PT-2026-21954 · Cisco · Cisco Catalyst Sd-Wan Controller+1
Published
2026-02-25
·
Updated
2026-04-20
·
CVE-2026-20127
CVSS v3.1
10
Critical
| AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage.
Description:
A vulnerability exists in the peering authentication mechanism, allowing an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. Successful exploitation could allow the attacker to manipulate network configuration for the SD-WAN fabric. This vulnerability has been actively exploited since 2023 by threat actors, including UAT-8616, who have been observed adding rogue peers and escalating privileges. The vulnerability is rated as critical with a CVSS score of 10.0.
Recommendations:
Apply the latest security updates released by Cisco to address this vulnerability. Hunt for signs of compromise, including suspicious control-connection peering events, rogue accounts, SSH keys, log wiping, and downgrade/reboot artifacts. Restrict access to management interfaces and consider implementing network segmentation to limit the impact of potential exploitation.
Fix
LPE
RCE
DoS
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Catalyst Sd-Wan Controller
Cisco Catalyst Sd-Wan Manager