<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-24T12:11:53.271833+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9f66d0f3-243e-47bc-90a3-66f6ba49b81e/export</id>
    <title>9f66d0f3-243e-47bc-90a3-66f6ba49b81e</title>
    <updated>2026-05-24T12:11:53.282291+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9f66d0f3-243e-47bc-90a3-66f6ba49b81e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-20182", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3mmaimfscmu2w", "content": "\ud83d\udce2 Cisco SD-WAN : vuln\u00e9rabilit\u00e9 critique CVE-2026-20182 exploit\u00e9e en zero-day, patch d'urgence requis\n\ud83d\udcdd ## \ud83d\uddd3\ufe0f Contexte\n\nSource : The Register\u2026\nhttps://cyberveille.ch/posts/2026-05-19-cisco-sd-wan-vulnerabilite-critique-cve-2026-20182-exploitee-en-zero-day-patch-d-urgence-requis/ #CISA_KEV #Cyberveille", "creation_timestamp": "2026-05-19T23:00:22.399356Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9f66d0f3-243e-47bc-90a3-66f6ba49b81e/export"/>
    <published>2026-05-19T23:00:22.399356+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e7f7a1e6-70ab-4e17-bce5-16ca1bb7b0a1/export</id>
    <title>e7f7a1e6-70ab-4e17-bce5-16ca1bb7b0a1</title>
    <updated>2026-05-24T12:11:53.282194+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e7f7a1e6-70ab-4e17-bce5-16ca1bb7b0a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mmdn43gylt2q", "content": "The latest update for #CyCognito includes \"Emerging Threat: (CVE-2026-42945) NGINX Rift Heap Overflow in Rewrite Module\" and \"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass\".\n \n#cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X", "creation_timestamp": "2026-05-21T05:00:51.986612Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e7f7a1e6-70ab-4e17-bce5-16ca1bb7b0a1/export"/>
    <published>2026-05-21T05:00:51.986612+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/283225f0-dfcb-4571-a01e-105ef69e5079/export</id>
    <title>283225f0-dfcb-4571-a01e-105ef69e5079</title>
    <updated>2026-05-24T12:11:53.282093+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "283225f0-dfcb-4571-a01e-105ef69e5079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://bsky.app/profile/cesnet-certs.mastodonczech.cz.ap.brid.gy/post/3mmecdexws2k2", "content": "[[TLP:CLEAR] Cisco opravuje 9 zranitelnost\u00ed]\n\nCisco opravuje 9 zranitelnost\u00ed ve sv\u00fdch produktech. Nejz\u00e1va\u017en\u011bj\u0161\u00ed z nich jsou pops\u00e1ny n\u00ed\u017ee, zbyl\u00e9 naleznete na \u2b07\ufe0f. Zranitelnost CVE-2026-20182 byla na z\u00e1klad\u011b d\u016fkaz\u016f o aktivn\u00edm zneu\u017e\u00edv\u00e1n\u00ed za\u0159azena do katalogu zn\u00e1m\u00fdch zneu\u017e\u00edvan\u00fdch zranitelnost\u00ed (KEV) [\u2026]", "creation_timestamp": "2026-05-21T11:18:44.785942Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/283225f0-dfcb-4571-a01e-105ef69e5079/export"/>
    <published>2026-05-21T11:18:44.785942+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e834b36d-22b7-4647-911b-a2cf5da1fc4c/export</id>
    <title>e834b36d-22b7-4647-911b-a2cf5da1fc4c</title>
    <updated>2026-05-24T12:11:53.281994+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e834b36d-22b7-4647-911b-a2cf5da1fc4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://bsky.app/profile/xc0py.bsky.social/post/3mmeed44dqk2g", "content": "CVE-2026-20182: Unauthenticated Cisco SD-WAN Control-Plane Compromise via vHub Authentication Bypass www.resecurity.com/blog/article...", "creation_timestamp": "2026-05-21T11:54:15.488279Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e834b36d-22b7-4647-911b-a2cf5da1fc4c/export"/>
    <published>2026-05-21T11:54:15.488279+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f39fcd4-6173-4f2a-a54e-e3d88a581e35/export</id>
    <title>1f39fcd4-6173-4f2a-a54e-e3d88a581e35</title>
    <updated>2026-05-24T12:11:53.281891+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f39fcd4-6173-4f2a-a54e-e3d88a581e35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://t.me/htfgtps/1213", "content": "Serangan siber saat ini tidak hanya menargetkan website atau aplikasi web. Infrastruktur jaringan enterprise juga menjadi sasaran utama attacker. Salah satu teknologi yang kini menjadi target adalah Cisco Catalyst SD-WAN.\n\nPada Mei 2026, muncul laporan mengenai vulnerability kritis bernama CVE-2026-20182 yang menyerang sistem Cisco Catalyst SD-WAN Controller. Celah ini sangat berbahaya karena memungkinkan attacker mendapatkan akses administrator tanpa perlu login.\nhttps://buletinsiber.com/cisco-catalyst-sd-wan-diserang-hacker-vulnerability-cve-2026-20182-dieksploitasi-aktif/", "creation_timestamp": "2026-05-21T14:26:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f39fcd4-6173-4f2a-a54e-e3d88a581e35/export"/>
