PT-2026-21954 · Cisco · Cisco Catalyst Sd-Wan Controller+1
Published
2026-02-25
·
Updated
2026-03-05
·
CVE-2026-20127
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Catalyst SD-WAN Controller and Manager versions prior to the fixed release
Description
A critical vulnerability exists in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage). This flaw allows an unauthenticated, remote attacker to bypass authentication and gain administrative privileges on an affected system. Successful exploitation enables the attacker to manipulate network configuration for the SD-WAN fabric via NETCONF. This vulnerability, tracked as CVE-2026-20127, has a CVSS score of 10.0 and has been actively exploited in the wild since at least 2023 by a sophisticated threat actor (UAT-8616). Attackers have been observed adding rogue peers, escalating privileges, and persisting within compromised networks. The vulnerability affects systems globally and has been designated as an imminent threat by multiple cybersecurity agencies.
Recommendations
Apply the latest security updates and patches released by Cisco to address this vulnerability. Restrict access to the management interface of Cisco Catalyst SD-WAN Controller and Manager to trusted IP addresses only. Implement robust monitoring and logging to detect any suspicious activity, including unauthorized access attempts and configuration changes. Rotate credentials and keys as a precautionary measure.
Fix
RCE
DoS
LPE
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-02299
CVE-2026-20127
Affected Products
Cisco Catalyst Sd-Wan Controller
Cisco Catalyst Sd-Wan Manager
References · 224
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-02299 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-20127 · Security Note
- https://twitter.com/shah_sheikh/status/2027142532723851598 · Twitter Post
- https://twitter.com/vuln_tracker/status/2027551265358811305 · Twitter Post
- https://twitter.com/dailytechonx/status/2027402108249452910 · Twitter Post
- https://twitter.com/NetSPI/status/2027468724006007232 · Twitter Post
- https://twitter.com/ThreatSynop/status/2027045331066577081 · Twitter Post
- https://twitter.com/AWNetworks/status/2028920900427391395 · Twitter Post
- https://twitter.com/pcasano/status/2027861380909699197 · Twitter Post
- https://twitter.com/shah_sheikh/status/2026906941985869942 · Twitter Post
- https://twitter.com/SystemTek_UK/status/2026966039003533715 · Twitter Post
- https://twitter.com/trubetech/status/2026720651688477041 · Twitter Post
- https://twitter.com/ethicalhack3r/status/2029244376908435492 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1rf3dbj/cisco_sdwan_zeroday_cve202620127_exploited_since · Reddit Post