Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Infosec News

Infosec News

Scheduled Pinned Locked Moved General Discussion
115 Posts 3 Posters 31.4k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Online
    cycloneC Online
    cyclone
    Admin Trusted
    wrote on last edited by
    #102

    Massive 16 Terabyte Database With 4.3 Billion-Records Leaked

    bfa3e7c8-f329-44f2-9057-5a520fe86c03-image.png

    A massive unprotected MongoDB instance containing over 4.3 billion records and totaling roughly 16 TB of data was discovered exposed online. The dataset included highly structured professional and corporate intelligence data, much of it clearly scraped from LinkedIn and enriched through lead-generation pipelines. The exposed collections contained PII such as full names, emails, phone numbers, LinkedIn profile URLs, employment history, skills, education, location data, and even photographs.

    The leak, uncovered by cybersecurity researcher Bob Diachenko on November 23rd, 2025, consisted of nine major collections. Three of those - profiles, unique_profiles, and people - alone contained nearly 2 billion individual PII-rich entries. The dataset also referenced an “Apollo ID”, suggesting potential linkage to Apollo-style sales intelligence ecosystems or enrichment tools.

    The structured nature of the data, combined with its massive scale, makes it extremely attractive to threat actors. Attackers could weaponize the PII for targeted phishing, CEO fraud, corporate reconnaissance, credential stuffing, and AI-assisted social engineering at unprecedented volume. With up-to-date professional metadata, malicious operators can automatically craft convincing spear-phishing messages or build large internal mapping structures of corporate roles and contacts.

    The exposed database was secured on November 25th, the day after responsible disclosure, but it is unknown how long it had been publicly accessible. Given the size and organization of the dataset, researchers warn that malicious parties may have already accessed it.

    This exposure adds to a growing trend of massive, scraping-driven data leaks, which now routinely exceed billions of records and blur the line between legally scraped data and high-risk breach material.


    Sources:

    • https://cybernews.com/security/database-exposes-billions-records-linkedin-data/
    • https://www.tomsguide.com/computing/online-security/4-3-billion-job-documents-left-unsecured-online-names-emails-phone-numbers-and-linkedin-data-exposed

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    👍
    0
    • cycloneC Online
      cycloneC Online
      cyclone
      Admin Trusted
      wrote on last edited by
      #103

      SoundCloud Confirms Data Breach

      5166b650-49c4-4f71-8918-0cf58ec38651-image.png

      SoundCloud has confirmed a security breach after users reported widespread outages and 403 errors when accessing the platform through VPNs. According to the company, the issues were caused by its incident response after detecting unauthorized access to an ancillary service dashboard.

      SoundCloud stated that a threat actor accessed a limited database containing user email addresses and information already visible on public profiles. The company said no passwords, financial data, or other sensitive information were exposed.

      Sources cited by BleepingComputer estimate the breach impacts roughly 20 percent of SoundCloud’s user base, potentially affecting around 28 million accounts. SoundCloud says all unauthorized access has been blocked and that there is no ongoing risk.

      As part of its response, SoundCloud implemented security configuration changes that disrupted VPN connectivity. The company has not provided a timeline for restoring full VPN access. It also reported experiencing denial-of-service attacks following the incident, briefly affecting site availability.

      While SoundCloud has not named the attackers, BleepingComputer reports that the ShinyHunters extortion group is allegedly behind the breach and is attempting to extort the company after stealing user data.


      Sources:

      • https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/
      • https://cyberinsider.com/soundcloud-users-with-active-vpn-connections-are-getting-403-errors/

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      👍
      0
      • cycloneC Online
        cycloneC Online
        cyclone
        Admin Trusted
        wrote on last edited by
        #104

        2025 Cybersecurity Predictions vs Reality

        3c1560c3-d3d5-46e7-a3c1-06e89c44471b-image.png

        This article reviews 90+ predictions from 36 cybersecurity experts and compares them to what actually occurred in 2025. The main finding: most predictions were accurate, especially those focused on AI amplifying existing threats rather than creating new ones.

        Key Outcomes

        1. AI Amplified Existing Attacks
        • AI was widely adopted by attackers to scale and automate known techniques.
        • Observed uses included AI-assisted phishing, automated recon, and malware with runtime code mutation to evade detection.
        • Underground markets began selling configurable AI-powered attack tools.
        • AI reduced the skill barrier and increased attack speed and volume.

