Critical Authentication Bypass in Cisco Catalyst SD-WAN Exploited Since 2023
Summary
Hide ▲
Show ▼
A critical authentication bypass vulnerability (CVE-2026-20182) in Cisco Catalyst SD-WAN Controller and Manager is being actively exploited in the wild, enabling unauthenticated remote attackers to bypass authentication and obtain administrative privileges. The flaw stems from a malfunction in the peering authentication mechanism within the 'vdaemon' service and impacts all deployment models. CVE-2026-20182 was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on May 15, 2026, mandating federal patching by May 17, 2026. Cisco has attributed exploitation with high confidence to UAT-8616, the same cluster responsible for weaponizing CVE-2026-20127 since at least 2023. The threat actor leverages the flaw for post-compromise actions, including adding SSH keys, modifying NETCONF configurations, and attempting to escalate to root privileges. Infrastructure overlaps with Operational Relay Box (ORB) networks, commonly linked to Chinese state-sponsored actors. Threat actors have chained CVE-2026-20182 with CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 to enable unauthorized access, deploying web shells, malware frameworks, and tools such as Godzilla, Behinder, XenShell, and credential stealers. Cisco recommends immediate updates, restricting access to management interfaces, and monitoring for indicators of compromise.
Timeline
-
05.03.2026 12:32 6 articles · 2mo ago
Cisco flags additional SD-WAN flaws as actively exploited
Clarifies that CVE-2026-20182 allows unauthenticated attackers to impersonate hub routers (vHub) in cloud deployments to gain administrative privileges, and that the UAT-8616 threat actor has performed post-compromise actions such as adding SSH keys, modifying NETCONF configurations, and escalating to root. Also confirms attribution of UAT-8616 to activity overlapping with Operational Relay Box (ORB) networks, commonly linked to Chinese state-sponsored threat actors. Cisco’s advisory and CISA’s addition of CVE-2026-20182 to the Known Exploited Vulnerabilities Catalog elevate urgency for patching by May 17, 2026.
Show sources
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
25.02.2026 20:01 7 articles · 2mo ago
Critical Cisco SD-WAN Bug Exploited in Zero-Day Attacks Since 2023
Adds confirmation that CISA added CVE-2026-20182 to the Known Exploited Vulnerabilities (KEV) catalog on May 15, 2026, mandating Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026. Reinforces that Cisco attributed the active exploitation of CVE-2026-20182 with high confidence to UAT-8616, the same cluster behind the weaponization of CVE-2026-20127 since at least 2023, and notes post-compromise actions such as adding SSH keys, modifying NETCONF configurations, and attempting to escalate to root privileges. Confirms overlap of UAT-8616 infrastructure with Operational Relay Box (ORB) networks and details the chaining of CVE-2026-20182 with CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 to enable unauthorized access. Describes the deployment of web shells and malware frameworks such as Godzilla, Behinder, XenShell, AdaptixC2, Sliver, XMRig, KScan, and credential stealers by at least 10 different threat clusters.
Show sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
Information Snippets
-
CVE-2026-20127 affects Cisco Catalyst SD-WAN Controller and Manager in on-prem and cloud installations.
First reported: 25.02.2026 20:014 sources, 5 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
The vulnerability has a maximum severity rating of 10.0.
First reported: 25.02.2026 20:014 sources, 4 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Attackers exploit the flaw by sending crafted requests to affected systems.
First reported: 25.02.2026 20:014 sources, 4 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Successful exploitation allows attackers to log in as high-privileged users and manipulate network configurations.
First reported: 25.02.2026 20:014 sources, 5 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
The flaw was reported by the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC).
First reported: 25.02.2026 20:014 sources, 4 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco Talos tracks the malicious activity under UAT-8616, attributed to a highly sophisticated threat actor.
First reported: 25.02.2026 20:014 sources, 4 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Attackers likely escalated to root access by exploiting CVE-2022-20775 and restoring the original firmware version.
First reported: 25.02.2026 20:014 sources, 4 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CISA issued Emergency Directive 26-03 requiring federal agencies to patch affected systems by February 27, 2026.