    <published>2026-05-21T14:26:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c38f825f-ecb3-4571-9c9a-013ac66e2881/export</id>
    <title>c38f825f-ecb3-4571-9c9a-013ac66e2881</title>
    <updated>2026-05-24T12:11:53.281783+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c38f825f-ecb3-4571-9c9a-013ac66e2881", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116614161165879206", "content": "\ud83d\udcf0 Cisco Scrambles to Patch Critical 10.0 CVSS Zero-Day in SD-WAN Under Active Attack\n\ud83d\udea8 CRITICAL ZERO-DAY: Cisco warns of active exploitation of a 10.0 CVSS auth bypass flaw (CVE-2026-20182) in Catalyst SD-WAN. Attackers can gain full admin access. CISA has issued a directive to patch immediately! \u26a0\ufe0f #CyberSecurity #ZeroDay #Cisco\n\ud83c\udf10 cyber[.]netsecops[.]io\n\ud83d\udd17 https://cyber.netsecops.io/articles/cisco-warns-of-actively-exploited-zero-day-in-catalyst-sd-wan-cve-2026-201\u2026", "creation_timestamp": "2026-05-21T19:14:49.428034Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c38f825f-ecb3-4571-9c9a-013ac66e2881/export"/>
    <published>2026-05-21T19:14:49.428034+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5156744d-7ca6-4a79-8f80-58d69ea4ab4b/export</id>
    <title>5156744d-7ca6-4a79-8f80-58d69ea4ab4b</title>
    <updated>2026-05-24T12:11:53.281677+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5156744d-7ca6-4a79-8f80-58d69ea4ab4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mmf4xqu3vy2x", "content": "\ud83d\udea8 CRITICAL ZERO-DAY: Cisco warns of active exploitation of a 10.0 CVSS auth bypass flaw (CVE-2026-20182) in Catalyst SD-WAN. Attackers can gain full admin access. CISA has issued a directive to patch immediately! \u26a0\ufe0f #CyberSecurity #ZeroDay #Cisco\n\n\ud83c\udf10 cyber[.]netsecops[.]io", "creation_timestamp": "2026-05-21T19:15:44.232865Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5156744d-7ca6-4a79-8f80-58d69ea4ab4b/export"/>
    <published>2026-05-21T19:15:44.232865+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a6f881a-e8bd-4beb-9d29-0f19ad70faa8/export</id>
    <title>0a6f881a-e8bd-4beb-9d29-0f19ad70faa8</title>
    <updated>2026-05-24T12:11:53.281507+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a6f881a-e8bd-4beb-9d29-0f19ad70faa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://t.me/true_secator/8236", "content": "Cisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Secure Workload, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u0443\u044e \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u0430.\n\n\u0420\u0430\u043d\u0435\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0435 \u043a\u0430\u043a Cisco Tetration, \u0440\u0435\u0448\u0435\u043d\u0438\u0435 Cisco Secure Workload \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0443\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0432 \u0441\u0435\u0442\u0438 \u0437\u0430 \u0441\u0447\u0435\u0442 \u043c\u0438\u043a\u0440\u043e\u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u0430 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043e\u0432\u0435\u0440\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u0435 \u0443\u0433\u0440\u043e\u0437, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0431\u0438\u0437\u043d\u0435\u0441-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, CVE-2026-20223, \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432\u043e \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 REST API Secure Workload \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0440\u043e\u043b\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u0430.\n\n\u041e\u043d\u0430 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439 \u043f\u0440\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0435 \u043a \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c \u0442\u043e\u0447\u043a\u0430\u043c REST API. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0435\u0441\u043b\u0438 \u0435\u043c\u0443 \u0443\u0434\u0430\u0441\u0442\u0441\u044f \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 API-\u0437\u0430\u043f\u0440\u043e\u0441 \u043a \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e\u0439 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u043e\u0447\u043a\u0435.