24h | 7d | 30d

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.15%

KEV

Description

A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role. The vulnerability is due to improper authentication for requests that are sent to the API. An attacker could exploit this vulnerability by sending a crafted request to the API of an affected system. A successful exploit could allow the attacker to execute commands with the privileges of the netadmin role. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability. 

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
~Certeu~ Cisco patched critical auth bypass flaws in SD-WAN products. CVE-2026-20127 (CVSS 10) is actively exploited in the wild for admin access. - IOCs: CVE-2026-20127, CVE-2026-20129, CVE-2022-20775 - #CVE202620127 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • yhirose
  • cpp-httplib

11 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.08%

KEV

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on the Content-Length header value received from the server with no input validation and no exception handling. std::stoull throws std::invalid_argument for non-numeric strings and std::out_of_range for values exceeding ULLONG_MAX. Since nothing catches these exceptions, the C++ runtime calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to — including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions can crash the client application with a single HTTP response. No authentication is required. No interaction from the end user is required. The crash is deterministic and immediate. This vulnerability is fixed in 0.37.1.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Critical security advisory for #Fedora 44: The cpp-httplib package has been updated to version 0.37.1 to address multiple high-severity DoS vulnerabilities (CVE-2026-31870, CVE-2026-29076, CVE-2026-28435). Read more:👉 tinyurl.com/ybtpw3xm #Security
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • yhirose
  • cpp-httplib

04 Mar 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::set_payload_max_length() on the decompressed request body when using HandlerWithContentReader (streaming ContentReader) with Content-Encoding: gzip (or other supported encodings). A small compressed payload can expand beyond the configured payload limit and be processed by the application, enabling a payload size limit bypass and potential denial of service (CPU/memory exhaustion). This vulnerability is fixed in 0.35.0.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Critical security advisory for #Fedora 44: The cpp-httplib package has been updated to version 0.37.1 to address multiple high-severity DoS vulnerabilities (CVE-2026-31870, CVE-2026-29076, CVE-2026-28435). Read more:👉 tinyurl.com/ybtpw3xm #Security
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • yhirose
  • cpp-httplib

07 Mar 2026
Published
09 Mar 2026
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
0.05%

KEV

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses std::regex (libstdc++) to parse RFC 5987 encoded filename* values in multipart Content-Disposition headers. The regex engine in libstdc++ implements backtracking via deep recursion, consuming one stack frame per input character. An attacker can send a single HTTP POST request with a crafted filename* parameter that causes uncontrolled stack growth, resulting in a stack overflow (SIGSEGV) that crashes the server process. This issue has been patched in version 0.37.0.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Critical security advisory for #Fedora 44: The cpp-httplib package has been updated to version 0.37.1 to address multiple high-severity DoS vulnerabilities (CVE-2026-31870, CVE-2026-29076, CVE-2026-28435). Read more:👉 tinyurl.com/ybtpw3xm #Security
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
2.60%

Description

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
~Certeu~ Cisco patched critical auth bypass flaws in SD-WAN products. CVE-2026-20127 (CVSS 10) is actively exploited in the wild for admin access. - IOCs: CVE-2026-20127, CVE-2026-20129, CVE-2022-20775 - #CVE202620127 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN

30 Sep 2022
Published
02 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.50%

Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
~Certeu~ Cisco patched critical auth bypass flaws in SD-WAN products. CVE-2026-20127 (CVSS 10) is actively exploited in the wild for admin access. - IOCs: CVE-2026-20127, CVE-2026-20129, CVE-2022-20775 - #CVE202620127 #Cisco #ThreatIntel
  • 0
  • 0
  • 0
  • 23h ago
Showing 51 to 56 of 56 CVEs