Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Maximum Severity Cisco SD-WAN Bug Exploited in the Wild
    Cybersecurity

    Maximum Severity Cisco SD-WAN Bug Exploited in the Wild

    adminBy adminMay 15, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Maximum Severity Cisco SD-WAN Bug Exploited in the Wild
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A highly sophisticated threat actor is exploiting a critical vulnerability in Cisco Catalyst Software-Defined Wide Area Network (SD-WAN) Controllers.

    Rapid7 disclosed CVE-2026-20182, an authentication bypass vulnerability in Cisco’s market-leading network management solution. By allowing unauthenticated attackers free rein over one of an organization’s most powerful tools, it earned the highest possible 10 out of 10 score in the Common Vulnerability Scoring System (CVSS).

    In an updated blog post today, Rapid7 director of vulnerability intelligence Douglas McKee hammered home just how serious an issue this was. “Attackers have become very good at turning central infrastructure weaknesses into high impact operations,” he warned, and for nation-states in particular, “an SD-WAN controller is a great place to do [espionage], because it lives in the middle of trust relationships most organizations rarely question.” To avoid sensationalizing, McKee added, “To be fair, not every bug turns into Internet-wide exploitation overnight.”

    Related:‘Dirty Frag’ Exploit Poised to Blow Up on Enterprise Linux Distros

    In fact, CVE-2026-20182 had been exploited overnight. In a separate publication that same day, researchers at Cisco Talos flagged that a group it tracks as UAT-8616 has already gotten to it.

    Hackers Leverage Critical Bugs in Cisco Catalyst

    Not only is CVE-2026-20182 not the first vulnerability discovered in Cisco Catalyst this year, it isn’t even the first authentication bypass vulnerability with a “critical” 10 score on the CVSS scale.

    Back in February, Cisco revealed half a dozen issues with Catalyst. The cream was CVE-2026-20127, which gave unauthenticated attackers the power to log into Cisco controllers as high-privileged users. Though Cisco characterized in-the-wild exploitation of CVE-2026-20127 as “limited,” Talos researchers suggested that it was extensive, lasting at least a few years — a lifetime in cyber years. They labeled the threat cluster actor behind that exploitation “UAT-8616,” calling it “highly sophisticated.”

    Cisco patched CVE-2026-20127, threatening to derail UAT-8616’s fun. The threat actor was unphased, though, as it seems to have almost immediately picked up with yet another, nearly identical vulnerability in the very same product line.

    The difference is really only a technicality. In February, the issue was that the Catalyst Controller and Manager weren’t rigorous enough in authenticating SD-WAN components, so any hacker off the street could use a specially crafted message to impersonate a device and get in. This month, the problem is that the Controller doesn’t actually verify the legitimacy of a specific type of component — a hub router, “vHub,” used in cloud deployments — before authenticating it. As a consequence, and as with the February CVE before it, attackers can use this new CVE to obtain administrative privileges in targeted systems and access “NETCONF,” a protocol through which they could mess with all kinds of network configurations.

    Related:Cyber Espionage Group Targets Aviation Firms to Steal Map Data

    What Might Happen Next to Cisco’s Customers

    The first time UAT-8616 exploited a Catalyst authentication bypass bug, it took advantage of its access to exploit an older vulnerability, CVE-2022-20775, and escalate from privileged to outright root access. Without spelling it out, Talos indicated that the threat actor might have been “looking to establish persistent footholds into high-value organizations including Critical Infrastructure (CI) sectors.” 

    This time around, the researchers observed the threat actor performing “similar post-compromise actions” after winning initial access, including adding SSH keys to targeted systems, modifying NETCONF configurations, and escalating to root.

    Little is known of UAT-8616 beyond all this, but those willing to speculate might note that the most sophisticated threat actors who abuse edge technologies, especially Cisco products, are usually Chinese. On top of that, in its latest blog, Talos wrote that UAT-8616 “overlaps with the Operational Relay Box (ORB) networks” it tracks, ORBs being most common among Chinese groups.

    Related:Why Security Leadership Makes or Breaks a Pen Test

    Organizations that hope to avoid UAT-8616 should implement Cisco’s newly released patch for CVE-2026-20182. Otherwise, “Centralized control planes do carry higher consequences when a vulnerability occurs, because a single compromised controller can affect the entire overlay network,” warns Jonah Burgess, senior security researcher at Rapid7.

    Despite the huge risks from vulnerabilities that seem to be coming hard and fast these days, Burgess suggests that organizations not be too dissuaded. “Centralized SD-WAN management solves real operational problems, and the architecture itself isn’t the flaw,” he says.

    Don’t miss the latest Dark Reading Confidential podcast, How the Story of a USB Penetration Test Went Viral. Two decades ago Dark Reading posted its first blockbuster piece — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author, Steve Stasiukonis. Listen now!

    bug Cisco Exploited Maximum SDWAN severity Wild
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle publishes guide on optimizing for generative AI features
    Next Article In Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App Flaws
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google I/O 2026, Google Marketing Live 2026, and the Future of Marketing

    May 21, 2026

    LLM Guidance Doesn’t Transfer The Way SEO Guidance Did

    May 21, 2026

    Forward launches Predict to take the guesswork out of network changes

    May 21, 2026

    AI citation tracking tools to monitor and increase visibility

    May 21, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,223)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (307)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google I/O 2026, Google Marketing Live 2026, and the Future of Marketing

    May 21, 2026

    LLM Guidance Doesn’t Transfer The Way SEO Guidance Did

    May 21, 2026

    Forward launches Predict to take the guesswork out of network changes

    May 21, 2026
    Most Popular
    • Google I/O 2026, Google Marketing Live 2026, and the Future of Marketing
    • LLM Guidance Doesn’t Transfer The Way SEO Guidance Did
    • Forward launches Predict to take the guesswork out of network changes
    • AI citation tracking tools to monitor and increase visibility
    • Google expands Universal Commerce Protocol and launches new agentic shopping tools
    • What is PPC? A starter guide to pay-per-click advertising
    • WordPress 7.0 Launches With Native AI Integration
    • Best AI search analytics tools for marketing teams
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.