{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreibygujpq4y3cuuvhmxmnkixcku2cpr7rvvoumlcrqbjq7bzdhdvxe",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mltov52f7l72"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifceai6exoyzeehgkr3aour2yrxntbacxbquat3dnzlyhejyiycpa"
},
"mimeType": "image/jpeg",
"size": 521168
},
"path": "/2026/05/cisco-catalyst-sd-wan-controller-auth.html",
"publishedAt": "2026-05-14T17:45:20.000Z",
"site": "https://thehackernews.com",
"textContent": "Cisco has released updates to address a maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller that it said has been exploited in limited attacks.\nThe vulnerability, tracked as CVE-2026-20182, carries a CVSS score of 10.0.\n\"A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly",
"title": "Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access"
}