        Result: Prediction confirmed. AI increased efficiency, not novelty.


        1. SaaS, Cloud, and Identity Became the Main Attack Surface
        • SaaS misconfigurations, excessive permissions, insecure APIs, and third-party integrations were major breach drivers.
        • Identity and access failures eclipsed traditional perimeter security issues.
        • Large-scale cloud outages were often caused by configuration errors.

        Result: Prediction confirmed. Identity and SaaS security became critical weaknesses.


        1. Ransomware Fragmented Further
        • Law enforcement pressure led to more, smaller ransomware groups rather than fewer.
        • 30 to 40 percent increase in active ransomware operators.
        • Affiliates increasingly moved between groups, complicating attribution.

        Result: Prediction confirmed. Ransomware evolved into a fragmented ecosystem.


        1. Supply Chain Attacks Increased
        • Enterprises were compromised through trusted vendors and enterprise software.
        • SaaS and third-party providers became common initial access vectors.

        Result: Prediction confirmed. Vendor risk became a primary concern.


        1. Data Became the Core Security Asset
        • Data protection and governance overtook infrastructure as the main security focus.
        • Large credential leaks and AI training on sensitive data accelerated this shift.
        • Data visibility and classification became prerequisites for AI use.

        Result: Prediction confirmed. Data security underpins most modern risks.


        1. Regulation Added Complexity Without Reducing Attacks
        • Increased compliance and reporting requirements did not deter attackers.
        • Regulatory burden primarily impacted internal operations, not threat actors.

        Result: Prediction confirmed. Regulation did not materially change the threat landscape.


        Bottom Line
        2025 validated long-standing warnings rather than introducing new threat classes.
        The biggest risks were known problems amplified by AI, automation, and scale, not futuristic scenarios.


        Source:

        • https://cybernews.com/news/did-cybersecurity-expert-predictions-2025-come-true/

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Online
          cycloneC Online
          cyclone
          Admin Trusted
          wrote on last edited by
          #105

          Verizon Nationwide Outage (Jan. 14, 2026)

          b178f83a-d4b1-49a8-9336-8751d76c4453-image.png

          Verizon Communications experienced a major nationwide wireless network outage beginning around midday on January 14, 2026, disrupting voice, text, and mobile data services across the United States for approximately ten hours. Customers reported their phones showing “SOS” or “SOS-only” status in place of normal signal bars, indicating loss of cellular connectivity.

          Outage monitoring sites such as DownDetector logged hundreds of thousands of reports at the peak, with impacts reported coast-to-coast in major metropolitan areas including New York City, Chicago, Boston, Atlanta, Dallas, and others. Some local officials warned that emergency calls (911) for Verizon users could be unreliable during the disruption, recommending alternatives such as landlines or other carriers where possible.

          Verizon acknowledged the outage via social media and later confirmed that service was restored late Wednesday night. The company apologized for the interruption and stated it will issue account credits to affected customers. Verizon did not immediately disclose a specific technical cause, though internal reviews are expected.

          The Federal Communications Commission (FCC) indicated it would review the outage’s impact on network reliability and public safety communications.

          Sources:

          • https://www.techbuzz.ai/articles/verizon-s-nationwide-outage-hits-260k-reports-mid-january
          • https://apnews.com/article/verizon-cellular-outage-85d658a4fb6a6175cae8981d91a809c9
          • https://www.verizon.com/about/news/update-network-outage

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          0
          • cycloneC Online
            cycloneC Online
            cyclone
            Admin Trusted
            wrote on last edited by
            #106

            Atomic Wallet - Where Did My XMR Go?

            776e9e66-0183-45fa-a817-d7a9f980d8aa-image.png

            Many Atomic Wallet users recently logged in to find their Monero (XMR) balances missing or incorrect, causing understandable concern.

            According to Atomic Wallet support, this is a display and synchronization issue specific to Monero, not a loss of funds. Atomic states that all XMR remains safe on-chain and that their development team is working on a fix. Once synchronization is corrected, balances and transaction history should update normally.

            c3e89675-7a0c-4b47-8f0f-9998e125eaf2-image.png

            Users can independently confirm their funds by restoring their XMR wallet in another trusted Monero wallet using their existing keys or seed phrase. Multiple users report that their full balances appear correctly when checked outside Atomic, confirming the issue is isolated to Atomic’s wallet interface.