\n\n\u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0432\u043d\u043e\u0441\u0438\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044e \u043d\u0430 \u0440\u0430\u0437\u043d\u044b\u0445 \u0443\u0440\u043e\u0432\u043d\u044f\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u0430.\n\nCisco \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u0445 \u043f\u0443\u0442\u0435\u0439 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043d\u0435\u0442, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u041f\u041e \u0434\u043b\u044f \u0435\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438 \u0443\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0435\u0435 \u0432 \u043e\u0431\u043b\u0430\u0447\u043d\u043e\u043c \u0440\u0435\u0448\u0435\u043d\u0438\u0438 Cisco Secure Workload SaaS.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u0435\u0435 \u0433\u0440\u0443\u043f\u043f\u0430 PSIRT \u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u0442\u043e\u0433\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u043d\u0430 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0435, \u0434\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u044f \u043d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0440\u0430\u043d\u0435\u0435 \u0432 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 Cisco \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u043b\u0430, \u0447\u0442\u043e \u0434\u0440\u0443\u0433\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043e\u0431\u043e\u0439\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e (CVE-2026-20182) \u0432 Catalyst SD-WAN, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u043a\u0430\u043a 0-day, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430.\n\n\u0412 \u0446\u0435\u043b\u043e\u043c, \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043f\u044f\u0442\u044c \u043b\u0435\u0442 CISA\u00a0\u0432\u044b\u044f\u0432\u0438\u043b\u0430 91\u00a0\u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Cisco, \u0448\u0435\u0441\u0442\u044c \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438, \u0437\u0430\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u043c\u0438\u0441\u044f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e\u043c. \u0422\u0430\u043a \u0447\u0442\u043e, \u0436\u0434\u0435\u043c.", "creation_timestamp": "2026-05-22T18:00:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a6f881a-e8bd-4beb-9d29-0f19ad70faa8/export"/>
    <published>2026-05-22T18:00:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8f9d3b52-26c0-4ecb-8e36-0aa075a75712/export</id>
    <title>8f9d3b52-26c0-4ecb-8e36-0aa075a75712</title>
    <updated>2026-05-24T12:11:53.281346+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8f9d3b52-26c0-4ecb-8e36-0aa075a75712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://bsky.app/profile/aegisbot.bsky.social/post/3mmhlcgr2r42v", "content": "\ud83d\udd0d Top signals this week:\n\nCVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-45585, CVE-2026-42945, CVE-2026-9082\nActors: Ransomware, Apt, Play\n\nFull intel: https://matlock.ca/cybersecnews", "creation_timestamp": "2026-05-22T18:37:06.442348Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8f9d3b52-26c0-4ecb-8e36-0aa075a75712/export"/>
    <published>2026-05-22T18:37:06.442348+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/027709f9-d2a7-4b4a-96f8-b9b4912fce8a/export</id>
    <title>027709f9-d2a7-4b4a-96f8-b9b4912fce8a</title>
    <updated>2026-05-24T12:11:53.278746+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "027709f9-d2a7-4b4a-96f8-b9b4912fce8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-20182", "type": "seen", "source": "https://t.me/GithubRedTeam/85460", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026 #POC #Exploit\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-20182\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a portbuster1337\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-22 21:17:26\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-20182 PoC - Cisco Catalyst SD-WAN Controller / Manager Authentication Bypass (CVSS 10.0)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-22T22:00:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/027709f9-d2a7-4b4a-96f8-b9b4912fce8a/export"/>
    <published>2026-05-22T22:00:03+00:00</published>
  </entry>
</feed>
