24h | 7d | 30d

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

Description

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 

Statistics

  • 15 Posts
  • 9 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

⚠️ Alerte CERT-FR ⚠️

La vulnérabilité CVE-2026-20127 affecte Cisco Catalyst SD-WAN et permet à un attaquant non-authentifié de se connecter à un compte avec des privilèges élevés. Elle est activement exploitée.

cert.ssi.gouv.fr/alerte/CERTFR

  • 2
  • 1
  • 1
  • 15h ago
Profile picture fallback

Si vous administrez une infrastructure réseau utilisant Cisco Catalyst SD-WAN, une vulnérabilité critique actuellement exploitée sur Internet permet à un attaquant distant sans authentification d’obtenir un accès administrateur au système. Une exploitation réussie peut permettre de modifier la configuration réseau, d’espionner les communications ou de maintenir un accès discret à l’infrastructure.

Les investigations effectuées par Cisco Talos montrent que ces attaques sont menées par un acteur sophistiqué et que des compromissions ont été observées depuis au moins 2023, avec dans certains cas une élévation de privilèges jusqu’au contrôle complet du système après modification de la version logicielle.

Selon Cisco, un système SD-WAN peut être particulièrement exposé si :

  • le contrôleur SD-WAN est accessible depuis Internet

  • des ports sont ouverts vers l’extérieur

  • l’accès n’est pas limité aux adresses IP autorisées

Les éléments suivants peuvent indiquer qu’un système SD-WAN a été compromis :

  • une nouvelle connexion SD-WAN inconnue

  • un accès administrateur inattendu

  • des journaux système effacés ou incomplets

  • des mises à jour ou rétrogradations non planifiées

Cisco recommande de vérifier certains journaux système pour détecter une compromission éventuelle.

Par exemple, dans le fichier /var/log/auth.log, une connexion SSH au compte vmanage-admin depuis une adresse IP inconnue peut être suspecte :

Accepted publickey for vmanage-admin from -adresse IP inconnue-

Dans ce cas, il faut vérifier que l’adresse IP correspond bien à un équipement SD-WAN autorisé (visible dans l’interface SD-WAN Manager → Devices → System IP).

PRODUITS CONCERNÉS

Cette vulnérabilité affecte :

  • Cisco Catalyst SD-WAN Controller

  • Cisco Catalyst SD-WAN Manager

Quel que soit le mode de déploiement :

  • Déploiement sur site (On-Premise)

  • Cisco Hosted SD-WAN Cloud

  • Cisco Hosted SD-WAN Cloud – Cisco Managed

  • Cisco Hosted SD-WAN Cloud – Environnement FedRAMP

ACTIONS RECOMMANDÉES

  • Application des mises à jour recommandée dès que possible

  • Surveillance des connexions et changements inhabituels recommandée

  • Restreindre l’accès réseau aux seuls équipements autorisés

  • Conserver les journaux sur un serveur externe si possible

  • Placer les contrôleurs derrière un firewall

🩹
👇
sec.cloudapps.cisco.com/securi

analyse Cisco Talos
👇
sec.cloudapps.cisco.com/securi

Détails Vulnérabilité critique CVE-2026-20127
👇
cve.circl.lu/vuln/CVE-2026-201

Investigation conducted by intelligence partners identified that the actor likely escalated to root user via a software version downgrade

👇
cyber.gov.au/sites/default/fil

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127, was actively exploited in zero-day attacks that allowed remote attackers to compromise controllers and add malicious rogue peers to targeted networks.
  • 2
  • 4
  • 0
  • 14h ago
Profile picture fallback
脅威アクターは2023年からCisco SD-WANゼロデイ脆弱性を悪用している(CVE-2026-20127) Threat actor leveraged Cisco SD-WAN zero-day since 2023 (CVE-2026-20127) #HelpNetSecurity (Feb 25) www.helpnetsecurity.com/2026/02/25/c...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Critical Cisco SD-WAN bug (CVE-2026-20127) exploited in zero-day attacks since 2023. Allows attackers to compromise controllers & add rogue peers. Update immediately! #cybersecurity #Cybersecurity #News
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
A maximum-severity authentication bypass vulnerability (CVE-2026-20127, CVSS 10.0) in Cisco Catalyst SD-WAN Controller and Manager has been actively exploited since 2023, allowing unauthenticated attackers to gain administrative privileges.
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access thehackernews.com/2026/02/cisc...
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Allarme sicurezza: sfruttamento attivo della vulnerabilità Cisco Catalyst SD-WAN 📌 Link all'articolo : www.redhotcyber.com/post/all... #redhotcyber #news #cybersecurity #hacking #ciscotalos #sdwan #vulnerabilita #cve202620127 #sicurezzainformatica
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Cisco SD-WANの重大な脆弱性、2023年からゼロデイとして悪用される:CVE-2026-20127 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44133/
  • 0
  • 0
  • 0
  • Last hour
Profile picture fallback
~Cisa~ Threat actors are actively exploiting CVE-2026-20127 and CVE-2022-20775 for initial access and privilege escalation on Cisco SD-WAN systems. - IOCs: CVE-2026-20127, CVE-2022-20775 - #CVE202620127 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
~Cisa~ CISA adds two actively exploited Cisco SD-WAN vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, urging immediate remediation. - IOCs: CVE-2022-20775, CVE-2026-20127 - #Cisco #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
CISAが2つの既知の脆弱性をカタログに追加 CISA Adds Two Known Exploited Vulnerabilities to Catalog #CISA (Feb 25) CVE-2022-20775 Cisco Catalyst SD-WAN パストラバーサル脆弱性 CVE-2026-20127 Cisco Catalyst SD-WAN コントローラおよびマネージャの認証バイパスの脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CVE-2022-20775 Cisco Catalyst SD-WAN Path Traversal Vulnerability CVE-2026-20127 Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Soliton Systems K.K.
  • FileZen

