{"id":14807,"date":"2026-05-16T01:37:22","date_gmt":"2026-05-16T01:37:22","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14807"},"modified":"2026-05-16T01:37:22","modified_gmt":"2026-05-16T01:37:22","slug":"new-cisco-sd-wan-zero-day-grants-admin-entry","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14807","title":{"rendered":"New Cisco SD-WAN Zero-Day Grants Admin Entry"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"generic-article\">\n<p class=\"text-muted\">\n                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/network-firewalls-network-access-control-c-452\" id=\"asset_topic_1_1\">Community Firewalls, Community Entry Management<\/a><br \/>\n                                                    ,<br \/>\n                                                            <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/security-operations-c-444\" id=\"asset_topic_1_2\">Safety Operations<\/a>\n                                                    <\/p>\n<p>                    <span class=\"article-sub-title\">Damaged vdaemon Peering Authentication Allows Unauthenticated Admin Entry<\/span><br \/>\n                <span class=\"article-byline\"><br \/>\n                                                <a rel=\"nofollow\" target=\"_blank\" class=\"author-link\" href=\"https:\/\/www.bankinfosecurity.com\/authors\/tiffany-wang-i-7880\">Tiffany Wang<\/a>                                                     \u2022<br \/>\n                        <span class=\"text-nowrap\">Could 15, 2026<\/span> \u00a0 \u00a0 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/new-cisco-sd-wan-zero-day-grants-admin-access-a-31708#disqus_thread\"\/><\/span><\/p>\n<figure>\n                <img decoding=\"async\" src=\"https:\/\/ismg-cdn.nyc3.cdn.digitaloceanspaces.com\/articles\/new-cisco-sd-wan-zero-day-grants-admin-access-image_large-2-a-31708.jpg\" alt=\"New Cisco SD-WAN Zero-Day Grants Admin Access\" class=\"img-responsive \"\/><figcaption>Picture: Anucha Cheechang\/Shutterstock<\/figcaption><\/figure>\n<p>A maximum-severity vulnerability in Cisco Catalyst SD-WAN Controller is being actively exploited, giving attackers administrative privileges with out authentication.<\/p>\n<p><b>See Additionally:<\/b> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bankinfosecurity.com\/multi-cloud-security-drives-firewall-evolution-a-31357?rf=RAM_SeeAlso\">Multi-Cloud Safety Drives Firewall Evolution<\/a><\/p>\n<p>The authentication bypass vulnerability, assigned <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-20182\" target=\"_blank\">CVE-2026-20182<\/a> with a CVSS rating of 10, stems from a damaged peering authentication mechanism within the <code>vdaemon<\/code> service. It permits attackers to govern SD-WAN&#8217;s community configuration.<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Company <a rel=\"nofollow\" target=\"_blank\" href=\" https:\/\/www.cisa.gov\/news-events\/alerts\/2026\/05\/14\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\">added<\/a> the flaw Thursday to its catalog of identified exploited vulnerabilities and gave federal companies till Sunday to repair it.<\/p>\n<p>Cisco attributes the exploit to a menace actor it tracks as UAT-8616, which <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.talosintelligence.com\/uat-8616-sd-wan\/\" target=\"_blank\">had beforehand breached<\/a> the identical service in SD-WAN in hacking incidents relationship again to 2023. Whereas the brand new vulnerability abuses a unique concern within the networking service, the 2 exploits adopted the identical steps of execution.<\/p>\n<p>&#8220;UAT-8616 tried so as to add SSH keys, modify NETCONF configurations and escalate to root privileges,&#8221; Cisco&#8217;s menace intelligence group Talos <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.talosintelligence.com\/sd-wan-ongoing-exploitation\/\" target=\"_blank\">stated<\/a>.<\/p>\n<p>Cisco stated UAT-8616 targets vital infrastructure sectors, and its infrastructure overlaps with operational relay field networks monitored by Cisco Talos. ORB networks are collections of servers and hacked internet-connected gadgets often linked to Chinese language espionage.<\/p>\n<p>Cybersecurity agency <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.rapid7.com\/blog\/post\/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed\/\" target=\"_blank\">Rapid7<\/a> found the newest exploit whereas researching the earlier SD-WAN vulnerability. The flaw exposes a number of ports together with UDP 12346 &#8211; the control-plane peering port utilized by <code>vdaemon<\/code> as a trusted communications channel between controllers and edge gadgets.<\/p>\n<p>UDP port 12346 &#8220;carries Overlay Administration Protocol (OMP) messages together with route commercials, Transport Places (TLOC) tables and peer state &#8211; the whole thing of the SD-WAN overlay routing cloth. Compromising this service means compromising the community,&#8221; Rapid7 researchers Jonah Burgess and Stephen Fewer stated.<\/p>\n<p>Cisco <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-rpa2-v69WY2SW?vs_f=Cisco%20Security%20Advisory%26vs_cat%3DSecurity%20Intelligence%26vs_type%3DRSS%26vs_p%3DCisco%20Catalyst%20SD-WAN%20Controller%20Authentication%20Bypass%20Vulnerability%26vs_k%3D1\" target=\"_blank\">stated<\/a> it discovered restricted exploitation of the vulnerability this month, recommending its clients to improve to fastened software program releases.<\/p>\n<p>The brand new spherical of SD-WAN exploitation comes as Cisco introduced a 4,000-person layoff this week and informed traders it has integrated Anthropic&#8217;s Mythos into its manufacturing system and patch growth.<\/p>\n<p>Different vulnerabilities in SD-WAN, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-authbp-qwCX8D4v\" target=\"_blank\">CVE-2026-20133, CVE-2026-20128 and CVE-2026-20122<\/a>, are additionally being exploited since March following public proof-of-concept code.<\/p>\n<p>&#8220;A number of vulnerabilities in Cisco Catalyst SD-WAN Supervisor, previously SD-WAN vManage, may enable an attacker to entry an affected system, elevate privileges to root, acquire entry to delicate data and overwrite arbitrary recordsdata,&#8221; Cisco <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-authbp-qwCX8D4v\" target=\"_blank\">stated<\/a>.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Community Firewalls, Community Entry Management , Safety Operations Damaged vdaemon Peering Authentication Allows Unauthenticated Admin Entry Tiffany Wang \u2022 Could 15, 2026 \u00a0 \u00a0 Picture: Anucha Cheechang\/Shutterstock A maximum-severity vulnerability in Cisco Catalyst SD-WAN Controller is being actively exploited, giving attackers administrative privileges with out authentication. See Additionally: Multi-Cloud Safety Drives Firewall Evolution The authentication [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[539,895,131,5376,9082,4218],"class_list":["post-14807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-access","tag-admin","tag-cisco","tag-grants","tag-sdwan","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14807"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14807\/revisions"}],"predecessor-version":[{"id":14808,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14807\/revisions\/14808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14809"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-16 03:14:34 UTC -->