(TLP CLEAR) Weekly Vulnerabilities to Prioritize – February 19, 2026
Created: Wednesday, February 18, 2026 - 15:42
Categories: Cybersecurity, Security Preparedness
The below vulnerabilities have been identified by WaterISAC analysts as important for water and wastewater utilities to prioritize in their vulnerability management efforts. WaterISAC shares critical vulnerabilities that affect widely used products and may be under active exploitation. WaterISAC draws additional awareness in alerts and advisories when vulnerabilities are confirmed to be impacting, or have a high likelihood of impacting, water and wastewater utilities. Members are encouraged to regularly review these vulnerabilities, many of which are often included in CISA’s Known Exploited Vulnerabilities (KEV) Catalog.
Dell RecoverPoint for Virtual Machines
CVSS v3.1: 10.0
CVE: CVE-2026-22769
Description: On February 18, Google Mandiant reported that UNC6201, a suspected China-nexus threat actor, has exploited this zero-day vulnerability. Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible. CISA has added this vulnerability to its KEV catalog.
Source: https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079
Additional Reading:
BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) Remote Code Execution Vulnerability
CVSS v4.0: 9.9
CVE: CVE-2026-1731
Description: BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.
Source: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02
Google Chromium CSS Use-After-Free Vulnerability
CVSS: N/A
CVE: CVE-2026-2441
Description: Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. CISA has added this vulnerability to its KEV catalog.
Source: https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
