Add vpatch rules for CVE-2026-20127 (Cisco SD-WAN vManage Pre-Auth RCE)#1714
Add vpatch rules for CVE-2026-20127 (Cisco SD-WAN vManage Pre-Auth RCE)#1714
Conversation
Two rules covering the full exploit chain: - vpatch-CVE-2026-20127: blocks path-traversal WAR upload to /dataservice/smartLicensing/uploadAck (step 3 - direct RCE trigger) - vpatch-CVE-2026-20127-dca-disclosure: blocks unauthenticated access to the DCA credential file at /reports/data/.../data-collection-agent/.dca (step 1 - cred theft) Both rules validated, linted, and live-tested via the WAF harness. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
Hello @buixor, ✅ The new VPATCH Rule is compliant, thank you for your contribution! |
|
Hello @buixor and thank you for your contribution! I'm a bot that helps maintainers to validate scenarios and ensure they include all the required information. The following items have errors: crowdsecurity/crs-exclusion-plugin-cpanel:
crowdsecurity/crs-exclusion-plugin-dokuwiki:
crowdsecurity/crs-exclusion-plugin-drupal:
crowdsecurity/crs-exclusion-plugin-nextcloud:
crowdsecurity/crs-exclusion-plugin-phpbb:
crowdsecurity/crs-exclusion-plugin-phpmyadmin:
crowdsecurity/crs-exclusion-plugin-wordpress:
crowdsecurity/crs-exclusion-plugin-xenforo:
Mitre ATT&CKInformation about mitre attack can be found here.
Expected format is (where labels:
classification:
- attack.TXXXXCVEsIf your scenario covers a specific CVE (Common Vulnerabilities and Exposures), please add it. Expected format is (where labels:
classification:
- cve.CVE-XXX-XXXBehaviorsPlease identify the behavior(s) your scenario is targeting. You can find the list of available behaviors here. Expected format is (where labels:
behavior: <behavior>See the labels documentation for more information. |
Two rules covering the full exploit chain:
Both rules validated, linted, and live-tested via the WAF harness.