            Given Atomic Wallet’s 2023 security breach, users are understandably cautious. While this situation appears unrelated and no theft has been reported, verifying balances independently is recommended.


            Summary

            • Issue affects XMR balance display in Atomic Wallet
            • Funds are still on-chain and under user control
            • Atomic says a fix is in progress
            • Users can verify funds using another Monero wallet
            • Use caution, verify independently, and never share your private keys or seed phrase with anyone

            20e9c590-cd38-48dd-91b6-5c86e6eaa8a0-image.png


            Sources:

            • @cyclone (independent verification with Atomic)
            • https://x.com/AtomicWallet/status/2011796132112826643

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            👍
            0
            • oe3p32wedwO Offline
              oe3p32wedwO Offline
              oe3p32wedw
              Contributor
              wrote on last edited by
              #107

              123.png
              haahahahahah

              1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

              1 Reply Last reply
              0
              • cycloneC Online
                cycloneC Online
                cyclone
                Admin Trusted
                wrote on last edited by
                #108

                Ivanti EPMM Zero-Day RCE - CVE-2026-1281 & CVE-2026-1340

                56a59703-f5dc-48f4-b1a5-d2c62d6055f5-image.png

                Ivanti has disclosed two critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2026-1281 and CVE-2026-1340. Both flaws are unauthenticated code injection issues that allow remote attackers to achieve arbitrary code execution on affected EPMM appliances. Active exploitation has been confirmed, and CVE-2026-1281 has been added to CISA’s Known Exploited Vulnerabilities catalog.

                The vulnerabilities affect EPMM 12.x versions prior to 12.8.0.0 and are tied to In-House Application Distribution and Android File Transfer Configuration features. Successful exploitation grants full control over the EPMM appliance, enabling attackers to establish persistence, access sensitive mobile device management data, and potentially pivot into connected enterprise environments.

                Ivanti has released interim RPM-based patches, though these must be reapplied after upgrades. A permanent fix is scheduled for EPMM 12.8.0.0. Organizations are strongly advised to apply mitigations immediately, review logs for signs of exploitation, and treat exposed EPMM instances as high-risk assets.


                Source:

                • https://thehackernews.com/2026/01/two-ivanti-epmm-zero-day-rce-flaws.html

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                👍
                0
                • cycloneC Online
                  cycloneC Online
                  cyclone
                  Admin Trusted
                  wrote on last edited by
                  #109

                  Notepad++ Supply Chain Compromised

                  9a708834-6f8d-4f24-b12b-629efea630a5-image.png

                  What Happened

                  Notepad++ was involved in a supply chain compromise where parts of its update delivery infrastructure were breached. The application’s source code was not modified, but attackers were able to tamper with the update distribution path for a limited period. In targeted cases, users running older versions and using the built-in updater could have been redirected to malicious installer binaries hosted on attacker-controlled infrastructure.

                  The campaign appears to have been highly targeted rather than mass exploitation, consistent with espionage-style activity. The issue was identified and remediated after the Notepad++ team migrated infrastructure and tightened update security.

                  Impact

                  • Risk was limited primarily to older Notepad++ versions using legacy update mechanisms.
                  • Users who did manual downloads from trusted mirrors were unlikely to be affected.
                  • No evidence suggests the official source repository itself was compromised.

                  What Users Should Do

                  • Update immediately to the latest Notepad++ version using a fresh manual download from the official site or trusted mirrors.
                  • Verify digital signatures and hashes of the installer before execution.
                  • If Notepad++ was updated automatically during the affected timeframe:
                    • Treat the system as potentially exposed.
                    • Run endpoint security scans.
                    • Review network logs for suspicious outbound connections.
                  • Enterprise environments should audit systems where Notepad++ is installed and consider blocking auto-updaters that lack strict signature validation.

                  Sources:

                  • https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html
                  • https://notepad-plus-plus.org/news/hijacked-incident-info-update/

                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                  3x RTX 4090

                  1 Reply Last reply
                  0
                  • cycloneC Online
                    cycloneC Online
                    cyclone
                    Admin Trusted
                    wrote last edited by
                    #110

                    Windows Notepad Remote Code Execution - CVE-2026-20841

                    6da505d2-a552-403b-baac-4ec7e4d7020e-image.png

                    Summary

                    Not to be outdone by the recent Notepad++ RCE, the Windows Notepad CVE-2026-20841 is a high-severity remote code execution (RCE) vulnerability affecting the modern Windows Notepad application. The issue was introduced after Microsoft added Markdown and rich link support to Notepad.

