Back to Articles
critical Cyber Attack

Cisco SD-WAN Zero-Day: The Three-Year Secret Hackers Didn't Want You to Know About

Cisco disclosed CVE-2026-20127 (CVSS 10.0), an authentication bypass in Catalyst SD-WAN that sophisticated threat actor UAT-8616 has exploited since 2023. The attack chain creates rogue peers, downgrades software to exploit older CVEs, and achieves root persistence. CISA issued Emergency Directive 26-03 requiring 24-hour patching.

By Danny Feb 26, 2026 1 views
Threat Actor
UAT-8616
Attack Vector
Zero-Day / Authentication Bypass

Sometimes the most dangerous vulnerabilities aren't the ones making headlines. They're the ones quietly exploited for years before anyone notices. This week, Cisco disclosed a perfect-ten severity flaw in its SD-WAN platform that sophisticated attackers have been weaponizing since 2023, and if you're running Cisco networking infrastructure, you need to drop what you're doing and patch immediately.

The vulnerability in question, CVE-2026-20127, carries the maximum CVSS score of 10.0 because it does exactly what keeps network administrators up at night. An unauthenticated remote attacker can send a crafted request to Cisco Catalyst SD-WAN Controller (formerly vSmart) or Catalyst SD-WAN Manager (formerly vManage) and completely bypass authentication to obtain administrative privileges. No credentials required. No user interaction needed. Just a malicious packet aimed at your infrastructure.

What makes this particularly devastating is the scope. Every deployment type is affected regardless of configuration, including on-premises installations, Cisco Hosted SD-WAN Cloud, Cisco Managed deployments, and even the FedRAMP environment. If you're running Cisco SD-WAN in any capacity, you're in the blast radius.

The Australian Signals Directorate's Cyber Security Centre discovered this flaw and reported it to Cisco, but the backstory gets worse. According to intelligence from both the ASD-ACSC and Cisco's Talos threat intelligence team, a sophisticated threat actor tracked as UAT-8616 has been quietly exploiting this vulnerability since 2023. That's nearly three years of zero-day exploitation against enterprise networks, and nobody was the wiser.

The attack chain is particularly elegant in its maliciousness. UAT-8616 exploits the authentication bypass to create what researchers describe as a "rogue peer" that joins the network management plane. This rogue device appears as a legitimate but temporary SD-WAN component, allowing the attackers to conduct trusted actions within both the management and control planes. Once inside, they leverage Cisco's built-in update mechanism to stage a software version downgrade, which then allows them to exploit an older vulnerability from 2022, specifically CVE-2022-20775, to escalate privileges all the way to root. After achieving root access, they restore the software to its original version to cover their tracks.

The post-compromise activity reads like a textbook on advanced persistent threats. The attackers created local user accounts designed to mimic existing legitimate accounts, making them harder to spot during routine audits. They installed SSH authorized keys for persistent root access and modified SD-WAN startup scripts to customize the environment for their needs. Using NETCONF on port 830 along with SSH, they moved laterally between SD-WAN appliances within the management plane. When finished, they methodically purged logs under /var/log, wiped command history, and cleaned network connection records to erase evidence of their presence.

Cisco has released patches across multiple version branches, though one is still pending. Organizations running versions prior to 20.9 need to migrate to a fixed release immediately. Version 20.9 users will receive patch 20.9.8.2 on February 27th. Everyone else should update to 20.12.5.3, 20.12.6.1, 20.15.4.2, or 20.18.2.1 depending on their current branch. The Cybersecurity and Infrastructure Security Agency isn't playing games here either. CISA has added both the new CVE and the 2022 privilege escalation flaw to their Known Exploited Vulnerabilities catalog and issued Emergency Directive 26-03, mandating that federal agencies apply fixes within 24 hours and submit detailed inventories of all affected systems.

For those checking whether they've already been compromised, Cisco recommends auditing the /var/log/auth.log file for entries showing "Accepted publickey for vmanage-admin" from unknown or unauthorized IP addresses. These IP addresses should be cross-referenced against the configured System IPs listed in the Catalyst SD-WAN Manager web interface. CISA also suggests examining /var/volatile/log/vdebug, /var/log/tmplog/vdebug, and /var/volatile/log/sw_script_synccdb.log for signs of version downgrade or unexpected reboot events.

This incident underscores a troubling trend that security researchers have been warning about for years. Network edge devices remain high-value targets for sophisticated threat actors looking to establish persistent footholds in critical infrastructure organizations. SD-WAN platforms are particularly attractive because they provide broad visibility and control over an organization's entire network fabric. Getting administrative access to SD-WAN isn't just compromising a single device. It's potentially compromising the network architecture itself.

The fact that UAT-8616 operated undetected for approximately three years should give every security team pause. These weren't script kiddies or opportunistic criminals. This was a highly sophisticated operation with the patience and resources to quietly maintain access to enterprise networks while avoiding detection. Organizations running Cisco SD-WAN need to treat this as a high-priority incident regardless of whether they've seen indicators of compromise. Patch first, then conduct thorough forensic analysis of your SD-WAN infrastructure going back at least to late 2023.

Target Sectors

EnterpriseCritical InfrastructureGovernment

Tags

CiscoSD-WANCVE-2026-20127Zero-DayUAT-8616Authentication BypassCISAvManagevSmart