CVE-2026-20147: A vulnerability in Cisco Hit with CRITICAL Denial of service
A vulnerability in Cisco denial of service (CVE-2026-20147) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
Intelligence Feed
The Sherlock Forensics Intelligence Feed provides expert analysis of AI code security, vibe coding vulnerabilities, CVE advisories and digital forensics methodologies from certified examiners with over 20 years of field experience in Vancouver, BC.
Featured Analysis
A vulnerability in Cisco denial of service (CVE-2026-20147) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
A vulnerability in Cisco denial of service (CVE-2026-20180) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
A vulnerability in the vulnerability (CVE-2026-20184) scores CVSS 9.8 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
A vulnerability in Cisco denial of service (CVE-2026-20186) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
In Splunk Enterprise versions remote code execution (CVE-2026-20204) scores CVSS 7.1 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
In Splunk MCP Server vulnerability (CVE-2026-20205) scores CVSS 7.2 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The Riaxe Product Customizer SQL injection (CVE-2026-3599) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The Prismatic plugin for cross-site scripting (CVE-2026-3876) scores CVSS 7.2 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The Barcode Scanner (+Mobile privilege escalation (CVE-2026-4880) scores CVSS 9.8 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
The Payment Gateway for vulnerability (CVE-2026-5050) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Spring cleaning for your security posture. Remove old accounts, rotate keys, patch outstanding CVEs and test your incident response plan.
4 new Cross-Site Scripting (XSS) CVEs this week including CVE-2026-27243 (CVSS 9.3). What SaaS Security teams need to know.
SOC 2 does not explicitly require a penetration test. But every auditor expects one. What the Trust Services Criteria actually say and what your report needs.
How to scope a SaaS penetration test. Covers API endpoints, authentication flows, multi-tenant isolation, webhooks and third-party integrations that most vendors skip.
Improper access control in access control (CVE-2026-26183) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, cross-site scripting (CVE-2026-27243) scores CVSS 9.3 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, cross-site scripting (CVE-2026-27245) scores CVSS 9.3 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, cross-site scripting (CVE-2026-27246) scores CVSS 9.3 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
ColdFusion versions 2023.18, 2025.6 vulnerability (CVE-2026-27305) scores CVSS 8.6 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Concurrent execution using shared vulnerability (CVE-2026-27926) scores CVSS 7.0 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Use after free in vulnerability (CVE-2026-32089) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Concurrent execution using shared vulnerability (CVE-2026-32090) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Improper input validation in vulnerability (CVE-2026-32168) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Insufficiently protected credentials in vulnerability (CVE-2026-32171) scores CVSS 8.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Deserialization of untrusted data deserialization (CVE-2026-32192) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, privilege escalation (CVE-2026-34617) scores CVSS 8.7 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
ColdFusion versions 2023.18, 2025.6 vulnerability (CVE-2026-34619) scores CVSS 7.7 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Many cyber insurance policies cover penetration testing under loss prevention or pre-breach services. Search your policy for four key terms to find out.
Spend $1,500 on a pentest, save $3,000 to $10,000 on your premium. The ROI math and what to include in your renewal package.
Most policyholders use 2 of 10 available security benefits. Here is the full checklist of what your premium pays for.
What brokers skip: proactive benefits, vendor lists and premium reduction strategies. Five questions to ask at renewal.
Six steps from policy check to reimbursement. Our reports are formatted for insurance submission.
Scope definition, CVSS ratings, remediation steps, executive summary, tester credentials and retest results. Our reports check every box.
Five common denial reasons and how a $1,500 pentest provides the due diligence evidence that prevents each one.
Many cyber insurance policies cover annual penetration tests as a preventive benefit. Your premium already includes this. Here is how to check and submit the request.
Step-by-step walkthrough of the cyber insurance claims process from notification through triage, investigation, report and claim resolution.
Penetration tests reduce claims, demonstrate due diligence and satisfy policy conditions. Skip them and your coverage faces exclusions and denied claims.
The big firms handle 500 cases a year. We handle yours. Comparing large panel vendors to independent forensics for cyber insurance claims.
Recent pentest, IR plan, MFA, tested backups and logging. Do these five and your insurer loves you. Skip them and your claim gets complicated.
You are one person against every bot on the internet. A casual, direct guide to the attacks that actually hit solo builders and how to stop them.
10 quick security checks with how-to steps for each. Free checklist for solopreneurs and indie hackers launching web apps.
First person narrative. Relatable. Honest. The answer is almost certainly no. But that is fixable.
