BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT

Critical Infrastructure Under Fire: Cisco Zero-Day Exploited Since 2023, Google Disrupts China APT

February 26, 2026Vulnerabilities & Exploits3 min readcritical

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

#zero-day#cisco#sd-wan#apt#china#supply-chain#authentication-bypass
Share

TL;DR

A critical Cisco SD-WAN authentication bypass vulnerability has been exploited in the wild since 2023, while Google disrupted a China-linked APT that breached 53 organizations across 42 countries. Supply chain attacks continue with malicious NuGet packages impersonating Stripe libraries and vulnerabilities in AI coding assistants enabling remote code execution.

Why critical?

The Cisco SD-WAN zero-day (CVE-2026-20127) with CVSS 10.0 has been actively exploited since 2023, enabling complete authentication bypass. Combined with widespread APT campaign targeting critical infrastructure, this represents active exploitation of maximum-severity vulnerabilities.

Critical Cisco SD-WAN Zero-Day Under Active Exploitation

Cisco disclosed a maximum-severity authentication bypass vulnerability in its Catalyst SD-WAN infrastructure that has been actively exploited since 2023. The flaw, tracked as CVE-2026-20127 with a CVSS score of 10.0, affects Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage).

The vulnerability allows unauthenticated remote attackers to completely bypass authentication mechanisms and gain administrative access to affected systems. Given the three-year exploitation timeline and the critical nature of SD-WAN infrastructure in enterprise networks, organizations should prioritize immediate patching of affected systems.

Google Disrupts Chinese APT Campaign Spanning 42 Countries

Google's Threat Analysis Group (TAG) successfully disrupted infrastructure belonging to UNC2814, a suspected China-nexus cyber espionage group that breached at least 53 organizations across 42 countries. The group, dubbed GRIDTIDE, has maintained a long operational history targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas.

The disruption effort involved coordination with industry partners to neutralize the threat actor's command and control infrastructure. The campaign's scope demonstrates the persistent threat posed by state-sponsored actors against critical infrastructure and government entities worldwide.

Supply Chain Attacks Target Financial and Development Ecosystems

Cybersecurity researchers identified a malicious NuGet package named "StripeApi.Net" designed to impersonate the legitimate Stripe.net library, which has over 75 million downloads. The package targets the financial sector by attempting to steal API tokens and credentials from developers integrating payment processing capabilities.

Separately, multiple security vulnerabilities were discovered in Anthropic's Claude Code AI-powered coding assistant. These flaws could enable remote code execution and API credential theft through exploitation of configuration mechanisms including Hooks, Model Context Protocol (MCP) servers, and environment variables.

Social Engineering Operations Scale Up Recruitment

The Scattered LAPSUS$ Hunters (SLH) cybercrime collective has been observed offering substantial financial incentives to recruit women for voice phishing campaigns. According to Dataminr research, the group offers between $500 and $1,000 upfront per call for IT help desk social engineering attacks, indicating a systematic approach to scaling their operations.

Notable CVE Disclosures

Microsoft's Security Response Center published information on several vulnerabilities this week:

  • CVE-2025-67733: Valkey RESP protocol injection vulnerability via Lua error_reply
  • CVE-2026-21863: Malformed Valkey cluster bus message leading to remote denial of service
  • CVE-2025-62878: Path traversal vulnerability in Local Path Provisioner via pathPattern parameters
  • CVE-2025-61143: NULL pointer dereference in libtiff affecting versions up to v4.7.1
  • CVE-2025-11563: wcurl path traversal vulnerability with percent-encoded slashes

Additionally, several Linux kernel fixes were disclosed including crypto virtio spinlock protection (CVE-2026-23229), HFS filesystem cleanup issues (CVE-2025-71230), and XFS use-after-free conditions (CVE-2026-23223).

Sources

  • https://thehackernews.com/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html
  • https://thehackernews.com/2026/02/google-disrupts-unc2814-gridtide.html
  • https://thehackernews.com/2026/02/malicious-stripeapi-nuget-package.html
  • https://thehackernews.com/2026/02/claude-code-flaws-allow-remote-code.html
  • https://thehackernews.com/2026/02/slh-offers-5001000-per-call-to-recruit.html
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-67733
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21863
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62878
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61143
  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11563

Originally reported by The Hacker News, SANS ISC, MSRC Security Updates

Tags

#zero-day#cisco#sd-wan#apt#china#supply-chain#authentication-bypass

Threat Actors

🏴Lapsus$

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • CISA Adds FileZen to KEV as Multiple Critical Vulnerabilities Surface

    criticalFeb 25, 2026
  • Cyber Defense Weekly: Zero-Day Alerts, AI Code Risks, and Ransomware Forum Disruption

    criticalFeb 26, 2026
  • Supply Chain Worms and State-Sponsored Malware: Weekend Threat Roundup

    highFeb 23, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Cyber Defense Weekly: Zero-Day Alerts, AI Code Risks, and Ransomware Forum Disruption

Next Article

Critical Cisco SD-WAN Exploitation, Claude AI Vulnerabilities, and Million-Scale Data Breaches β†’