13 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.0
HIGH (8.8)
EPSS
18.59%

Description

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture fallback

CISA has confirmed the active exploitation of a critical OS Command Injection vulnerability (CVE-2026-25108) in FileZen by Soliton Systems K.K., adding it to the Known Exploited Vulnerabilities (KEV) Catalog. Organizations using FileZen are urged to apply security updates immediately to prevent unauthorized access and system compromise.
cybersecuritynews.com/cisa-con

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

CISA warns of active exploitation of a FileZen vulnerability (CVE-2026-25108) (Feb 25). IBM's 2026 X-Force Threat Index reveals escalating AI-driven attacks exploiting basic security gaps (Feb 25). Geopolitically, China banned exports to 40 Japanese firms (Feb 24), and Iran-US talks continue in Geneva (Feb 25). DARPA advances kilometer-range X-ray vision technology (Feb 25).
#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 1
  • 0
  • 22h ago
Profile picture fallback
CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability reconbee.com/cisa-confirm... #CISA #FileZen #vulnerability #cybersecurity #cyberattacks
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
CISA flags exploited FileZen command injection bug, patch now! (CVE-2026-25108) 📖 Read more: www.helpnetsecurity.com/2026/02/25/c... #cybersecurity #cybersecuritynews #0day #filesharing #ransomware #vulnerability
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
CISA が FileZen のコマンドインジェクションバグを報告、今すぐパッチを適用してください! (CVE-2026-25108) CISA flags exploited FileZen command injection bug, patch now! (CVE-2026-25108) #HelpNetSecurity (Feb 25) www.helpnetsecurity.com/2026/02/25/c...
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • SolarWinds
  • Serv-U

24 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

Statistics

  • 4 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated execution

Attack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectors

Historical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creation

Source: bleepingcomputer.com/news/secu

Follow us for tactical advisories and vulnerability intelligence.

Comment with your detection or hardening recommendations.

  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback

latest SolarWinds CVEs.. all critical lmao.. patch patch patch!

CVE-2025-40538 - Improper Privilege Management
CVE-2025-40539 - Incorrect Type Conversion or Cast
CVE-2025-40540 - Incorrect Type Conversion or Cast
CVE-2025-40541 - Incorrect Type Conversion or Cast & Authorization Bypass Through User-Controlled Key

SolarWinds Serv-U 15.5.3 and prior versions

hecate.pw/vulnerabilities?sear

#vulnerability #security #solarwinds

  • 0
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
Critical update for enterprise defenders. SolarWinds fixes four Serv-U flaws - including CVE-2025-40538 - that could enable root/admin escalation on unpatched systems. Even with high-privilege prerequisites, file transfer software is historically a ransomware magnet... #CyberSecurity #SolarWinds
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
SolarWinds Serv-Uが4件の重大な脆弱性を修正(CVE-2025-40538 / 40539 / 40540 / 40541) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN

30 Sep 2022
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.23%

Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

Statistics

  • 5 Posts
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

@leb Yep. And they finally updated the one in my original post:

In February 2026, the Cisco PSIRT became aware of attempted exploitation of the vulnerability described in CVE-2022-20775.

  • 0
  • 1
  • 0
  • 10h ago

Bluesky

Profile picture fallback
~Cisa~ Threat actors are actively exploiting CVE-2026-20127 and CVE-2022-20775 for initial access and privilege escalation on Cisco SD-WAN systems. - IOCs: CVE-2026-20127, CVE-2022-20775 - #CVE202620127 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
~Cisa~ CISA adds two actively exploited Cisco SD-WAN vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, urging immediate remediation. - IOCs: CVE-2022-20775, CVE-2026-20127 - #Cisco #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
CISAが2つの既知の脆弱性をカタログに追加 CISA Adds Two Known Exploited Vulnerabilities to Catalog #CISA (Feb 25) CVE-2022-20775 Cisco Catalyst SD-WAN パストラバーサル脆弱性 CVE-2026-20127 Cisco Catalyst SD-WAN コントローラおよびマネージャの認証バイパスの脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CVE-2022-20775 Cisco Catalyst SD-WAN Path Traversal Vulnerability CVE-2026-20127 Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Zyxel
  • EX3510-B0 firmware

