Secplicity Blog

Cybersecurity Headlines & Trends Explained

Cisco SD-WAN 0-Day: What MSPs Should Do Now

Three stories, one theme: control planes, supply chains, and human workflows remain high-leverage targets. 

This Secplicity blog follows the sequence and details covered by Marc Laliberte and Corey Nachreiner in The443 Podcast Episode 360. 

1) Cisco Catalyst SD-WAN 0-Day (CVSS 10): What happened 

Cisco disclosed and patched a 0-day vulnerability in the Catalyst SD-WAN controller and SD-WAN manager. The issue is scored 10 out of 10 on CVSS

  • Cisco published an advisory. 
  • Cisco Talos published a write-up. 

The vulnerability is described as an authorization bypass that can allow a remote attacker to log in as a high-privileged, non-root user, which can enable manipulation of network configuration on SD-WAN controllers. The write-up also notes an escalation path to root by downgrading, exploiting a 2022 vulnerability, and upgrading again

Why this matters operationally 

An internet-exposed SD-WAN controller is an edge-adjacent control-plane system. If it is compromised, an attacker can effectively peer into the network and gain access behind it. These controllers often sit at the gateway, sometimes in front of routing or security devices, which makes them a strategic position for an adversary. 

Cisco and Talos associate exploitation with a China-based threat actor, with activity dating back to at least 2023. In some cases, attackers achieved root persistence via the downgrade-exploit-upgrade mechanism. In most other cases described, attackers established unauthorized SD-WAN peering connections that can look normal unless teams are paying close attention, but still provide access. 

2) What MSPs should do: Patch, verify, and hunt 

Patch immediately, then validate remediation 

Upgrade affected Catalyst SD-WAN controller and manager systems. For MSP operations, remediation is not complete until it is verified at scale

Minimum verification standard: 

  • Confirm versions post-upgrade across all managed instances. 
  • Record verification timestamps. 
  • Tie changes back to tickets or change records. 

Manually review all SD-WAN peering connections 

Cisco guidance includes manually reviewing SD-WAN peering connections for unexpected activity. 

Important nuance from the discussion: the “IOC” involved is not a unique malicious log event. It is a legitimate peering log you would normally see. The real check is whether the peering clients and IP addresses are the ones you expect. 

What to look for: 

  • Peerings that do not map to known sites, tenants, or providers 
  • Peerings created or changed outside approved change control 
  • Unexpected IP addresses associated with peering activity 

Hunt for the “minor IOC” related to vmanage-admin 

Cisco also points to a smaller indicator: 

  • Look for SSH authentication log entries related to “accept public key” for vmanage-admin

Practical triage: 

  • Pull SSH authentication logs for the exposure window. 
  • Investigate any vmanage-admin public key acceptance that does not match known admin workflows. 
  • Treat unexplained findings as potential compromise until ruled out. 

Treat edge devices like software: update cadence matters 

Network firmware and appliance updates should be checked on a regular cadence. Even if updates land less frequently than application patches, the check-and-update motion needs to be consistent. 

3) Shai-Hulud style NPM worm: Poisoning AI toolchains 

Researchers at Socket, a supply chain security company, published research describing a Shai-Hulud style NPM worm poisoning AI toolchains. 

Quick refresher: 

  • NPM is the Node Package Manager index, a widely used open-source ecosystem for JavaScript libraries (front-end and back-end). 
  • Shai-Hulud references the sandworm in Dune and has been used to label self-propagating worm campaigns in the NPM ecosystem. 
  • Prior campaigns included self-replicating worms that stole secrets and infected other packages, with significant impact. 

How malicious packages get into ecosystems (as covered) 

Common paths include: 

  • Typosquatting (near-identical package names) 
  • Taking over packages when a maintainer abandons one (design weaknesses and ownership transitions) 
  • Social engineering maintainers for credentials and using a legitimate package as “patient zero” (the prior example discussed was a popular package compromise used to seed propagation) 

What this specific campaign did 

  • Deployed across 19 malicious NPM packages initially. 
  • Primarily used typosquatting
  • Named “sandworm mode” based on environment variables embedded in the malware used as a toggle flag (likely controlling propagation behavior). 