A priority ladder from free tools to $5,000 pentests. Genuinely helpful at every budget level. No hard sell.
The moment someone gives you money or personal data, you are responsible for protecting it. Legal obligations kick in.
AI-assisted code auditing with ChatGPT, Claude and SAST tools. What AI catches, what it misses and when to call a professional.
10 copy-paste security prompts for vibe coders. Check your AI-generated code for SQL injection, hardcoded secrets, broken auth and more.
Claude Mythos can find zero-days faster than any human. If AI discovers vulnerabilities this fast, your unaudited code is a sitting target.
National reach, court-qualified in BC and Newfoundland, remote forensic capabilities and on-site collection anywhere in Canada.
5 free methods to test your website security. Security headers, SSL, exposed files, admin panels and Google dorking.
Step-by-step guide for the first 60 minutes of an active breach. Isolate, preserve, assess, communicate and engage forensics.
20 years of cybersecurity and forensics. Services, pricing, credentials, CBC appearances and what makes Sherlock different.
SaaS penetration testing covers multi-tenant security, API testing, auth/authz review and compliance reporting. From $5,000 CAD.
What happens during a vibe code audit, what we check, common findings and how to prepare your AI-built app for review. From $1,500 CAD.
On-site forensic collection, BC court testimony, PIPEDA compliance and same-day incident response from two Metro Vancouver offices.
Court-qualified examiner with 20+ years experience. Computer forensics, cellphone forensics, eDiscovery and expert witness testimony.
AI code slop is getting worse. Our 2026 audit data shows what happens when AI-generated code ships without security review.
Analysis of Claude Mythos vulnerability discovery capabilities, what remains unpatched and what it means for your security posture.
Most firewalls are configured once and never validated. Years of rule bloat create hidden pathways through your perimeter.
Default credentials, any-any rules, no egress filtering and seven other misconfigurations we find in nearly every firewall we test.
Fileless attacks, LOLBins and credential abuse bypass EDR detection. A penetration test reveals what your endpoint protection misses.
Zscaler, Cloudflare Zero Trust and BeyondTrust have limitations. Insider threats and misconfigurations bypass the architecture.
Companies buy firewall, EDR, NDR, SIEM and MFA but never test them together. ShadowTap tests the whole stack simultaneously.
Companies spend millions on Darktrace, CrowdStrike and Sentinel but never test if they work. Why security tool validation is the missing piece.
Known limitations of behavioral analysis: encrypted tunnels, MAC spoofing, low-throughput DNS tunnels and traffic mimicking normal patterns.
AI detection tools need training data and baseline. New devices have no baseline. Slow-moving attackers stay under radar.
Sanitized methodology: Darktrace stays fully operational, controlled phase escalation and joint review after testing.
Encrypted tunnels, DNS exfiltration, ICMP tunnels, non-standard ports and identity rotation. The gaps attackers exploit.
Years watching networks for attackers taught us exactly how to be one. 12,000+ signatures became 12,000+ things we know how to test for.
ShadowTap Ghost Mode: physically on your network, generating zero outbound traffic. All C2 through cellular. Your IDS cannot see what is not there.
Anti-Antigena MAC prefix matching and hostname mimicry. To the AI, we looked like just another Intel workstation named WS4827.
Cloudflare ARGO, Iodine DNS, ICMP ptunnel, SSH reverse and JML ICMP timing. Each tunnel that fails teaches us about your detection.
When ShadowTap plugs in, the clock starts. The baseline window is the attacker's window. A real attacker has the same opportunity.
If your vendor cannot answer these five questions about detection coverage, we can. By testing it.
Blue team monitors. Red team attacks. Purple team approach delivers collaborative improvement that neither side achieves alone.
AI coding is incredible. Here is how to do it without leaving the door open. Secure environments, security prompts, pre-commit hooks and deploy checks.
Every revolution needed a security layer. Assembly needed memory safety. The web needed HTTPS. AI needs audit.
Ban AI and your developers use it anyway. Embrace it with guardrails. Policy template for enterprise CTOs who want to say yes to AI.
We pointed our own tools at sherlockforensics.com and documented everything honestly. Missing headers, demo files, permission issues and more.
A penetration test is an authorized simulated cyberattack to find vulnerabilities. Learn types, cost, timeline and what to expect.
Penetration test costs from $1,500 to $50,000 CAD. Pricing table by tier, scope and timeline. Transparent pricing breakdown.
