top of page

Security Bulletin

Public·3 members

George SuttonGeorge Sutton
George Sutton

Critical Cisco SD-WAN Zero-Day Exploited Since 2023

February 3rd, 2026


❓What:

  • A critical authentication bypass vulnerability (CVE-2026-20127) affecting Cisco Catalyst SD-WAN Controller and SD-WAN Manager allows a remote attacker to bypass authentication and obtain high-privileged access to affected systems.

  • The flaw stems from a failure in the SD-WAN peering authentication mechanism, enabling attackers to send crafted requests that grant privileged access.

  • The vulnerability carries a CVSS score of 10.0 and has been actively exploited since at least 2023 by a sophisticated threat actor tracked as UAT-8616.

  • Once access is obtained, attackers can use the NETCONF interface to manipulate network configurations across the SD-WAN fabric.


⚠️Impact:

Successful exploitation can give attackers control of the SD-WAN management and control plane, allowing them to alter routing, policies, and connectivity across the entire network fabric.


Potential consequences include:

  • Unauthorized network configuration changes

  • Insertion of rogue peers/devices into the SD-WAN fabric

  • Privilege escalation to root access

  • Persistent access to critical networking infrastructure


Systems with internet-exposed management interfaces are at the highest risk.


💡Recommendations:

Organizations running Cisco Catalyst SD-WAN should take immediate defensive actions:

1. Patch immediately

  • Upgrade to Cisco fixed versions addressing CVE-2026-20127.

2. Restrict management access

  • Remove public exposure of SD-WAN management interfaces.

  • Limit access to trusted admin networks via VPN/jump hosts.

3. Hunt for indicators of compromise

  • Review authentication logs (e.g., /var/log/auth.log) for unknown IP addresses or unusual admin logins.

  • Investigate unexpected SD-WAN peering connections or configuration changes.

4. Harden the management plane

  • Implement allowlisting for administrative access.

  • Monitor NETCONF/API activity and abnormal control-plane behavior.

5. Validate system integrity

  • Check for unexpected version downgrades or reboots, which attackers may use to exploit the flaw and conceal activity.

Read the full article HERE

1 View
bottom of page