Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Cisco SD-WAN Vulnerability Exploited Since 2023

Critical Cisco SD-WAN Vulnerability Exploited Since 2023

Posted on February 26, 2026 By CWS

A severe security flaw has been identified in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Manager, which cybercriminals have exploited since 2023. This vulnerability, designated as CVE-2026-20127 with a critical CVSS score of 10.0, permits remote attackers to gain administrative access by bypassing authentication protocols through crafted requests.

Understanding the Exploitation

The flaw stems from an ineffective peering authentication mechanism within the affected systems. Exploiters can achieve elevated privileges, operating as a high-privileged, non-root user. This access allows manipulation of network configurations using NETCONF. The vulnerability is prevalent across various deployment scenarios, including On-Prem, Cisco Hosted SD-WAN Cloud, and Cisco Managed environments, posing significant risk to exposed systems.

Cisco, recognizing the gravity of the issue, has credited the Australian Cyber Security Centre for identifying the flaw. They monitor the exploitation under the code name UAT-8616, labeling the perpetrators as sophisticated threat actors. The vulnerability has been mitigated in several software versions, urging users to update to secure releases promptly.

Security Measures and Recommendations

Cisco advises users to scrutinize logs for unauthorized access attempts, particularly looking for suspicious entries in the ‘/var/log/auth.log’ file related to ‘vmanage-admin’ from unknown IPs. Additionally, it’s crucial to verify these IP addresses against configured System IPs in the SD-WAN Manager’s UI.

The Australian Cyber Security Centre has highlighted the threat posed by rogue peers joining network management planes, allowing attackers to perform trusted actions within the SD-WAN environment. The exploitation strategy includes using a known vulnerability, CVE-2022-20775, to escalate privileges further, emphasizing the need for vigilance and timely updates.

Broader Implications and Response

The persistent targeting of network edge devices by cyber actors, especially those aiming at critical infrastructure sectors, underscores the urgency for robust cybersecurity measures. The Cybersecurity and Infrastructure Security Agency (CISA) has reacted by adding these vulnerabilities to its Known Exploited Vulnerabilities catalog, mandating swift patching among federal agencies.

CISA has issued directives for comprehensive audits of SD-WAN systems, requiring agencies to inventory devices, apply necessary updates, and assess potential compromises. Compliance deadlines have been set, emphasizing the importance of proactive steps to safeguard against potential threats.

The increasing sophistication of cyber threats necessitates continuous monitoring and prompt action to protect essential network infrastructure. Organizations are urged to follow recommended practices and maintain up-to-date defenses to mitigate the risks posed by such vulnerabilities.

The Hacker News Tags:ASD-ACSC, authentication bypass, CISA, Cisco, CVE-2026-20127, cyber threat, Cybersecurity, network compromise, network security, privilege escalation, SD-WAN, security patch, UAT-8616, Vulnerability, zero-day

Post navigation

Previous Post: Kali Linux Enhances Security Testing with Claude AI
Next Post: Google Dismantles Chinese Cyber Espionage Network

Related Posts

Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks The Hacker News
Spear-Phishing Campaign Targets Uzbekistan and Russia Spear-Phishing Campaign Targets Uzbekistan and Russia The Hacker News
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools The Hacker News
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts The Hacker News
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch The Hacker News
AI Automation Exploits, Telecom Espionage, Prompt Poaching & More AI Automation Exploits, Telecom Espionage, Prompt Poaching & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks
  • U.S. Targets Russian Cyber Exploit Network with Sanctions
  • Firefox 148 Debuts Sanitizer API to Curb XSS Threat
  • Critical Apex One Flaws Patched by TrendAI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks
  • U.S. Targets Russian Cyber Exploit Network with Sanctions
  • Firefox 148 Debuts Sanitizer API to Curb XSS Threat
  • Critical Apex One Flaws Patched by TrendAI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News