<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ThousandEyes Virtual Appliance — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/thousandeyes-virtual-appliance/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 16:02:43 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/thousandeyes-virtual-appliance/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco ThousandEyes Virtual Appliance Authenticated Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-thousandeyes-rce/</link><pubDate>Wed, 20 May 2026 16:02:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-thousandeyes-rce/</guid><description>CVE-2026-20199 - A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user.</description><content:encoded><![CDATA[<p>A vulnerability exists within the SSL certificate handling mechanism of the Cisco ThousandEyes Virtual Appliance. This flaw enables an authenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges. The vulnerability, identified as CVE-2026-20199, stems from insufficient validation of user-supplied input during the SSL certificate upload process. Successful exploitation requires valid administrative credentials, emphasizing the importance of robust access control measures. Defenders should apply the available software updates released by Cisco to remediate this vulnerability and prevent potential compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains valid administrative credentials for the Cisco ThousandEyes Virtual Appliance.</li>
<li>Attacker logs into the ThousandEyes Virtual Appliance web interface using the compromised credentials.</li>
<li>Attacker navigates to the SSL certificate management section within the web interface.</li>
<li>Attacker uploads a crafted SSL certificate containing malicious code designed for command execution.</li>
<li>The ThousandEyes Virtual Appliance processes the uploaded certificate without proper validation.</li>
<li>The malicious code embedded within the crafted certificate is executed with root privileges.</li>
<li>Attacker establishes a reverse shell or gains persistent access to the underlying operating system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20199 grants the attacker complete control over the Cisco ThousandEyes Virtual Appliance, enabling them to execute arbitrary commands with root privileges. This can lead to complete system compromise, data exfiltration, service disruption, and potential lateral movement within the network. The vulnerability poses a significant risk to organizations relying on ThousandEyes for network monitoring and performance analysis.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the software updates released by Cisco to address CVE-2026-20199 on all affected ThousandEyes Virtual Appliances.</li>
<li>Implement strong password policies and multi-factor authentication to protect administrative credentials required to exploit this vulnerability.</li>
<li>Deploy the Sigma rules provided below to detect attempts to upload crafted SSL certificates to the ThousandEyes Virtual Appliance.</li>
<li>Monitor web server logs for suspicious activity related to SSL certificate management, specifically uploads from unusual IP addresses or user agents.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>cve-2026-20199</category><category>rce</category><category>cisco</category><category>thousandeyes</category><category>ssl</category></item></channel></rss>