Cyber Threat Brief — April 5 2026

⚠️ This report is AI-generated. Always validate findings.

1. Cisco SD-WAN Auth Bypass Gets Metasploit Module + Five Eyes Hunt Guide — CVE-2026-20127

TL;DR: A CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN Controller/Manager now has a public Metasploit module (sfewer-r7) and a Five Eyes co-signed IOC hunt guide. UAT-8616 has exploited this since 2023 for fabric-level persistence.

What’s New:

  • Metasploit auxiliary module merged March 20 via sfewer-r7/CVE-2026-20127; second PoC by zerozenxlabs also public
  • Five Eyes (ACSC/NCSC) hunt guide released with behavioral IOCs for SD-WAN control-plane compromise
  • Post-exploitation chain: rogue peer addition → NETCONF (port 830) manipulation → software version downgrade to re-exploit CVE-2022-20775 for root → version restore to evade detection
  • Affects Catalyst SD-WAN Controller (vSmart) and Manager (vManage); tested on v20.15.3
  • No lateral movement outside SD-WAN components observed, but full fabric config control achieved

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
Accepted publickey for vmanage-admin from unknown IPLog entryT1078.001/var/log/auth.logHunt — validate all vmanage-admin SSH sessions
Unrecognized system IPs in SD-WAN Manager WebUIConfig anomalyT1199SD-WAN Manager UI / APIHunt — audit peer list against known inventory
Software version downgrade + reboot sequenceBehavioralT1601.001/var/volatile/log/sw_script_synccdb.log, /var/log/tmplog/vdebugHunt — alert on any unscheduled downgrade
Path traversal in username (/../../)Exploit artifactT1068/var/log/auth.logBlock/Alert — CVE-2022-20775 escalation indicator
NETCONF sessions on port 830 from unauthorized IPsNetworkT1021Firewall/NetFlowBlock — restrict NETCONF to management VLAN
New local user account creationPersistenceT1136.001SD-WAN Manager audit logsAlert — correlate with change management

Detection

SourceRuleGap
Splunk ESCUNone specificNeed: SD-WAN peering event anomaly detection, vmanage-admin auth from untrusted IPs
ElasticNone specificNeed: Cisco SD-WAN log parsing + behavioral rules for downgrade-reboot sequences
SigmaNone specificNeed: Generic auth.log rules for publickey from unauthorized sources, path traversal in usernames

Sources: Rapid7 PoC · Cisco Talos UAT-8616 · Greenbone Advisory · SOCRadar Analysis


2. WhatsApp VBS/MSI Backdoor Campaign Leverages LOLBins for Persistent Access

TL;DR: Microsoft disclosed a campaign delivering malicious VBS files via WhatsApp messages that chains renamed LOLBins, cloud-hosted payloads, and unsigned MSI packages to establish persistent remote access on Windows endpoints.

What’s New:

  • Microsoft Defender Experts published full attack chain analysis March 31; campaign active since late February 2026
  • VBS files drop renamed Windows utilities into C:\ProgramData hidden folders: curl.exenetapi.dll, bitsadmin.exesc.exe
  • Payloads retrieved from AWS, Tencent Cloud, and Backblaze B2 to evade domain-based blocking
  • Malicious MSI packages (Setup.msi, WinRAR.msi, LinkPoint.msi, AnyDesk.msi) install remote access tools
  • UAC bypass via registry tampering under HKLM\Software\Microsoft\Win; OriginalFileName PE metadata mismatch is primary detection signal

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
curl.exe renamed as netapi.dll in C:\ProgramDataFile renameT1036.005Sysmon EID 1/11Alert — OriginalFileName ≠ process name
bitsadmin.exe renamed as sc.exe in C:\ProgramDataFile renameT1036.005Sysmon EID 1/11Alert — OriginalFileName mismatch
Setup.msi, WinRAR.msi, LinkPoint.msi, AnyDesk.msiMSI payloadT1218.007Sysmon EID 1, Windows Installer logsBlock — unsigned MSI from temp/ProgramData paths
Hidden folders in C:\ProgramDataStagingT1564.001Sysmon EID 11Hunt — new hidden dirs under ProgramData
Trojan:VBS/Obfuse.KPP!MTB, Trojan:VBS/BypassUAC.PAA!MTBDefender sigsT1059.005Defender/MDE alertsAlert — existing coverage
Registry writes to HKLM\Software\Microsoft\Win UAC keysPersistenceT1548.002Sysmon EID 13Alert — UAC setting tampering

Detection

SourceRuleGap
Splunk ESCUWindows System Binary Proxy Execution (partial)Need: specific OriginalFileName vs. actual filename mismatch for LOLBin renames
ElasticRenamed Binary Execution (partial)Need: MSI execution from ProgramData/hidden paths
Sigmaproc_creation_win_renamed_binary.ymlCovers OriginalFileName mismatch — verify deployed and tuned

Sources: Microsoft Security Blog · Malwarebytes Analysis · CSO Online


Status Updates

  • CVE-2026-20131 (Cisco FMC): Interlock ransomware exploitation ongoing; no new IOCs or detection rules since initial coverage. Original brief.
  • CVE-2026-20093 (Cisco IMC): CVSS 9.8 auth bypass patched April 1-2; still no public PoC or ITW exploitation. Monitor for PoC release. Original brief.
  • CVE-2026-5281 (Chrome Dawn): CISA KEV deadline April 15; no attribution or new IOCs. Verify Chrome ≥146.0.7680.178 across fleet. Original brief.
  • UAT-10608 React2Shell (CVE-2025-55182): Talos reports exploitation ongoing; 766+ hosts compromised. Attacker IPs unchanged. Original brief.