<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/auth-bypass/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sat, 16 May 2026 11:09:31 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/auth-bypass/" rel="self" type="application/rss+xml"/><item><title>Cisco Catalyst SD-WAN CVE-2026-20182: Second vdaemon Auth Bypass Lands in CISA KEV</title><link>https://cybercrime.club/posts/cisco-sdwan-cve-2026-20182-vdaemon-authentication-bypass-cisa-kev/</link><pubDate>Sat, 16 May 2026 11:09:31 -0400</pubDate><guid>https://cybercrime.club/posts/cisco-sdwan-cve-2026-20182-vdaemon-authentication-bypass-cisa-kev/</guid><description>Cisco patched a CVSS 10.0 auth bypass in Catalyst SD-WAN Controller's vdaemon service. UAT-8616 is already exploiting it. CISA added it to KEV May 15 with a May 17 deadline.</description><category>vulnerability</category></item></channel></rss>