By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits
Tech News

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

By Viral Trending Content 4 Min Read
Share
SHARE

Ravie LakshmananMay 15, 2026Vulnerability / Credential Theft

The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026.

The vulnerability is a critical authentication bypass tracked as CVE-2026-20182. It’s rated 10.0 on the CVSS scoring system, indicating maximum severity.

“Cisco Catalyst SD-WAN Controller and Manager contain an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system,” CISA said.

In a separate advisory, Cisco attributed the active exploitation of CVE-2026-20182 with high confidence to UAT-8616, the same cluster behind the weaponization of CVE-2026-20127 to gain unauthorized access to SD-WAN systems.

“UAT-8616 performed similar post-compromise actions after successfully exploiting CVE-2026-20182, as was observed in the exploitation of CVE-2026-20127 by the same threat actor,” Cisco Talos said. “UAT-8616 attempted to add SSH keys, modify NETCONF configurations, and escalate to root privileges.”

It’s assessed that the infrastructure used by UAT-8616 to carry out exploitation and post-compromise activities overlaps with Operational Relay Box (ORB) networks, with the cybersecurity company also observing multiple threat clusters exploiting CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 beginning March 2026.

The three vulnerabilities, when chained together, can allow a remote unauthenticated attacker to gain unauthorized access to the device. They were added to the CISA’s KEV catalog last month.

The activity has been found to leverage publicly available proof-of-concept exploit code to deploy web shells on hacked systems, allowing the operators to run arbitrary bash commands. One such JavaServer Pages (JSP)-based web shell has been codenamed XenShell owing to the use of a PoC released by ZeroZenX Labs.

At least 10 different clusters have been linked to the exploitation of the three flaws –

  • Cluster 1 (Active since at least March 6, 2026), which deploys the Godzilla web shell
  • Cluster 2 (Active since at least March 10, 2026), which deploys the Behinder web shell
  • Cluster 3 (Active since at least March 4, 2026), which deploys the XenShell web shell and a variant of Behinder
  • Cluster 4 (Active since at least March 3, 2026), which deploys a variant of the Godzilla webshell
  • Cluster 5 (Active since at least March 13, 2026), which malware agent compiled off the AdaptixC2 red teaming framework
  • Cluster 6 (Active since at least March 5, 2026), which deploys the Sliver command-and-control (C2) framework
  • Cluster 7 (Active since at least March 25, 2026), which deploys an XMRig miner
  • Cluster 8 (Active since at least March 10, 2026), which deploys the KScan asset mapping tool and a Nim-based backdoor that’s likely based on NimPlant and comes with capabilities to perform file operations, execute files using bash, and collect system information
  • Cluster 9 (Active since at least March 17, 2026), which deploys an XMRig miner and a peer-based proxying and tunneling tool called gsocket
  • Cluster 10 (Active since at least Mar 13, 2026), which deploys a credential stealer that attempts to obtain an admin user’s hashdump, JSON Web Tokens (JWT) key chunks that are used for REST API authentication, and AWS credentials for vManage

Cisco is recommending that customers follow the guidance and recommendations outlined in the advisories for the aforementioned vulnerabilities to protect their environments.

You Might Also Like

Samsung Galaxy Z Fold 8 Wide Camera Specs Leak

iPhone 18 Pro Rumors: 6 Major Upgrades and 1 Downgrade

New Windows ‘MiniPlasma’ zero-day exploit gives SYSTEM access, PoC released

Can EU AI Act actually regulate models like Mythos?

Take Control of Your Debt With These Free Tools

TAGGED: Authentication Bypass, CISA, Cisco, Command and Control, Credential Theft, Cyber Security, Cybersecurity, Internet, SD-WAN, Vulnerability, Web Shell
Share This Article
Facebook Twitter Copy Link
Previous Article EXCLUSIVE: An hour in the Oval Office with the CEO-in-Chief, President Trump
Next Article Amazon's new Ember Artline 4K smart TV gets £320 off in time for the World Cup
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

GTA 6 Will Have a Review Event to Avoid Leaks – Rumor
Gaming News
Samsung Galaxy Z Fold 8 Wide Camera Specs Leak
Tech News
Europe’s poverty divide: Which cities and regions are most and least at risk?
Business
iPhone 18 Pro Rumors: 6 Major Upgrades and 1 Downgrade
Tech News
New Windows ‘MiniPlasma’ zero-day exploit gives SYSTEM access, PoC released
Tech News
Amazon's new Ember Artline 4K smart TV gets £320 off in time for the World Cup
Sports
EXCLUSIVE: An hour in the Oval Office with the CEO-in-Chief, President Trump
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Samsung Galaxy Z Fold 8 Wide Camera Specs Leak

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Samsung Galaxy Z Fold 8 Wide Camera Specs Leak
May 18, 2026
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?