{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifhs3en2e2stzopq4tfff6wgav6h5cgm6igmajwddx7ldpiyxexq4",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mfqowlsfvnp2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifazgoporocdlri6eulwn7l5v64xt2pmlyytrl6w3ldnhufhkfyom"
    },
    "mimeType": "image/jpeg",
    "size": 270875
  },
  "path": "/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html",
  "publishedAt": "2026-02-26T06:13:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) has come under active exploitation in the wild as part of malicious activity that dates back to 2023.\nThe vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated remote attacker to bypass authentication and obtain",
  "title": "Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access"
}