{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifhs3en2e2stzopq4tfff6wgav6h5cgm6igmajwddx7ldpiyxexq4",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mfqowlsfvnp2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifazgoporocdlri6eulwn7l5v64xt2pmlyytrl6w3ldnhufhkfyom"
},
"mimeType": "image/jpeg",
"size": 270875
},
"path": "/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html",
"publishedAt": "2026-02-26T06:13:00.000Z",
"site": "https://thehackernews.com",
"textContent": "A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023.\nThe vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated remote attacker to bypass authentication and obtain",
"title": "Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access"
}