforce a theme. Complex query handling remains a stress point in database engines.

If MongoDB underpins production services, this is a patch-now situation.

Intel: Firmware and Management Layers Under the Microscope

Intel released a large set of advisories on February 10, many focused on firmware and management subsystems. These do not always make it into traditional patch cycles, but they matter.

Intel AMT and CSME Network DoS (CVE-2025-32008)

Severity: 8.6+ (High)

Impact: Unauthenticated network denial of service

Layer: Management firmware

This vulnerability affects Intel Active Management Technology and Converged Security and Management Engine. An unauthenticated attacker on the network can trigger a denial of service condition.

That is important because:

  • It operates below the operating system
  • It impacts remote management infrastructure
  • It is often overlooked in patch governance programs

Firmware rarely gets the same urgency as OS patching. It should.

Intel TDX Module Privilege Escalation and Information Disclosure

Intel Trust Domain Extensions modules received multiple fixes, including a high severity race condition under CVE-2025-30513.

These issues:

  • Affect hypervisor-level trust boundaries
  • Require privileged local access
  • Impact confidentiality and integrity

They are not remotely exploitable, but they are relevant in cloud and multi-tenant virtualization scenarios.

Server Firmware Update Utility High Severity Local EoP

CVE-2025-25210 and CVE-2025-22453 affect Intel’s Server Firmware Update Utility.

These are local privilege escalation vulnerabilities requiring privileged access, but they exist inside tooling responsible for firmware updates, which means they often run in high-trust contexts.

This month reinforces a broader lesson. Management tools are attack surface.

QNAP: Storage Platforms Still a Soft Target

On February 12, QNAP released multiple advisories across:

  • QTS
  • QuTS hero
  • Qsync Central
  • File Station 5

Issues include:

  • Path traversal
  • Improper input validation
  • Memory corruption
  • Denial of service

Most require authenticated access, but NAS appliances are frequently exposed or misconfigured in small and mid-sized environments.

Storage devices tend to fall into the configure once and forget category. That mindset is exactly what attackers rely on.

Cisco TelePresence and RoomOS Remote Endpoint Disruption

CVE-2026-20119

Severity: 7.5 (High)

Cisco patched a denial of service issue in TelePresence CE and RoomOS software. An attacker can cause a device to reload by triggering crafted text rendering, for example through a malicious meeting invitation.

Important details:

  • Unauthenticated
  • No user interaction required
  • Remote trigger

In environments heavily dependent on video collaboration, this becomes an easy way to disrupt operations.

It is not data theft. It is availability disruption. That still matters.

Fortinet FortiClientEMS SQL Injection (CVE-2026-21643)

Severity: 9.1 (Critical)

Affected: FortiClientEMS 7.4.4

This is a critical SQL injection vulnerability in FortiClientEMS. Because the input isn’t sanitized, an unauthenticated attacker could send crafted HTTP requests to the administrative interface and potentially execute arbitrary code on the system.

Key points:

  • Unauthenticated remote code execution
  • Affects a specific version branch (7.4.x)
  • High impact on confidentiality, integrity, and availability

While no active exploitation has been confirmed, the severity and ease of potential exploitation make this a high-priority patch. Fortinet has released version 7.4.5 to address the issue.

IBM: Middleware and Automation Stack Cleanup

IBM addressed a broad set of vulnerabilities across:

  • webMethods Integration Server
  • Business Automation Workflow
  • Event Automation
  • Planning Analytics

Notable items include:

  • Critical vulnerabilities in embedded components
  • Command injection in IBM Event Automation under CVE-2025-64756
  • Java SDK issues affecting automation platforms under CVE-2026-1188

The pattern here is not a single catastrophic bug. It is dependency sprawl.

Enterprise middleware stacks bundle large numbers of third-party libraries. Patch governance needs to account for that.

AMD, HP, and Driver-Level Updates

AMD released processor and graphics driver fixes this month, including issues inherited across OEM advisories.

HP addressed:

  • Printer information disclosure
  • Denial of service conditions
  • Firmware-related weaknesses

Individually, these are not headline events. Collectively, they show how deeply embedded firmware and driver-level vulnerabilities are in enterprise environments.

HPE Aruba Networking Private 5G Core (HPESBNW05002)

HPE released a security bulletin addressing four vulnerabilities affecting Aruba Private 5G Core versions 1.24.3.0 through 1.24.3.3. The issues are rated High to Medium severity.

CVE-2026-23595 (High – CVSS 8.8)

An unauthenticated authentication bypass in the application API allows a remote attacker to create an administrative account without logging in. This could lead to full system takeover, configuration changes, and access to sensitive data.

CVE-2026-23596 (Medium – CVSS 6.5)

An improper access control issue in the management API allows an unauthenticated attacker to trigger service restarts, potentially causing service disruption or denial of service.

CVE-2026-23597 and CVE-2026-23598 (Medium – CVSS 6.5)

Information disclosure vulnerabilities in the API error handling could expose sensitive system details such as user accounts, roles, and configuration data. While not directly granting access, this information could help attackers plan further attacks.