                    The vulnerability stems from improper sanitation of special elements within commands, effectively allowing command injection via crafted Markdown links.

                    Technical Details

                    An attacker can craft a malicious .md file containing a specially constructed link. When a user opens the file in Notepad and Ctrl-clicks the link, the application may invoke external protocols or executables without sufficient validation or security warnings.

                    Successful exploitation allows arbitrary code execution in the context of the logged-in user.

                    Key Characteristics

                    • Type: Remote Code Execution
                    • Vector: Malicious Markdown file with crafted link
                    • User Interaction Required: Yes (file open + link click)
                    • Privileges Gained: Same as current user
                    • Attack Surface: Expanded via Markdown rendering and clickable links

                    Impact

                    If exploited, an attacker could:

                    • Execute arbitrary binaries
                    • Download and run malware
                    • Establish persistence
                    • Perform lateral movement (depending on user privileges)

                    However, there were no confirmed in-the-wild exploits at the time of disclosure.

                    Remediation

                    Microsoft addressed the vulnerability in the February 2026 Patch Tuesday updates for the Windows 11 Notepad flaw by displaying warnings when clicking a link if it does not use the http:// or https:// protocol.

                    3d882187-479e-4f14-b9c0-6c340d2d5e90-image.png


                    Sources:

                    • https://www.cve.org/CVERecord?id=CVE-2026-20841
                    • https://www.bleepingcomputer.com/news/microsoft/windows-11-notepad-flaw-let-files-execute-silently-via-markdown-links/
                    • https://www.helpnetsecurity.com/2026/02/12/windows-notepad-markdown-feature-opens-door-to-rce-cve-2026-20841/
                    • https://socprime.com/blog/cve-2026-20841-vulnerability/
                    • https://www.techradar.com/pro/security/microsoft-patches-concerning-windows-11-notepad-security-flaw

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    0
                    • cycloneC Online
                      cycloneC Online
                      cyclone
                      Admin Trusted
                      wrote last edited by
                      #111

                      Chrome CSS Zero-Day (CVE-2026-2441) – Active Exploitation Confirmed

                      45adb187-6021-45c2-aa36-4af4e7f955fe-image.png

                      Google has released an emergency security update for Chrome after confirming active exploitation of a high-severity zero-day vulnerability in the browser’s CSS handling engine.

                      The flaw, tracked as CVE-2026-2441, is a use-after-free memory corruption issue in Chrome’s CSS parsing/rendering component. Although CSS is generally considered non-executable, improper memory management allows attackers to craft malicious webpages that can trigger arbitrary code execution within the Chrome renderer process.

                      Key Details:

                      • Type: Use-after-free (memory corruption)
                      • Component: Chrome CSS engine
                      • Severity: High (CVSS ~8.8)
                      • Exploitation: Confirmed in the wild
                      • Impact: Remote code execution via malicious webpage

                      Successful exploitation requires a victim to visit a specially crafted website. While Chrome’s sandbox limits direct system access, attackers often chain renderer bugs with sandbox escapes for full compromise.

                      Google has patched the issue in the latest stable release. All users, especially enterprise environments and those running Chromium-based browsers (Edge, Brave, Opera), should update immediately.


                      Sources:

                      • https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
                      • https://www.bleepingcomputer.com/news/security/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/
                      • https://thehackernews.com/2026/02/new-chrome-zero-day-cve-2026-2441-under.html

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      1 Reply Last reply
                      0
                      • freerouteF Offline
                        freerouteF Offline
                        freeroute
                        Moderator Trusted
                        wrote last edited by freeroute
                        #112

                        New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
                        That guest network you set up for your neighbors may not be as secure as you think.
                        airsnitch.png

                        To prevent malicious Wi-Fi clients from attacking other clients on the same network, vendors have introduced
                        client isolation, a combination of mechanisms that block direct communication between clients. However, client isolation is not a standardized feature, making its security guarantees unclear.

