{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigtme3texnmvzcoz4iidmhivlvxhzchelzi2wixeuxdn3bk6n4jkq",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mm7mkqo2cdi2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreidxhjl7ayn2clpwg62hcopt3tjkfvhinmxoef6euvodskjpkevxsi"
},
"mimeType": "image/webp",
"size": 13842
},
"path": "/cisco-patches-actively-exploited-catalyst-sd-wan-zero-day-that-can-give-attackers-admin-access/",
"publishedAt": "2026-05-19T14:22:33.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Cisco patches actively exploited Catalyst SD-WAN zero-day that can give attackers admin access",
"VPN Central"
],
"textContent": "Cisco has released fixes for a maximum-severity vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that attackers have already exploited in limited real-world attacks. The flaw is tracked as CVE-2026-20182 and carries a CVSS 3.1 score of 10.0. Cisco says an unauthenticated remote attacker can exploit it to bypass authentication and gain […]\n\nThe post Cisco patches actively exploited Catalyst SD-WAN zero-day that can give attackers admin access appeared first on VPN Central.",
"title": "Cisco patches actively exploited Catalyst SD-WAN zero-day that can give attackers admin access"
}