Resolution

HPE recommends upgrading to Private 5G Core version 1.25.1.0 or later, which resolves these issues. There are no workarounds for the affected versions.

Palo Alto Networks PAN-OS Advanced DNS Security (CVE-2026-0229)

PAN-OS is the operating system that runs Palo Alto Networks firewalls. The Advanced DNS Security (ADNS) feature is part of its threat prevention capabilities. It inspects DNS traffic to detect and block malicious domains, command-and-control activity, and DNS-based attacks.

When enabled, ADNS works with spyware profiles to block, alert on, or sinkhole suspicious DNS requests.

Summary of CVE-2026-0229

CVE-2026-0229 (Medium – CVSS 6.6, CVSS-B 8.7) is a denial-of-service vulnerability in the ADNS feature that allows an unauthenticated network attacker to send a specially crafted packet that triggers a firewall reboot. Repeated exploitation can force the firewall into maintenance mode, causing service disruption.

  • Attack Vector: Network
  • Privileges Required: None
  • User Interaction: None
  • Impact: High availability impact (system reboot / DoS)
  • Exploit status: No known active exploitation

This issue does not impact Cloud NGFW or Prisma Access.

Affected Versions

The vulnerability affects:

  • PAN-OS 12.1 versions 12.1.2 through 12.1.3
  • PAN-OS 11.2 versions 11.2.0 through 11.2.9

Not affected:

  • PAN-OS 12.1.4 and later
  • PAN-OS 11.2.10 and later
  • PAN-OS 11.1 (all)
  • PAN-OS 10.2 (all)
  • Cloud NGFW
  • Prisma Access

Exposure Requirements

The firewall must:

  • Have Advanced DNS Security enabled, and
  • Have a spyware profile configured with block, sinkhole, or alert actions (anything other than allow).

Resolution

There are no workarounds and no detection signature available. The only fix is to upgrade:

  • Upgrade PAN-OS 12.1 to 12.1.4 or later
  • Upgrade PAN-OS 11.2 to 11.2.10 or later
  • Upgrade any unsupported versions to a supported fixed release

Apple: Zero-Day Actively Exploited

Apple pushed updates across iOS, iPadOS, macOS, watchOS, tvOS, and visionOS to fix CVE-2026-20700, a memory corruption flaw in the system’s dynamic linker (dyld).

Why this matters:

  • The vulnerability was a zero-day, meaning attackers were already using it before a patch was available.
  • Successful exploitation could allow arbitrary code execution, essentially letting an attacker run malicious software on a device.
  • Apple described the attacks as “extremely sophisticated” and targeted.

Apple also included fixes for related WebKit issues. Since WebKit powers Safari and all browsers on iOS, even third-party browsers depend on these patches.

Action step: Install the latest OS update on your Apple devices as soon as possible.

Google Chrome: Multiple Security Fixes

Google released Chrome 145 for Windows, macOS, and Linux, addressing at least 11 security vulnerabilities.

While Google doesn’t immediately publish full technical details for all flaws, several involved potential remote code execution risks triggered by malicious web content.

This type of issue typically requires nothing more than visiting a compromised website.

Action step: Restart Chrome to ensure you’re running the latest version, or check under Settings → About Chrome to confirm it has updated.

Why This Pattern Matters

This wasn’t routine housekeeping. At least one of these flaws was actively exploited. That tells us two things:

  • Attackers are continuously probing widely used platforms.
  • Fast patching really does reduce real risk.

Most successful compromises today happen on unpatched systems. Updates are not just feature releases, they’re frontline security fixes.

A Clear February Pattern

Across vendors, February’s theme was consistent:

  • Firmware hardening
  • Privilege escalation fixes
  • Denial of service stability patches
  • Management interface exposure
  • Middleware dependency cleanup

There were fewer dramatic remote code execution headlines and more infrastructure-level corrections.

Those are the kinds of issues that quietly prevent bigger problems later.

How This Connects to the Broader Patch Cycle

If you have not yet reviewed our full breakdowns:

Those posts cover the primary enterprise application and network stack changes.

This roundup focuses on what sits underneath: databases, firmware, hardware trust layers, and management tooling.

Ignoring those layers creates blind spots.

Final Thoughts

Not every vulnerability needs panic.

But unauthenticated denial of service in databases, network-reachable management firmware, and privilege escalation in hypervisor trust modules are not background noise.

They are infrastructure-level risk.

Patch governance should include:

  • Firmware lifecycle tracking
  • Management interface exposure audits
  • Database service exposure validation
  • Appliance patch reviews
  • Middleware dependency visibility

Organizations that treat firmware and management utilities as part of their real attack surface, not just background components, will always be ahead.

Disclaimer

This overview highlights vulnerabilities we consider operationally significant from February’s broader release cycle. It is not an exhaustive list of every advisory published during this period.

Organizations should review vendor security bulletins directly, validate their asset inventory, and assess exposure within their specific environments before making risk decisions.