First reported: 25.02.2026 20:014 sources, 5 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco has released software updates to address the vulnerability, with no workarounds that fully mitigate the issue.
First reported: 25.02.2026 20:014 sources, 5 articlesShow sources
- Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023 — www.bleepingcomputer.com — 25.02.2026 20:01
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco has released specific software updates to address the vulnerability, including versions 20.9.8.2, 20.12.6.1, 20.12.5.3, 20.15.4.2, and 20.18.2.1.
First reported: 26.02.2026 08:133 sources, 3 articlesShow sources
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
-
Attackers have been found to leverage the built-in update mechanism to stage a software version downgrade and escalate to the root user by exploiting CVE-2022-20775.
First reported: 26.02.2026 08:134 sources, 5 articlesShow sources
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Attackers have taken steps to clear evidence of the intrusion by purging logs under /var/log, command history, and network connection history.
First reported: 26.02.2026 08:133 sources, 3 articlesShow sources
- Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access — thehackernews.com — 26.02.2026 08:13
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20128 and CVE-2026-20122 are actively exploited in the wild.
First reported: 05.03.2026 12:324 sources, 4 articlesShow sources
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20122 is a high-severity arbitrary file overwrite vulnerability that requires valid read-only credentials with API access.
First reported: 05.03.2026 12:324 sources, 4 articlesShow sources
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20128 is a medium-severity information disclosure flaw that requires local attackers to have valid vmanage credentials.
First reported: 05.03.2026 12:324 sources, 4 articlesShow sources
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20128 and CVE-2026-20122 affect Catalyst SD-WAN Manager software, regardless of device configuration.
First reported: 05.03.2026 12:323 sources, 3 articlesShow sources
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco released security updates to patch two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software: CVE-2026-20079 and CVE-2026-20131.
First reported: 05.03.2026 12:323 sources, 3 articlesShow sources
- Cisco flags more SD-WAN flaws as actively exploited in attacks — www.bleepingcomputer.com — 05.03.2026 12:32
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20128 affects the Data Collection Agent (DCA) feature of Catalyst SD-WAN Manager, allowing an authenticated, local attacker to gain DCA user privileges on the targeted system.
First reported: 05.03.2026 14:153 sources, 3 articlesShow sources
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20122 affects the API of the Catalyst SD-WAN Manager, allowing a remote, authenticated attacker to overwrite arbitrary files on the system and gain elevated privileges.
First reported: 05.03.2026 14:153 sources, 3 articlesShow sources
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco has not shared any details on the attacks exploiting these vulnerabilities, but its description indicates they have been chained with other flaws.
First reported: 05.03.2026 14:153 sources, 3 articlesShow sources
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco Talos linked the attacks exploiting CVE-2026-20127 to UAT-8616, a highly sophisticated threat actor that has been active since at least 2023.
First reported: 05.03.2026 14:152 sources, 2 articlesShow sources
- Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild — www.securityweek.com — 05.03.2026 14:15
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Patches for CVE-2026-20122, CVE-2026-20128, CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133 were released by Cisco in versions 20.9.8.2, 20.12.6.1, 20.12.5.3, 20.15.4.2, and 20.18.2.1.
First reported: 05.03.2026 17:222 sources, 2 articlesShow sources
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco PSIRT became aware of active exploitation of CVE-2026-20128 and CVE-2026-20122 in March 2026.
First reported: 05.03.2026 17:222 sources, 2 articlesShow sources
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco recommends users to update to a fixed software release, limit access from unsecured networks, secure appliances behind a firewall, disable HTTP for the Catalyst SD-WAN Manager web UI administrator portal, turn off unnecessary network services, change the default administrator password, and monitor log traffic for unexpected traffic.
First reported: 05.03.2026 17:222 sources, 2 articlesShow sources
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities — thehackernews.com — 05.03.2026 17:22
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 is a critical authentication bypass flaw in Cisco Catalyst SD-WAN Controller with a CVSS score of 10.0.
First reported: 14.05.2026 20:452 sources, 2 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 stems from a malfunction of the peering authentication mechanism in Cisco Catalyst SD-WAN Controller and Manager.
First reported: 14.05.2026 20:452 sources, 2 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.