24 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.39%

KEV

Description

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Fediverse

Profile picture fallback

NCTAG 5.8: The Zyxel Perimeter Crisis
120,000 targets identified. The Cyber Mind Co™ has released Global Watchtower Manifest (GWM) NCTAG 1.1, detailing a critical Unauthenticated RCE (CVE-2025-13942) in Zyxel devices

thecybermind.co/2026/02/25/zyx

thecybermind.co/2026/02/25/zyx

  • 0
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
📌 CVE-2025-13942 - A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacke... https://www.cyberhub.blog/cves/CVE-2025-13942
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • OpenClaw
  • OpenClaw

01 Feb 2026
Published
03 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.05%

KEV

Description

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture fallback

MITRE ATLAS documente plusieurs incidents majeurs autour d’OpenClaw, un agent IA autonome open-source : interfaces exposées, skills malveillants en supply chain, RCE one-click (CVE-2026-25253) et C2 via prompt injection indirecte. Un agent avec accès shell, filesystem et réseau crée une surface d’attaque complexe. Isolation stricte et gouvernance des secrets indispensables.

⚡️linkeaz.net/fr/posts/openclaw-

#IA #aisecurity #agenticAI #infosec #supplychain #cybersecurity #news #tech

  • 1
  • 1
  • 0
  • 20h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture fallback
[ZDI-26-124|CVE-2025-15060] claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vulnerability (CVSS 9.8; Credit: Peter Girnus of Trend Research) zerodayinitiative.com/advisories/Z...
  • 1
  • 0
  • 1
  • 14h ago

Overview

  • coturn
  • coturn

25 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.03%

KEV

Description

Coturn is a free open source implementation of TURN and STUN Server. Coturn is commonly configured to block loopback and internal ranges using "denied-peer-ip" and/or default loopback restrictions. CVE-2020-26262 addressed bypasses involving "0.0.0.0", "[::1]" and "[::]", but IPv4-mapped IPv6 is not covered. When sending a "CreatePermission" or "ChannelBind" request with the "XOR-PEER-ADDRESS" value of "::ffff:127.0.0.1", a successful response is received, even though "127.0.0.0/8" is blocked via "denied-peer-ip". The root cause is that, prior to the updated fix implemented in version 4.9.0, three functions in "src/client/ns_turn_ioaddr.c" do not check "IN6_IS_ADDR_V4MAPPED". "ioa_addr_is_loopback()" checks "127.x.x.x" (AF_INET) and "::1" (AF_INET6), but not "::ffff:127.0.0.1." "ioa_addr_is_zero()" checks "0.0.0.0" and "::", but not "::ffff:0.0.0.0." "addr_less_eq()" used by "ioa_addr_in_range()" for "denied-peer-ip" matching: when the range is AF_INET and the peer is AF_INET6, the comparison returns 0 without extracting the embedded IPv4. Version 4.9.0 contains an updated fix to address the bypass of the fix for CVE-2020-26262.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Fediverse

Profile picture fallback

Two weeks ago we published our analysis of TURN security threats. Today: how to fix them.

New guides covering implementation-agnostic best practices (IP range blocking, protocol hardening, rate limiting, deployment patterns) and coturn-specific configuration with copy-paste templates at three security levels.

Best practices: enablesecurity.com/blog/turn-s
coturn guide: enablesecurity.com/blog/coturn
Config templates on GitHub: github.com/EnableSecurity/cotu

coturn 4.9.0 dropped yesterday with fixes for CVE-2026-27624 (IPv4-mapped IPv6 bypass of deny rules) and an inverted web admin password check that had been broken since ~2019. The guides cover workarounds for older versions.

  • 0
  • 1
  • 0
  • 22h ago

Overview

  • ImageMagick
  • ImageMagick

24 Feb 2026
Published
24 Feb 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.03%

KEV

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.xml is applied. Actions to prevent reading from files have been taken in versions .7.1.2-15 and 6.9.13-40 But it make sure writing is also not possible the following should be added to one's policy. This will also be included in ImageMagick's more secure policies by default.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 19 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25965 - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s... https://www.cyberhub.blog/cves/CVE-2026-25965
  • 0
  • 1
  • 0
  • 19h ago

Overview

  • Phpscriptsmall
  • Fiverr Clone Script

20 Feb 2026
Published
20 Feb 2026
Updated

CVSS v4.0
HIGH (8.8)
EPSS
Pending

KEV

Description

Fiverr Clone Script 1.2.2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the page parameter. Attackers can supply malicious SQL syntax in the page parameter to extract sensitive database information or modify database contents.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
📌 CVE-2019-25444 - Fiverr Clone Script 1.2.2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQ... https://www.cyberhub.blog/cves/CVE-2019-25444
  • 0
  • 1
  • 0
  • Last hour
Showing 1 to 10 of 75 CVEs