Automating the CTI heavylifting

Looking for more?

Let us help you track the cyber-threat landscape

  • base

    $15/mo

    Cancel anytime

    • Daily news: Keep up to date on cyber-security and ensure that you are not going to miss any of the big news

    • Deep search: Get access to a large, historical archive of more than 50.000 news articles and a set of advanced search options

    • User customization: Gives you the ability to cut out the noise and focus on the important stuff

  • pro

    $29/mo

    Cancel anytime

    • Dashboard access: Keep up to date on the news-cycle and track the ever-evolving threat landscape

    • Trending CVE's: See what CVE's are currently being exploited and researched, and get insights into how they appear in the wild

    • Cutting-edge AI: We don't pretend that AI is going to solve all your problems, but it sure does help.

  • enterprise

    Starting at

    $200/mo

    Contact us for a qoute

    • Service integration: Access a range of integration options, from API access to Slack and Teams integration

    • Team-wide Pro access: Onboard your whole team in OSINTer. No extra seat expenses, usage costs or other hidden fees

    • Custom deployment: Need on-prem deployment for data-protection? Or maybe a custom solution? Contact us, and experience a sea of opportunities

    Contact us

Trending CVE's

Track their ever-evolving media presence

CVE-2026-20127: Authentication Bypass in Cisco Catalyst SD-WAN Controller Gains Privileges

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 



BaseScore:

10

CVE:

CVE-2026-20127

Weaknesses:

CWE-287

CWE-287

Keywords:



Loading CVE articles.

Frequently asked questions

Yes! For a long period OSINTer was without license, but has recently been licensed under Affero GPL v3. This means that you not only can take a peak in the inner-workings of OSINTer at the public Github repos, but also that we highly encourage participating in the developemnt of OSINTer.