First reported: 14.05.2026 20:453 sources, 3 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
A successful exploit of CVE-2026-20182 could permit the attacker to log in as an internal, high-privileged, non-root user account on Cisco Catalyst SD-WAN Controller.
First reported: 14.05.2026 20:452 sources, 2 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 allows attackers to weaponize the compromised account to access NETCONF and manipulate network configuration for the SD-WAN fabric.
First reported: 14.05.2026 20:452 sources, 2 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
-
CVE-2026-20182 impacts on-prem, cloud-pro, cloud (Cisco Managed), and government (FedRAMP) deployments of Cisco SD-WAN.
First reported: 14.05.2026 20:453 sources, 3 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Rapid7 discovered CVE-2026-20182 and noted its similarity to CVE-2026-20127, another critical authentication bypass in the same component.
First reported: 14.05.2026 20:453 sources, 3 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 is located in the 'vdaemon' service over DTLS (UDP port 12346), the same service affected by CVE-2026-20127.
First reported: 14.05.2026 20:452 sources, 2 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 is not a patch bypass of CVE-2026-20127 but a different issue in the 'vdaemon' networking stack.
First reported: 14.05.2026 20:452 sources, 2 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco became aware of limited exploitation of CVE-2026-20182 in May 2026.
First reported: 14.05.2026 20:453 sources, 4 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
Cisco recommends customers to apply the latest updates for CVE-2026-20182 as soon as possible.
First reported: 14.05.2026 20:453 sources, 3 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco recommends auditing '/var/log/auth.log' for entries related to 'Accepted publickey for vmanage-admin' from unknown IP addresses as an indicator of compromise.
First reported: 14.05.2026 20:453 sources, 3 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco recommends checking for suspicious peering events in logs, including unauthorized peer connections at unexpected times or from unrecognized IP addresses.
First reported: 14.05.2026 20:453 sources, 3 articlesShow sources
- Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access — thehackernews.com — 14.05.2026 20:45
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 was exploited in zero-day attacks prior to public disclosure, enabling attackers to gain administrative privileges on compromised Cisco Catalyst SD-WAN devices.
First reported: 14.05.2026 23:092 sources, 2 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CISA added CVE-2026-20182 to the Known Exploited Vulnerabilities Catalog on May 14, 2026, mandating federal agencies to patch affected systems by May 17, 2026.
First reported: 14.05.2026 23:093 sources, 3 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
Cisco recommends restricting access to SD-WAN management and control-plane interfaces to trusted internal networks or authorized IP addresses only.
First reported: 14.05.2026 23:092 sources, 2 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Attackers leveraged CVE-2026-20182 to insert rogue peers into the SD-WAN fabric, allowing them to establish encrypted connections and advertise malicious networks within targeted environments.
First reported: 14.05.2026 23:092 sources, 2 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CVE-2026-20182 was discovered by Rapid7 during research into another related vulnerability, CVE-2026-20127, which was patched in February 2026.
First reported: 14.05.2026 23:092 sources, 2 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
The flaw exists because the peering authentication mechanism in affected systems is malfunctioning, enabling crafted requests to grant high-privileged access without authentication.
First reported: 14.05.2026 23:092 sources, 2 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
Cisco’s advisory confirms exploitation was detected in May 2026, though no technical details were provided about the attack vector.
First reported: 14.05.2026 23:092 sources, 2 articlesShow sources
- Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks — www.bleepingcomputer.com — 14.05.2026 23:09
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
The authentication bypass in CVE-2026-20182 enables unauthenticated attackers to impersonate SD-WAN components such as a hub router (vHub) in cloud deployments to gain administrative access.
First reported: 14.05.2026 23:251 source, 1 articleShow sources
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
UAT-8616 leveraged CVE-2026-20182 to add SSH keys, modify NETCONF configurations, and escalate to root on compromised systems as part of post-compromise actions.
First reported: 14.05.2026 23:252 sources, 2 articlesShow sources
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
Researchers at Cisco Talos attribute UAT-8616 to activity overlapping with Operational Relay Box (ORB) networks commonly associated with Chinese state-sponsored threat actors.