Concrete example: 

  • support-color impersonating legitimate supports-color. 
  • A subtle naming difference can be enough to trick developers, and ordering or tab-complete behavior can increase the likelihood of selecting the malicious one. 

Propagation and tooling abuse 

Propagation used a combination of: 

  • Weaponized GitHub Actions (automation workflows in repositories) 
  • Secret harvesting, which can enable automated spread to other packages and repos 

AI-specific targeting: MCP server prompt injection 

Modules directly targeted AI coding assistants: 

  • A malicious MCP server is written locally on a developer workstation. 
  • Tools are registered that appear benign, including names like: 
  • index_project 
  • lint_check 
  • scan_dependencies 

Each tool contained embedded prompt injections instructing an AI coding assistant to steal SSH keys and sensitive environment variables, save them adjacent, and avoid notifying the user. 

“Living off the land” AI polymorphism 

The malware also included a dormant polymorphic engine that looks for local installations of Ollama and uses local LLM tooling to rewrite code dynamically. This is a “living off the land” approach, but applied to local AI tooling. 

Multi-stage behavior and destructive failsafe 

Stages described: 

  1. JavaScript loader 
  2. Lightweight credential harvester (developer secrets in working directory) 
  3. Deep harvester (additional secrets, databases, crypto wallet keys) 
  4. Propagation and persistence 

A notable detail: a “dead switch” behavior where loss of GitHub connectivity can trigger self-destruction, including deleting contents of the user’s home directory. 

MSP takeaway 

Supply chain threats are not theoretical. If your operations include scripts, integrations, internal tooling, or any code-based automation, treat dependency risk as production risk. 

Operational controls that map directly to this threat: 

  • Pin dependencies and enforce lockfiles 
  • Require review for dependency changes 
  • Scan for secrets in repos and CI logs 
  • Apply software composition analysis and SBOM practices 
  • Limit AI tool access to secrets by default, including SSH keys and environment variable stores 

4) Fake job interviews targeting developers: Bitbucket repos and VS Code execution paths 

Microsoft Defender researchers published an analysis of a coordinated campaign designed to compromise software developers using fake job interviews as the lure. 

How it was detected: 

  • Defender telemetry showed outbound connections to known attacker command-and-control infrastructure. 
  • Connections originated from Node.js processes on compromised systems. 

Initial delivery: 

  • Traced back to malicious software repositories hosted on Bitbucket
  • Additional related repos were identified through naming patterns and code structure similarities. 

Three execution paths described 

All three paths ultimately ran attacker-controlled JavaScript on developer machines: 

  1. VS Code workspace automation triggered via the “folder open” hook 
  2. The developer manually runs the application, which decodes a base64-encoded URL and retrieves a JavaScript loader hosted on a trusted external platform 
  3. Use of environment files and application logic to open a backdoor to attacker servers 

Post-exploitation flow 

  • A first-stage beacon registers the victim system with attacker infrastructure. 
  • A second-stage JavaScript loader enables in-memory execution (fileless behavior). 
  • Exfiltration mechanisms are included. 

Practical defense that fits real workflows 

VS Code includes a control that matters here: 

  • When opening a new folder, VS Code prompts whether the folder is trusted. 
  • Selecting “no” disables a set of automations and hooks that can execute without user awareness. 

Human safety checks from the discussion also apply: 

  • Be wary of code tests arriving before meaningful interaction with a legitimate employer. 
  • Do not treat unsolicited projects as safe by default. 
  • Pause before trusting and running unknown code. 

What ties these together 

  • Control-plane and edge systems remain prime targets. 
  • Supply chain compromise continues to scale impact, now intersecting with AI-assisted development workflows. 
  • Social engineering targets the moment a human opens or runs code, and modern dev tooling can execute on “open” events.