AI slop is unreviewed AI-generated code that compiles correctly but hides security vulnerabilities. Definition, examples and how to fix it.
Vibe coding is building apps with AI assistants and minimal manual coding. Learn the security risks and how to protect vibe-coded applications.
The complete 7-step penetration testing process from scoping and planning through exploitation, reporting and remediation support.
External, internal, web app, API, mobile, social engineering, cloud and red team. Which type of penetration test do you need?
Comparing the top pentest firms in Canada: Sherlock Forensics, Mandiant, Coalfire, GoSecure, Herjavec Group and KPMG. Specialties, pricing and target markets.
What Nessus, Qualys and Burp Suite find vs. what a human pentester catches. Pricing comparison and why you likely need both.
CrowdStrike protects endpoints. We test if your application can be broken into. Why SMBs need pentesting, not just EDR.
Real pricing from $1,500 quick audits to $50,000+ enterprise red teams. Transparent comparison with factors affecting cost.
What OWASP ZAP, Nikto, nmap and SSL Labs do well and where free tools stop. Use them for hygiene. Hire professionals for assurance.
I built a SaaS with Cursor in a weekend. Then I ran our own security testing tool against it. 14 vulnerabilities in 45 minutes.
Took us 4 minutes to find the database password. passwords.txt in the public directory. A war story of escalating findings from one engagement.
15 practical security checks for AI-generated code. Each item includes what to check, why it matters and a copy-paste fix you can use right now.
How .env files end up exposed in apps built with Cursor, Bolt and Lovable. How to check if yours is leaking and how to fix it in 5 minutes.
92% had critical vulnerabilities. 78% stored secrets in plaintext. Data-driven analysis with visual breakdowns by vulnerability category and AI tool.
Experience catches business logic flaws, court-admissible documentation and auditor-ready reports. What 20 years and CISSP/ISSAP/ISSMP certifications actually deliver.
A buyer's guide covering certifications, manual testing, compliance reports, retesting, expert witness capability and more. With Sherlock's answers to each.
Default credentials, missing rate limiting, exposed admin panels, SQL injection and more. The 10 most common findings from real pentests with severity ratings.
Seven essential security prompts to paste into your AI coding tool before deploying. Catch broken auth, injection flaws, exposed secrets and more.
The security gap between mandating AI coding tools and auditing what they produce. References Linus Torvalds, Zuckerberg and the enterprise accountability problem.
Practical npm and pip verification commands to confirm AI-suggested packages exist before installing them. Prevent supply chain attacks from hallucinated dependencies.
A 7-point checklist for CPAs reviewing SOC 2 pentest reports. Scope, methodology, CVSS findings, remediation status, retest evidence and red flags.
Transparent pricing from $1,500 to $25,000+ CAD. Four tiers compared to industry averages, cost factors and why cheap pentests are expensive.
Aggregate data from hundreds of engagements. Default credentials, SQL injection, broken access controls and more, with severity ratings and fixes.
Clear comparison of pentests, vulnerability scans, bug bounties and red teams. Table format with costs, use cases and a decision tree.
Step-by-step walkthrough of a real engagement. Scoping, reconnaissance, exploitation, reporting and debrief demystified for founders and CTOs.
Penetration testing explained in plain language. What it is, why it matters, what happens during one, what the report looks like and how much it costs.
Side-by-side comparison for CTOs. Pros, cons, costs and a decision framework for choosing between pentests and bug bounty programs.
A detailed day-by-day walkthrough of a standard penetration test. Scoping, reconnaissance, active testing, exploitation, reporting and debrief.
The most common API vulnerabilities mapped to the OWASP API Security Top 10. Broken auth, BOLA, mass assignment, rate limiting and SSRF with real findings.
How to tell a good pentest report from a bad one. Red flags, green flags and what to demand from your security vendor.
SOC 2 penetration testing requirements for startups. What the standard requires, how to scope, timing and what auditors look for in the report.
Top 5 findings from the 2026 AI Code Security Report. 92% of AI-generated codebases have critical vulnerabilities. 88% lack rate limiting. 78% expose secrets.
Aggregate data from 50 AI code audits. 92% had critical vulnerabilities, 78% stored secrets in plaintext and 54% had SQL injection. Vibe-coded vs professional comparison.
Anonymized case study. 3-person SaaS startup built with Cursor. 8 critical vulnerabilities found in a $1,500 quick audit and fixed in 2 days.
$1,500 audit vs $4.88M breach. The math of prevention vs doing nothing, including PIPEDA fines, cyber insurance and reputation damage.