First reported: 14.05.2026 23:252 sources, 2 articlesShow sources
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
CVE-2026-20182 is distinct from CVE-2026-20127 but leverages the same 'vdaemon' service over DTLS UDP port 12346, enabling administrative privilege access without authentication.
First reported: 14.05.2026 23:251 source, 1 articleShow sources
- Maximum Severity Cisco SD-WAN Bug Exploited in the Wild — www.darkreading.com — 14.05.2026 23:25
-
CISA added CVE-2026-20182 to the Known Exploited Vulnerabilities (KEV) catalog on May 15, 2026, mandating Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
CVE-2026-20182 is rated 10.0 on the CVSS scoring system, indicating maximum severity.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
Cisco attributed the active exploitation of CVE-2026-20182 with high confidence to UAT-8616, the same cluster behind the weaponization of CVE-2026-20127.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
UAT-8616 performed post-compromise actions after exploiting CVE-2026-20182, including adding SSH keys, modifying NETCONF configurations, and attempting to escalate to root privileges.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
The infrastructure used by UAT-8616 overlaps with Operational Relay Box (ORB) networks, with multiple threat clusters exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 beginning March 2026.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
Threat actors chained CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 to enable remote unauthenticated attackers to gain unauthorized access to devices.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
Publicly available proof-of-concept exploit code was leveraged to deploy web shells on compromised systems, including a JSP-based web shell codenamed XenShell.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
-
At least 10 different clusters have been linked to the exploitation of the three flaws, deploying various web shells, malware frameworks, and tools such as Godzilla, Behinder, XenShell, AdaptixC2, Sliver, XMRig, KScan, NimPlant, gsocket, and credential stealers.
First reported: 15.05.2026 08:281 source, 1 articleShow sources
- CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — thehackernews.com — 15.05.2026 08:28
Similar Happenings
Active exploitation of PAN-OS RCE zero-day CVE-2026-0300 via User-ID Authentication Portal
State-sponsored threat actors tracked as CL-STA-1132 exploited the critical PAN-OS firewall zero-day CVE-2026-0300 since at least April 9, 2026, achieving initial unauthenticated remote code execution by April 16–17, 2026. The vulnerability, a buffer overflow in the User-ID Authentication Portal service, enabled root-level arbitrary code execution on exposed PA-Series and VM-Series firewalls. Attackers injected shellcode into nginx worker processes and immediately began erasing forensic artifacts, including crash kernel messages and nginx records, to evade detection. Post-compromise activity included Active Directory enumeration and deployment of EarthWorm and ReverseSocks5 tunneling tools on April 29, 2026, targeting additional network devices. The adversary’s use of open-source tools and disciplined, intermittent operational sessions over weeks minimized signature-based detection while maintaining stealth. Over 5,400 PAN-OS VM-Series firewalls remain exposed on the internet, predominantly in Asia and North America. CISA added CVE-2026-0300 to its Known Exploited Vulnerabilities Catalog on May 7, 2026, mandating federal remediation by May 9, 2026. Palo Alto Networks released initial patches for CVE-2026-0300 on May 14, 2026.
Critical Cisco Identity and Webex services vulnerabilities patched; code execution and user impersonation risks resolved
Cisco has released patches addressing four critical vulnerabilities (CVSS 9.8–9.9) in Identity Services Engine (ISE) and Webex Services. The flaws include improper certificate validation in Webex SSO integration (CVE-2026-20184) enabling unauthenticated remote attackers to impersonate any user and gain unauthorized access to Webex services, and insufficient input validation in ISE (CVE-2026-20147, CVE-2026-20180, CVE-2026-20186) allowing authenticated remote code execution and command injection with potential root access. CVE-2026-20184 requires customer action—uploading a new SAML certificate for the identity provider (IdP) to Control Hub—to avoid service interruption. Successful exploitation of ISE vulnerabilities could render single-node ISE deployments unavailable, causing a denial of service. As of publication, Cisco PSIRT has no evidence of active exploitation in attacks.
