Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Cisco SD-WAN Vulnerability Exploited Since 2023

Critical Cisco SD-WAN Vulnerability Exploited Since 2023

Posted on February 26, 2026 By CWS

A severe security flaw has been identified in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Manager, which cybercriminals have exploited since 2023. This vulnerability, designated as CVE-2026-20127 with a critical CVSS score of 10.0, permits remote attackers to gain administrative access by bypassing authentication protocols through crafted requests.

Understanding the Exploitation

The flaw stems from an ineffective peering authentication mechanism within the affected systems. Exploiters can achieve elevated privileges, operating as a high-privileged, non-root user. This access allows manipulation of network configurations using NETCONF. The vulnerability is prevalent across various deployment scenarios, including On-Prem, Cisco Hosted SD-WAN Cloud, and Cisco Managed environments, posing significant risk to exposed systems.

Cisco, recognizing the gravity of the issue, has credited the Australian Cyber Security Centre for identifying the flaw. They monitor the exploitation under the code name UAT-8616, labeling the perpetrators as sophisticated threat actors. The vulnerability has been mitigated in several software versions, urging users to update to secure releases promptly.

Security Measures and Recommendations

Cisco advises users to scrutinize logs for unauthorized access attempts, particularly looking for suspicious entries in the ‘/var/log/auth.log’ file related to ‘vmanage-admin’ from unknown IPs. Additionally, it’s crucial to verify these IP addresses against configured System IPs in the SD-WAN Manager’s UI.

The Australian Cyber Security Centre has highlighted the threat posed by rogue peers joining network management planes, allowing attackers to perform trusted actions within the SD-WAN environment. The exploitation strategy includes using a known vulnerability, CVE-2022-20775, to escalate privileges further, emphasizing the need for vigilance and timely updates.

Broader Implications and Response

The persistent targeting of network edge devices by cyber actors, especially those aiming at critical infrastructure sectors, underscores the urgency for robust cybersecurity measures. The Cybersecurity and Infrastructure Security Agency (CISA) has reacted by adding these vulnerabilities to its Known Exploited Vulnerabilities catalog, mandating swift patching among federal agencies.

CISA has issued directives for comprehensive audits of SD-WAN systems, requiring agencies to inventory devices, apply necessary updates, and assess potential compromises. Compliance deadlines have been set, emphasizing the importance of proactive steps to safeguard against potential threats.

The increasing sophistication of cyber threats necessitates continuous monitoring and prompt action to protect essential network infrastructure. Organizations are urged to follow recommended practices and maintain up-to-date defenses to mitigate the risks posed by such vulnerabilities.

The Hacker News Tags:ASD-ACSC, authentication bypass, CISA, Cisco, CVE-2026-20127, cyber threat, Cybersecurity, network compromise, network security, privilege escalation, SD-WAN, security patch, UAT-8616, Vulnerability, zero-day

Post navigation

Previous Post: Kali Linux Enhances Security Testing with Claude AI
Next Post: Google Dismantles Chinese Cyber Espionage Network

Related Posts

Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive The Hacker News
Security Patches Released by Over 60 Software Vendors Security Patches Released by Over 60 Software Vendors The Hacker News
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions The Hacker News
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time The Hacker News
How Leading CISOs are Getting Budget Approval How Leading CISOs are Getting Budget Approval The Hacker News
Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cisco Resolves Critical SD-WAN Vulnerability Exploited by Hackers
  • Google Dismantles Chinese Cyber Espionage Network
  • Critical Cisco SD-WAN Vulnerability Exploited Since 2023
  • Kali Linux Enhances Security Testing with Claude AI
  • Hacker Exploits AI to Breach Mexican Government Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cisco Resolves Critical SD-WAN Vulnerability Exploited by Hackers
  • Google Dismantles Chinese Cyber Espionage Network
  • Critical Cisco SD-WAN Vulnerability Exploited Since 2023
  • Kali Linux Enhances Security Testing with Claude AI
  • Hacker Exploits AI to Breach Mexican Government Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News