                        Source: New AirSnitch attack breaks Wi-Fi encryption in homes, offices, and enterprises
                        Github: https://github.com/vanhoefm/airsnitch
                        AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks

                        1 Reply Last reply
                        👍
                        1
                        • cycloneC Online
                          cycloneC Online
                          cyclone
                          Admin Trusted
                          wrote last edited by
                          #113

                          Gemini Access to Unintended Public Google Cloud API Keys

                          00f8a711-d0df-4de5-907b-a89a9dfdd353-image.png

                          Recent research by Truffle Security identified 2,863 publicly exposed Google Cloud API keys that can authenticate to Google Gemini endpoints following API enablement. These keys, commonly embedded in client-side JavaScript for benign services such as maps and analytics, were not originally intended for AI access.

                          When the Gemini (Generative Language) API is enabled within a Google Cloud project, all existing API keys in that project inherit access by default, including publicly exposed keys. This creates a significant risk of unauthorized data access and quota abuse.


                          Key Findings

                          • API keys with the prefix AIza were found embedded in public-facing code
                          • Enabling the Gemini API retroactively grants those keys access to AI endpoints
                          • Newly created API keys default to “Unrestricted”, allowing access to all enabled APIs
                          • Attackers can:
                            • Access /files and /cachedContents endpoints
                            • Execute Gemini API calls
                            • Generate excessive LLM usage charges
                          • One reported case alleged $82,314.44 in unauthorized charges within 48 hours

                          A separate scan by Quokka identified over 35,000 Google API keys embedded across 250,000 Android applications, indicating broader ecosystem exposure.


                          Risk Impact

                          This issue transforms what were historically treated as low-risk billing identifiers into high-value AI credentials.

                          Potential consequences include:

                          • Data exposure via AI-related endpoints
                          • API quota theft and financial loss
                          • Expanded blast radius through AI-integrated cloud services
                          • Elevated abuse potential due to generative AI capabilities

                          The behavior was initially considered intended functionality. Google has since implemented proactive controls to detect and block leaked API keys attempting Gemini access. No confirmed exploitation campaigns have been publicly reported at this time.


                          Recommended Actions

                          Organizations using Google Cloud should:

                          1. Audit enabled APIs in all projects
                          2. Identify and rotate exposed API keys immediately
                          3. Prioritize older keys deployed under previous guidance
                          4. Restrict API keys to specific services and referrers
                          5. Remove API keys from client-side code where possible
                          6. Implement continuous API monitoring and anomaly detection

                          Sources:

                          • https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html
                          • https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules

                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                          3x RTX 4090

                          1 Reply Last reply
                          👍
                          0
                          • cycloneC Online
                            cycloneC Online
                            cyclone
                            Admin Trusted
                            wrote last edited by
                            #114

                            Active Exploitation of Cisco Catalyst SD-WAN CVSS 10.0 Zero-Day (CVE-2026-20127)

                            553736f5-ce8e-4570-895f-541f9947337a-image.png

                            Overview

                            Security researchers and government agencies have confirmed active exploitation of a critical vulnerability affecting Cisco Catalyst SD-WAN infrastructure. The vulnerability, tracked as CVE-2026-20127, allows an unauthenticated remote attacker to bypass authentication on affected Cisco Catalyst SD-WAN Controller and Manager systems and gain administrative access.

                            The flaw carries a CVSS score of 10.0 (critical) and enables attackers to send crafted requests to the SD-WAN controller, resulting in login access as a high-privileged internal account. Once initial access is obtained, the attacker can manipulate SD-WAN network configuration and potentially gain full control of the platform.

                            Cisco Talos attributes the activity to a sophisticated threat cluster tracked as UAT-8616. Investigation indicates that exploitation activity has likely been occurring since at least 2023, meaning organizations may have been compromised for several years before disclosure.

                            Exploitation Chain

                            Observed attacks follow a multi-stage compromise process:

                            1. Initial Access

                              • Exploitation of CVE-2026-20127 allows authentication bypass on Cisco Catalyst SD-WAN controllers.
                              • Attackers gain administrative access as a privileged non-root user.
                            2. Privilege Escalation

                              • Attackers downgrade the SD-WAN software to reintroduce CVE-2022-20775, a CLI path traversal vulnerability.
                              • This allows escalation from administrative access to root privileges.
                            3. Persistence and Covering Tracks

                              • After obtaining root access, attackers restore the system to the original software version to conceal the downgrade.
                              • The actor establishes persistence through:
                                • Unauthorized SSH keys
                                • Creation and deletion of local user accounts
                                • Modification of startup scripts
                                • Rogue SD-WAN control connections
                              • Logs and command histories are frequently cleared or truncated to reduce forensic evidence.

