Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds Cisco SD-WAN CVE-2026-20182 to KEV after administrator access exploit

Lovable just helped a company bring vibecoding to their hardware

Cerebras IPO brings billions to Benchmark, but VC Eric Vishlier barely attended the meeting

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds Cisco SD-WAN CVE-2026-20182 to KEV after administrator access exploit
Identity

CISA adds Cisco SD-WAN CVE-2026-20182 to KEV after administrator access exploit

By May 15, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 15, 2026Vulnerability/Credential Theft

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability affecting Cisco Catalyst SD-WAN controllers to its Known Exploited Vulnerabilities (KEV) catalog and asked federal civilian executive branch (FCEB) agencies to fix the issue by May 17, 2026.

This vulnerability is a critical authentication bypass tracked as CVE-2026-20182. It is rated 10.0 in the CVSS scoring system, indicating maximum severity.

“An authentication bypass vulnerability exists in Cisco Catalyst SD-WAN Controllers and Managers that could allow an unauthenticated, remote attacker to bypass authentication and gain administrative privileges on affected systems,” CISA said.

In a separate advisory, Cisco attributed active exploitation of CVE-2026-20182 with high confidence to UAT-8616, the same cluster behind the weaponization of CVE-2026-20127 to gain unauthorized access to SD-WAN systems.

“UAT-8616 performed similar post-compromise actions after successfully exploiting CVE-2026-20182, similar to what was observed with the exploitation of CVE-2026-20127 by the same threat actor,” Cisco Talos said. “UAT-8616 added SSH keys, changed NETCONF settings, and attempted to elevate to root privileges.”

The infrastructure used by UAT-8616 to perform its exploits and post-compromise activities is assessed to overlap with Operational Relay Box (ORB) networks, and the cybersecurity firm has also observed multiple threat clusters exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 since March 2026.

The chaining of three vulnerabilities could allow a remote, unauthenticated attacker to gain unauthorized access to the device. These were added to CISA’s KEV catalog last month.

The campaign was found to leverage publicly available proof-of-concept exploit code to deploy a web shell on hacked systems, allowing operators to execute arbitrary bash commands. One such JavaServer Pages (JSP)-based web shell is code-named XenShell due to the use of a PoC released by ZeroZenX Labs.

At least 10 different clusters are associated with exploitation of the three flaws.

Cluster 1 (active since at least March 6, 2026), deploys the Godzilla web shell Cluster 2 (active since at least March 10, 2026), deploys the Behiner web shell Cluster 3 (active since at least March 4, 2026), deploys the XenShell web shell and a variant of Behinder Cluster 4 (active since at least March 3) Cluster 5 (active since at least March 13, 2026), deploys a variant of the Godzilla Webshell Cluster 5 (active since at least March 13, 2026), this malware agent was compiled from the AdaptixC2 Red Team framework Cluster 6 (active since at least March 5, 2026), deploys the Sliver command and control (C2) framework Cluster 7 (active since at least March 5, 2026), deploys a variant of the Godzilla Webshell Cluster 8 (active since at least March 10, 2026) deploys the XMRig miner, the KScan asset mapping tool, and a Nim-based backdoor, possibly based on NimPlant, with the ability to perform file operations, execute files using bash, and collect system information. Cluster 9 (active since at least March 17, 2026). Deploy the XMRig miner and peer-based proxy. A tunneling tool called gsocket Cluster 10 (active since at least March 13, 2026). This deploys a hashdump of the admin user, the JSON Web Token (JWT) key chunk used for REST API authentication, and a credential stealer that attempts to retrieve AWS credentials for vManage.

Cisco recommends that customers follow the guidance and recommendations outlined in the aforementioned vulnerability advisories to protect their environments.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLovable just helped a company bring vibecoding to their hardware

Related Posts

Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access

May 14, 2026

Stealer backdoor targeting developer secrets found in three node IPC versions

May 14, 2026

PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds Cisco SD-WAN CVE-2026-20182 to KEV after administrator access exploit

Lovable just helped a company bring vibecoding to their hardware

Cerebras IPO brings billions to Benchmark, but VC Eric Vishlier barely attended the meeting

What happens when AI starts building itself?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.