Skip to content
Threat Feed

Vendor

Cisco

21 briefs RSS
critical advisory

Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution

Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.

ASA +4 cisco vulnerability rce authentication-bypass
2r 4t 3c
critical threat

UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices

UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.

Firepower eXtensible Operating System +2 UAT-4356 firestarter cisco backdoor network espionage
2r 2t 2c 2i
medium advisory

Cisco Integrated Management Controller (IMC) Multiple XSS Vulnerabilities

Multiple cross-site scripting (XSS) vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct an XSS attack against a user of the interface.

Integrated Management Controller xss cisco cimc vulnerability
2r 1t 5c
high threat

China-Nexus Cyber Actors Using Covert Networks of Compromised Devices

China-nexus cyber actors are increasingly using large-scale networks of compromised devices, including SOHO routers and IoT devices, to obscure the origin of their attacks and conduct various malicious activities, from reconnaissance to data exfiltration.

SOHO Routers +5 China-nexus cyber actors covert-network botnet china-nexus compromised-devices
2r 4t
medium advisory

Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)

Cisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.

Catalyst SD-WAN Manager cve-2026-20128 credential-access sd-wan cisco
2r 1t 1c
critical threat

Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface, allowing an attacker to upload a malicious file and overwrite arbitrary files to gain vmanage user privileges.

exploited Catalyst SD-WAN Manger cve-2026-20122 privilege-escalation sd-wan
2r 2t 1c
medium advisory

Persistence via Windows Installer (Msiexec)

Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.

Windows +21 persistence defense-evasion
3r 3t
medium advisory

Suspicious Child Processes from Communication Applications

The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.

Elastic Defend +12 defense-evasion persistence windows
3r 3t
high advisory

Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)

Cisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.

Catalyst SD-WAN Manager cve vulnerability cisco sd-wan
2r 1t 1c
medium advisory

Cisco 802.1X (dot1x) Disabled on Network Interface

Detection of manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface, potentially allowing unauthorized network access and lateral movement.

IOS attack.defense-evasion attack.persistence attack.credential-access attack.t1562.001 attack.t1556.004
2r 2t
high advisory

Suspicious Process Access via Direct System Call

Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.

EdgeWebView +4 defense-evasion execution windows
2r 3t
high advisory

Suspicious MSIExec Remote Download

The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.

Splunk Enterprise +3 endpoint msiexec remote-download windows
2r 2t
high advisory

Windows Remote Desktop Network Bruteforce Attempt

This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.

Secure Access Firewall +3 rdp bruteforce credential-access windows network
2r 1t
medium advisory

Suspicious LSASS Process Access

This rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.

Windows Defender +3 credential-access lsass windows
3r 1t
low advisory

Startup or Run Key Registry Modification

Attackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.

Elastic Defend +6 persistence registry runkey
3r 2t
medium advisory

Potential Masquerading as Communication Apps

Attackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.

Slack +9 defense-evasion masquerading windows
2r 3t
medium threat

Potential Lateral Tool Transfer via SMB Share

The rule identifies the creation or change of a Windows executable file over network shares, indicating potential lateral tool transfer via SMB, which adversaries may use to move tools between systems in a compromised environment.

Elastic Defend +1 lateral-movement smb file-transfer windows
2r 2t
high advisory

Outbound SMB Traffic Detection

This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.

Secure Firewall Threat Defense +4 network smb lateral-movement privilege-escalation
2r 1t
high advisory

Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability

A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.

Nexus 9000 Series Fabric Switches in ACI mode cve-2023-20185 information-disclosure network
2r 1t 1c
medium advisory

Masquerading Business Application Installers

Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.

Elastic Defend +22 masquerading defense-evasion initial-access malware windows
2r 4t
medium advisory

Large ICMP Traffic Detection

This analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.

Splunk Enterprise +4 network-traffic command-and-control data-exfiltration
2r 1t