{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreibygujpq4y3cuuvhmxmnkixcku2cpr7rvvoumlcrqbjq7bzdhdvxe",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mltov52f7l72"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifceai6exoyzeehgkr3aour2yrxntbacxbquat3dnzlyhejyiycpa"
    },
    "mimeType": "image/jpeg",
    "size": 521168
  },
  "path": "/2026/05/cisco-catalyst-sd-wan-controller-auth.html",
  "publishedAt": "2026-05-14T17:45:20.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Cisco has released updates to address a maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller that it said has been exploited in limited attacks.\nThe vulnerability, tracked as CVE-2026-20182, carries a CVSS score of 10.0.\n\"A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly",
  "title": "Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access"
}