The goal of this talk is to provide the results of passive and active fingerprinting for SD-WAN systems using a common threat intelligence approach. We explore Internet-based and cloud-based publicly available SD-WAN systems using the well-known «Shodan» and «Censys» search engines and custom developed automation tools and show that most of the SD-WAN systems have known vulnerabilities related to outdated software and insecure configuration.
As presented at Zeronights 2018 by Anton Nikolaev, Denis Kolegov, Oleg Broslavsky.
The goal of this paper is to understand SD-WAN threats using practical approach. We describe basic SD-WAN features and components, investigate an attack surface, explore various vendor features and their security, explain threats and vulnerabilities found in SD-WAN products. We also extend existing SDN threat models by describing new potential threats and attack vectors, provide examples, and consider high-level approaches for their mitigations.
SD-WAN New Hop talk by Denis Kolegov, Oleg Broslavsky as presented at Power of Community 2018 conference, Seoul, Korea. 
In this presentation, we disclose a set of vulnerabilities in widespread and most popular SD-WAN products including Citrix NetScaler and Silver Peak EdgeConnect. We present the new results of our research, consider some technical details of the insecure design and found vulnerabilities, and describe different attack scenarios that may allow an attacker to compromise SD-WAN control and data planes.
On CTX236992, mode details and exploitation vectors by Sergey Gordeychik, Denis Kolegov, Nikita Oleksov, Nikolay Tkachenko, Oleg Broslavsky
Unauthenticated Access to Munin Service
Incorrect Access Controls
Cross-Site Request Forgery
Use of CakePHP Component with Known Vulnerabilities
Slow HTTP DoS Attacks
Session ID Leakage
OS Command Injection(s)