Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026

    May 17, 2026

    College Kid Shuts Down High Speed Trains With a Laptop and a Radio

    May 17, 2026

    GameSir G8+ MFi review: it’s the G8 Galileo, but better in every way

    May 17, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026
    Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026
    Cybersecurity

    Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026

    The Tech GuyBy The Tech GuyMay 17, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Cisco on Thursday announced the availability of patches for yet another critical SD-WAN zero-day vulnerability that has been exploited in attacks. It is the sixth SD-WAN flaw whose exploitation came to light in 2026. 

    Advertisement

    The new SD-WAN zero-day is tracked as CVE-2026-20182, and it has been described by Cisco as an authentication bypass vulnerability that can allow a remote attacker to gain admin privileges on the targeted system via specially crafted packets. 

    The vulnerability affects the peering authentication mechanism in Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage).

    Cisco said it became aware of active exploitation in May, and the company’s Talos threat intelligence and research group revealed that CVE-2026-20182 appears to have been exploited in limited attacks by a threat actor it tracks as UAT-8616.

    UAT-8616 has been described by Talos researchers as a highly sophisticated group, but its motivation and potential connections to a specific country or known group have not been revealed. 

    The same threat actor previously exploited CVE-2026-20127 to gain unauthorized access to SD-WAN systems.

    Advertisement. Scroll to continue reading.

    “UAT-8616 attempted to add SSH keys, modify NETCONF configurations, and escalate to root privileges. Our findings indicate that the infrastructure used by UAT-8616 to carry out exploitation and post-compromise activities also overlaps with the Operational Relay Box (ORB) networks that Talos monitors closely,” Talos explained. 

    Rapid7 has been credited for reporting CVE-2026-20182 to Cisco. The cybersecurity firm, which shared the technical details with the vendor on March 9, said it discovered the weakness during an analysis of CVE-2026-20127, noting that they are different flaws affecting the same component. 

    Rapid7 disclosed details of the vulnerability on Thursday, and Cisco has made indicators of compromise (IoCs) available to help companies detect potential attacks. 

    CISA has added CVE-2026-20182 to its KEV catalog, instructing federal agencies to address it within three days. 

    The KEV list currently includes 15 Cisco SD-WAN vulnerabilities, five of which were discovered this year. In addition to CVE-2026-20182, the other flaws are tracked as CVE-2026-20128, CVE-2026-20122, CVE-2026-20133, and CVE-2026-20127.

    An older SD-WAN vulnerability, CVE-2022-20775, was also flagged as exploited in the wild this year, alongside CVE-2026-20127.

    Cisco Talos on Thursday described 10 activity clusters observed exploiting SD-WAN vulnerabilities to deliver cryptocurrency miners, credential stealers, backdoors, webshells, and other malware and hacking tools.

    Related: Recent Cisco Catalyst SD-WAN Vulnerability Now Widely Exploited

    Related: Researcher Drops YellowKey, GreenPlasma Windows Zero-Days

    Related: Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Chrome 148 Update Patches Critical Vulnerabilities

    May 16, 2026

    TeamPCP Ups the Game, Releases Shai-Hulud Worm’s Source Code

    May 16, 2026

    PoC Code Published for Critical NGINX Vulnerability

    May 16, 2026

    OpenAI Hit by TanStack Supply Chain Attack

    May 16, 2026

    Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

    May 15, 2026

    In Other News: Big Tech vs Canada Encryption Bill, Cisco’s Free AI Security Spec, Audi App Flaws

    May 15, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026

    May 17, 2026

    College Kid Shuts Down High Speed Trains With a Laptop and a Radio

    May 17, 2026

    GameSir G8+ MFi review: it’s the G8 Galileo, but better in every way

    May 17, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.