Critical VPN Authentication Bypass - CVE-2026-0123
Severity: CRITICAL (CVSS 9.8) Status: Actively Exploited in the Wild
Executive Summary
A critical authentication bypass vulnerability has been discovered affecting multiple enterprise VPN solutions. This vulnerability allows unauthenticated remote attackers to gain access to internal networks without valid credentials.
If you are running any of the affected products, apply patches immediately or implement the listed mitigations.
Affected Products
| Vendor | Product | Affected Versions | Fixed Version | |--------|---------|-------------------|---------------| | Cisco | AnyConnect | < 4.10.08025 | 4.10.08025+ | | Palo Alto | GlobalProtect | < 6.2.1 | 6.2.1+ | | Fortinet | FortiClient | < 7.2.3 | 7.2.3+ |
Technical Details
The vulnerability exists in the SAML authentication handling of affected VPN clients. An attacker can craft a malicious SAML response that bypasses signature verification, allowing authentication as any user.
Attack Vector
1. Attacker intercepts VPN connection initiation
2. Crafted SAML response injected
3. Signature verification bypassed
4. Attacker authenticated as target user
5. Full VPN tunnel establishedProof of Concept Indicators
Look for these indicators in your logs:
# Suspicious SAML assertions
grep -i "saml" /var/log/vpn/*.log | grep -E "(assertion|signature)"
# Failed then immediate success authentications
grep "auth" /var/log/vpn/*.log | grep -B1 "success" | grep "failed"Mitigation Steps
Immediate Actions
- Apply Patches - Update to fixed versions immediately
- Enable MFA - Add additional authentication layer
- Monitor Logs - Watch for exploitation attempts
- Network Segmentation - Limit VPN user access
If Patching is Not Immediately Possible
# Cisco AnyConnect - Disable SAML temporarily
# In ASA configuration:
tunnel-group DefaultWEBVPNGroup webvpn-attributes
authentication aaa
# Palo Alto GlobalProtect - Require certificate auth
# In PAN-OS:
set authentication-profile VPN multi-factor-authDetection Rules
Suricata Rule
alert http any any -> $HOME_NET any (
msg:"CVE-2026-0123 - VPN SAML Bypass Attempt";
flow:to_server,established;
content:"SAMLResponse";
content:"SignatureValue";
pcre:"/SignatureValue>[A-Za-z0-9+\/=]{10,50}</";
classtype:attempted-admin;
sid:2026001;
rev:1;
)Splunk Query
index=vpn sourcetype=*vpn*
| search (saml OR authentication)
| stats count by src_ip, user, action
| where count > 10 AND action="success"
| sort -countTimeline
- 2026-01-15: Vulnerability discovered by researchers
- 2026-01-20: Vendors notified via coordinated disclosure
- 2026-01-28: Patches released by all vendors
- 2026-02-01: Active exploitation detected in the wild
- 2026-02-02: Public advisory released
References
Updates
We will update this advisory as new information becomes available. Subscribe to our security alerts for real-time notifications.
Last updated: February 2, 2026 14:30 UTC