Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Resolves Critical SD-WAN Vulnerability Exploited by Hackers

Cisco Resolves Critical SD-WAN Vulnerability Exploited by Hackers

Posted on February 26, 2026 By CWS

Cisco has deployed urgent updates to address a severe security flaw in its Catalyst SD-WAN systems, which was actively exploited by cyber attackers. Identified as CVE-2026-20127, this zero-day vulnerability is rated with a maximum severity score of 10/10 on the CVSS scale.

Details of the Vulnerability

The flaw in question allows remote attackers to bypass authentication protocols and gain administrative access to vulnerable devices. Specifically, it compromises the peering authentication mechanism of the Catalyst SD-WAN Controller and Manager, previously known as SD-WAN vSmart and vManage, respectively.

Taking advantage of this vulnerability, attackers can use crafted requests to log in as a high-privileged, non-root user, enabling them to manipulate network configurations through NETCONF, Cisco noted in its advisory.

Patch Release and Exploitation

Cisco has addressed this security issue with the release of updated versions of its Catalyst SD-WAN software, including versions 20.12.6.1, 20.12.5.3, 20.15.4.2, and 20.18.2.1. An additional update, version 20.9.8.2, is scheduled for release shortly.

While the vulnerability has seen limited exploitation, Cisco has issued indicators of compromise (IoCs) to assist organizations in detecting malicious activities targeting their SD-WAN infrastructures exposed to the internet.

Broader Security Measures and Threat Actor Involvement

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this zero-day, along with another previously known vulnerability CVE-2022-20775, to its catalog of Known Exploited Vulnerabilities. CISA has urged federal agencies to apply patches for both vulnerabilities within a tight timeframe.

These vulnerabilities have been reportedly exploited by a group labeled by Cisco Talos as UAT-8616, a sophisticated cyber threat actor identified in 2023. The attackers have been known to downgrade software to vulnerable versions to maintain access and control.

Moreover, while not directly linked, Talos has recognized activities by a China-nexus group potentially exploiting other zero-day vulnerabilities in Cisco products.

Alongside these updates, Cisco has also introduced solutions for other flaws in its Catalyst SD-WAN Manager and additional products, although these have not yet been exploited.

The swift response to these vulnerabilities underlines the importance of keeping network systems updated and secure against evolving cyber threats.

Security Week News Tags:CISA, Cisco, Cisco Talos, CVE-2026-20127, cyber threat, Cybersecurity, Five Eyes, Hacking, network security, Patch, SD-WAN, security patch, Vulnerability, zero-day

Post navigation

Previous Post: Google Dismantles Chinese Cyber Espionage Network
Next Post: Critical Apex One Flaws Patched by TrendAI

Related Posts

Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  Security Week News
Lumma Stealer Malware Returns After Takedown Attempt Lumma Stealer Malware Returns After Takedown Attempt Security Week News
Europol Says Qilin Ransomware Reward Fake Europol Says Qilin Ransomware Reward Fake Security Week News
Sola Security Raises M to Bring No-Code App Building to Cybersecurity Teams Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams Security Week News
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Security Week News
Alumni, Student, and Staff Information Stolen From Harvard University Alumni, Student, and Staff Information Stolen From Harvard University Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability
  • Zyxel Resolves Critical Security Flaw in Multiple Devices
  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability
  • Zyxel Resolves Critical Security Flaw in Multiple Devices
  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News