                            Observed Post-Compromise Activity

                            Investigations identified several behaviors associated with successful compromise:

                            • Addition of rogue SD-WAN control peers to the network fabric.
                            • Creation of malicious or impersonated local user accounts.
                            • Deployment of unauthorized SSH keys in:
                              • /home/root/.ssh/authorized_keys
                              • /home/vmanage-admin/.ssh/authorized_keys
                            • Enabling root SSH login by modifying SSH configuration.
                            • Clearing or truncating logs including:
                              • syslog
                              • wtmp
                              • lastlog
                              • cli-history
                              • bash_history
                            • Unexplained software version downgrades followed by re-upgrades.
                            • Unusual control-plane peering events originating from unknown IP addresses.

                            Threat actors also leveraged NETCONF (port 830) and SSH to move laterally between SD-WAN components within the management plane.

                            Impact

                            Cisco Catalyst SD-WAN components operate within the network control plane and manage connectivity between distributed sites and cloud environments. Compromise of these systems can allow attackers to:

                            • Modify routing and network policies
                            • Intercept or redirect traffic
                            • Maintain persistent access to enterprise networks
                            • Use the SD-WAN fabric as a foothold for broader compromise

                            Organizations operating internet-exposed SD-WAN management interfaces are considered at highest risk.

                            Government and Industry Response

                            Multiple government cybersecurity agencies issued joint advisories warning of ongoing exploitation. U.S. federal agencies were directed to immediately inventory and patch affected SD-WAN deployments due to the risk posed to critical infrastructure and government networks.

                            The vulnerability has been added to the Known Exploited Vulnerabilities (KEV) catalog, requiring rapid remediation within federal environments.

                            Detection and Threat Hunting Guidance

                            Defenders are advised to investigate:

                            • Unexpected SD-WAN control-plane peering events
                            • Unknown public IP addresses establishing controller connections
                            • Root logins or SSH key changes on SD-WAN nodes
                            • Missing or abnormally small log files
                            • Evidence of temporary software downgrades followed by re-upgrades

                            Manual validation of control connection events in SD-WAN logs is considered a critical indicator of potential exploitation.

                            Mitigation

                            Recommended defensive actions include:

                            • Immediately applying Cisco patches for affected SD-WAN components.
                            • Reviewing controller logs for unauthorized peering connections.
                            • Restricting access to management interfaces and SD-WAN control ports.
                            • Blocking unnecessary internet exposure of SD-WAN controllers.
                            • Implementing Cisco’s SD-WAN hardening guidance and continuous log monitoring.

                            Organizations are strongly advised to assume potential compromise if indicators described in the advisories are present.


                            Sources:

                            • https://blog.talosintelligence.com/uat-8616-sd-wan/
                            • https://thehackernews.com/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html
                            • https://www.tenable.com/blog/cve-2026-20127-cisco-catalyst-sd-wan-controllermanager-zero-day-authentication-bypass
                            • https://www.cve.org/CVERecord?id=CVE-2026-20127
                            • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk

                            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                            3x RTX 4090

                            1 Reply Last reply
                            0
                            • cycloneC Online
                              cycloneC Online
                              cyclone
                              Admin Trusted
                              wrote last edited by
                              #115

                              Update: Details of the Solflare “xpass” Exploit

                              March 13, 2026

                              c25dc614-d139-4de7-9c3b-da142cb773bb-image.png

                              In Feb 2025, I reported an exploit vulnerability in the Solflare Chrome wallet which allowed the wallet vault (solflaredata) to be decrypted without the user's password.

                              Original post from Feb 2025:
                              https://forum.hashpwn.net/post/416

                              Turns out, this was a backdoor, not a bug.

                              Today, I am releasing the full details of the xpass exploit, aka the "backdoor master key".
                              https://forum.hashpwn.net/post/11116

                              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                              3x RTX 4090

                              1 Reply Last reply
                              0

                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              Who's Online [Full List]

                              15 users active right now (4 members and 11 guests).
                              danail, hashpwn-bot, cyclone, Waffle

                              Board Statistics

                              Our members have made a total of 11.0k posts in 179 topics.
                              We currently have 380 members registered.
                              Please welcome our newest member, Waffle.
                              The most users online at one time was 49 on Thursday, December 26, 2024.

                              • Login

                              • Don't have an account? Register

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent