PT-2026-21954 · Cisco · Cisco Catalyst Sd-Wan Manager+1
Published
2026-02-25
·
Updated
2026-02-26
·
CVE-2026-20127
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage (affected versions not specified)
Description
A flaw exists in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller and Manager, allowing an unauthenticated, remote attacker to bypass authentication and gain administrative privileges on an affected system. This is due to a failure in the authentication process, enabling an attacker to log in as a high-privileged user. Successful exploitation allows manipulation of network configuration for the SD-WAN fabric via access to NETCONF. This issue has been actively exploited in the wild since 2023 by a sophisticated threat actor, who has been adding rogue peers, escalating privileges, and maintaining persistence within affected networks. The threat actor has been observed downgrading and upgrading firmware versions to exploit vulnerabilities and cover their tracks. This vulnerability is being tracked as CVE-2026-20127 and has a critical severity rating.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
LPE
DoS
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
CVE-2026-20127
Affected Products
Cisco Catalyst Sd-Wan Controller
Cisco Catalyst Sd-Wan Manager
References · 55
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-20127 · Security Note
- https://twitter.com/arnavsharma/status/2026804015065887043 · Twitter Post
- https://twitter.com/trubetech/status/2026720651688477041 · Twitter Post
- https://t.me/thehackernews/8491 · Telegram Post
- https://twitter.com/TheHackerWire/status/2026713717371748645 · Twitter Post
- https://cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20127 · Note
- https://twitter.com/EliteHackersUSA/status/2026886956508913936 · Twitter Post
- https://twitter.com/ThreatSynop/status/2026710901236154435 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1remgeo/critical_cisco_sdwan_bug_exploited_in_zeroday · Reddit Post
- https://twitter.com/FBICyberDiv/status/2026734255917715892 · Twitter Post
- https://t.me/defcon_news/134178 · Telegram Post
- https://twitter.com/BleepinComputer/status/2026721092195209295 · Twitter Post
- https://twitter.com/threatcluster/status/2026731731974263163 · Twitter Post
- https://twitter.com/ThreatSynop/status/2026711409384370487 · Twitter Post