Active exploitation of F5 BIG-IP RCE vulnerability CVE-2025-53521
CVE-2025-53521, initially disclosed as a DoS flaw in October 2025, has been reclassified as a critical RCE vulnerability (CVSS 9.8) following new exploitation activity in March 2026. Threat actors are actively exploiting the flaw by sending malicious traffic to virtual servers configured with BIG-IP AMP or systems in appliance mode to deploy webshells and other payloads. F5 has confirmed exploitation in the wild and published IOCs, while CISA added the flaw to its KEV catalog on March 28, 2026, mandating federal remediation within three days. Multiple actors are probing F5 infrastructure, with observed payload deviations and scanning targeting REST API endpoints. Shadowserver tracks over 240,000 exposed BIG-IP instances, and the NCSC has urged immediate patching in the UK due to confirmed exploitation activity. The flaw affects BIG-IP APM versions 15.1.0–15.1.10, 16.1.0–16.1.6, 17.1.0–17.1.2, and 17.5.0–17.5.1. Fixed versions (15.1.10.8, 16.1.6.1, 17.1.3, 17.5.1.3) are available, and F5 recommends forensic best practices including system rebuilding due to potential persistent malware in UCS backups.
TeamPCP escalates CanisterWorm campaign with geopolitical targeting and multi-vector attacks
TeamPCP has escalated its multi-vector CanisterWorm campaign into a geopolitically targeted operation, now confirmed to have leveraged the Trivy supply-chain attack as an access vector for the Checkmarx compromise. The group compromised PyPI packages (LiteLLM versions 1.82.7–1.82.8 and Telnyx versions 4.87.1–4.87.2) and Checkmarx KICS tooling to deliver credential-stealing malware, harvesting SSH keys, cloud credentials, Kubernetes secrets, database credentials, cryptocurrency wallets, TLS/SSL private keys, and bash history files. Checkmarx has publicly confirmed that the LAPSUS$ threat group leaked data stolen from its private GitHub repository, with access facilitated by the Trivy compromise attributed to TeamPCP. The leaked data, published on both dark web and clearnet portals, did not contain customer information, and Checkmarx has blocked access to the affected repository pending forensic investigation. The campaign’s scope expanded from initial npm package compromises to include GitHub repository hijacking (e.g., Aqua Security), Docker Hub compromise, and CI/CD pipeline targeting, while destructive payloads in Iranian Kubernetes environments highlight TeamPCP’s geopolitical alignment. On May 9, 2026, TeamPCP published a malicious version of the Checkmarx Jenkins AST plugin (2.0.13-829.vc72453fa_1c16) to the Jenkins Marketplace, defacing the plugin’s GitHub repository with pro-TeamPCP messaging. The compromise was facilitated using credentials stolen in the March 2026 Trivy supply-chain attack and occurred outside the plugin’s official release pipeline, lacking a git tag or GitHub release. Checkmarx isolated its GitHub repositories from customer environments and stated no customer data was stored in them. Users are advised to use version 2.0.13-829.vc72453fa_1c16 published on December 17, 2025, or older.
Interlock ransomware leverages Cisco FMC insecure deserialization zero-day (CVE-2026-20131) for root access
A critical insecure deserialization vulnerability in Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2026-20131 (CVSS 10.0), is being actively exploited by the Interlock ransomware group to gain unauthenticated remote root access on unpatched systems. The flaw enables unauthenticated remote attackers to bypass authentication and execute arbitrary Java code with root privileges via crafted HTTP requests to a specific endpoint. Exploitation has been observed as a zero-day since January 26, 2026, more than a month before public disclosure and patch availability. Cisco issued its first advisory for CVE-2026-20131 on March 4, 2026, and Amazon Threat Intelligence confirmed active exploitation by Interlock starting in late January. CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and ordered federal agencies to patch by March 22, 2026, under BOD 22-01. Post-exploitation tooling includes custom JavaScript/Java RATs, PowerShell reconnaissance scripts, Linux reverse proxy configuration tools, memory-resident web shells, and ConnectWise ScreenConnect for persistence. Compromised environments are leveraged for ransomware operations and secondary monetization. AWS’s detailed analysis reveals additional post-exploitation components such as a memory-resident backdoor intercepting HTTP requests, Volatility for RAM credential parsing, and Certify for Active Directory Certificate Services misconfiguration exploitation.