{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigtme3texnmvzcoz4iidmhivlvxhzchelzi2wixeuxdn3bk6n4jkq",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mm7mkqo2cdi2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidxhjl7ayn2clpwg62hcopt3tjkfvhinmxoef6euvodskjpkevxsi"
    },
    "mimeType": "image/webp",
    "size": 13842
  },
  "path": "/cisco-patches-actively-exploited-catalyst-sd-wan-zero-day-that-can-give-attackers-admin-access/",
  "publishedAt": "2026-05-19T14:22:33.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Cisco patches actively exploited Catalyst SD-WAN zero-day that can give attackers admin access",
    "VPN Central"
  ],
  "textContent": "Cisco has released fixes for a maximum-severity vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that attackers have already exploited in limited real-world attacks. The flaw is tracked as CVE-2026-20182 and carries a CVSS 3.1 score of 10.0. Cisco says an unauthenticated remote attacker can exploit it to bypass authentication and gain […]\n\nThe post Cisco patches actively exploited Catalyst SD-WAN zero-day that can give attackers admin access appeared first on VPN Central.",
  "title": "Cisco patches actively exploited Catalyst SD-WAN zero-day that can give attackers admin access"
}