Skip to content

Commit 449d162

Browse files
buixorclaude
andcommitted
Add vpatch rules for CVE-2026-20127 (Cisco SD-WAN vManage Pre-Auth RCE)
Two rules covering the full exploit chain: - vpatch-CVE-2026-20127: blocks path-traversal WAR upload to /dataservice/smartLicensing/uploadAck (step 3 - direct RCE trigger) - vpatch-CVE-2026-20127-dca-disclosure: blocks unauthenticated access to the DCA credential file at /reports/data/.../data-collection-agent/.dca (step 1 - cred theft) Both rules validated, linted, and live-tested via the WAF harness. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 7d9b462 commit 449d162

File tree

7 files changed

+109
-0
lines changed

7 files changed

+109
-0
lines changed
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
id: CVE-2026-20127-dca-disclosure
2+
info:
3+
name: CVE-2026-20127-dca-disclosure
4+
author: crowdsec
5+
severity: critical
6+
description: Cisco SD-WAN vManage unauthenticated DCA credential disclosure testing
7+
tags: appsec-testing
8+
http:
9+
- method: GET
10+
path:
11+
- "{{BaseURL}}/reports/data/opt/data/containers/config/data-collection-agent/.dca"
12+
cookie-reuse: true
13+
matchers:
14+
- type: status
15+
status:
16+
- 403
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
appsec-rules:
2+
- ./appsec-rules/crowdsecurity/base-config.yaml
3+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2026-20127-dca-disclosure.yaml
4+
nuclei_template: CVE-2026-20127-dca-disclosure.yaml
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: CVE-2026-20127
2+
info:
3+
name: CVE-2026-20127
4+
author: crowdsec
5+
severity: critical
6+
description: Cisco SD-WAN vManage path traversal WAR upload RCE testing
7+
tags: appsec-testing
8+
http:
9+
- raw:
10+
- |
11+
POST /dataservice/smartLicensing/uploadAck HTTP/1.1
12+
Host: {{Hostname}}
13+
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW
14+
15+
------WebKitFormBoundary7MA4YWxkTrZu0gW
16+
Content-Disposition: form-data; name="file"; filename="../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war"
17+
Content-Type: application/java-archive
18+
19+
PK
20+
------WebKitFormBoundary7MA4YWxkTrZu0gW--
21+
cookie-reuse: true
22+
matchers:
23+
- type: status
24+
status:
25+
- 403
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
appsec-rules:
2+
- ./appsec-rules/crowdsecurity/base-config.yaml
3+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2026-20127.yaml
4+
nuclei_template: CVE-2026-20127.yaml
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: crowdsecurity/vpatch-CVE-2026-20127-dca-disclosure
2+
description: 'Detects unauthenticated access to the DCA credential file in Cisco Catalyst SD-WAN Manager (CVE-2026-20127)'
3+
rules:
4+
- and:
5+
- zones:
6+
- URI
7+
transform:
8+
- lowercase
9+
- urldecode
10+
- normalizepath
11+
match:
12+
type: contains
13+
value: '/reports/data/opt/data/containers/config/data-collection-agent/.dca'
14+
15+
labels:
16+
type: exploit
17+
service: http
18+
confidence: 3
19+
spoofable: 0
20+
behavior: 'http:exploit'
21+
label: 'Cisco SD-WAN vManage - Credentials Disclosure'
22+
classification:
23+
- cve.CVE-2026-20127
24+
- attack.T1190
25+
- cwe.CWE-552
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: crowdsecurity/vpatch-CVE-2026-20127
2+
description: 'Detects path traversal file upload exploitation in Cisco Catalyst SD-WAN Manager (CVE-2026-20127)'
3+
rules:
4+
- and:
5+
- zones:
6+
- URI
7+
transform:
8+
- lowercase
9+
- urldecode
10+
match:
11+
type: contains
12+
value: '/dataservice/smartlicensing/uploadack'
13+
- zones:
14+
- FILENAMES
15+
transform:
16+
- lowercase
17+
- urldecode
18+
match:
19+
type: contains
20+
value: '..'
21+
22+
labels:
23+
type: exploit
24+
service: http
25+
confidence: 3
26+
spoofable: 0
27+
behavior: 'http:exploit'
28+
label: 'Cisco SD-WAN vManage - RCE'
29+
classification:
30+
- cve.CVE-2026-20127
31+
- attack.T1190
32+
- cwe.CWE-22
33+
- cwe.CWE-434

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,8 @@ appsec-rules:
168168
- crowdsecurity/vpatch-CVE-2025-66039
169169
- crowdsecurity/vpatch-CVE-2025-61678
170170
- crowdsecurity/vpatch-CVE-2025-4689
171+
- crowdsecurity/vpatch-CVE-2026-20127
172+
- crowdsecurity/vpatch-CVE-2026-20127-dca-disclosure
171173
author: crowdsecurity
172174
contexts:
173175
- crowdsecurity/appsec_base

0 commit comments

Comments
 (0)