The 10 most common security disasters in vibe-coded authentication. Plaintext passwords, client-side auth, exposed .env files and more.
Ten checks you can run right now. If you fail more than two you need a professional audit before launch.
A realistic 60-minute attack walkthrough on a typical vibe-coded SaaS. From recon to database dump to Stripe access.
Decision tree for founders. If it handles user data, processes payments or has login, the answer is yes.
Directory traversal, server misconfiguration and zero hashing. Why flat file password storage is catastrophic and what to use instead.
AI slop ships fast and breaks faster. Unreviewed AI-generated code carries injection flaws, hallucinated dependencies and hardcoded secrets that survive to production.
Working code is not secure code. AI writes functional applications that hide auth bypasses, injectable queries and unprotected API endpoints.
You built it in a weekend with Cursor. An attacker dismantled it in an afternoon. The incident response playbook for AI-built applications.
Nine security categories every CTO must check before shipping AI-generated code. Dependency verification, secrets scanning, auth review and more.
Hallucinated packages, weak randomness, SQL injection, hardcoded secrets and insecure deserialization. The five patterns we find in every AI code audit.
Anthropic's Claude Mythos found thousands of zero-days for under $50 each. Over 99% remain unpatched.
The rise of non-developers shipping production apps and why scanning alone is not enough to secure vibe coded software.
EU AI Act, NIST AI RMF and investor expectations are making AI security audits a pre-launch requirement.
Documented cases of AI systems being exploited in production. Prompt injection, model poisoning and supply chain attacks with real-world impact.
A forensic examination of AI attack surfaces. Model extraction, data poisoning, adversarial inputs and the security gaps most teams overlook.
Employees are using AI tools you did not approve on data you did not authorize. The compliance and security implications are significant.
The tools our team actually uses on engagements. From reconnaissance to exploitation to reporting.
What Canadian businesses need to know about PIPEDA compliance, data breach notification and privacy impact assessments.
How evolving post-quantum encryption standards are reshaping volatile memory analysis and what forensic examiners must adapt.
A forensic methodology for authenticating digital evidence when AI-generated media enters the courtroom.
Investors are asking about security posture. Here is what a pre-funding penetration test actually covers and why waiting costs more.
CVE Intelligence
High and critical vulnerabilities relevant to cloud, web and AI infrastructure. Updated daily from the National Vulnerability Database.
| CVE | Severity | CVSS | Affected Product | Vulnerability |
|---|---|---|---|---|
| CVE-2026-23696 | CRITICAL | 9.9 | Windmill CE/EE | SQL injection in folder ownership management |
| CVE-2021-4473 | CRITICAL | 9.8 | Tianxin Management System | Command injection in Reporter component |
| CVE-2026-22679 | CRITICAL | 9.8 | Weaver E-cology 10.0 | Unauthenticated RCE via debug endpoint |
| CVE-2026-3296 | CRITICAL | 9.8 | Everest Forms (WordPress) | PHP Object Injection via deserialization |
| CVE-2026-4631 | CRITICAL | 9.8 | Cockpit (Linux) | SSH command injection via login endpoint |
| CVE-2026-1346 | CRITICAL | 9.3 | IBM Verify Identity Access | Privilege escalation for local users |
| CVE-2026-22683 | HIGH | 8.8 | Windmill | Missing authorization bypasses operator restrictions |
| CVE-2026-3357 | HIGH | 8.8 | IBM Langflow Desktop | Insecure FAISS deserialization enables code execution |
| CVE-2026-1342 | HIGH | 8.5 | IBM Verify Identity Access | Local users can execute malicious scripts |
| CVE-2026-4788 | HIGH | 8.4 | IBM Tivoli Netcool Impact | Sensitive data exposure in log files |
| CVE-2026-4740 | HIGH | 8.2 | Red Hat ACM / Open Cluster Mgmt | Certificate forgery via improper validation |
| CVE-2026-5736 | HIGH | 7.3 | PowerJob | detailPlus endpoint manipulation |
| CVE-2026-5739 | HIGH | 7.3 | PowerJob | Code injection via OpenAPI workflow endpoint |
| CVE-2026-5741 | HIGH | 7.3 | docker-mcp-server | OS command injection via HTTP interface |
| CVE-2026-1343 | HIGH | 7.2 | IBM Verify Identity Access | SSRF exposes internal auth endpoints |
| CVE-2026-22682 | HIGH | 7.1 | OpenHarness | Improper access control exposes local files |