Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why hasn’t Europe become a renewable energy powerhouse yet?

Global muon detector network advances space weather monitoring

Cisco SD-WAN zero-day CVE-2026-20127 has been exploited for administrator access since 2023

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco SD-WAN zero-day CVE-2026-20127 has been exploited for administrator access since 2023
Identity

Cisco SD-WAN zero-day CVE-2026-20127 has been exploited for administrator access since 2023

userBy userFebruary 26, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 26, 2026Vulnerability/Network Security

Newly disclosed maximum severity security flaws in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage) have been exploited in the wild as part of malicious activity dating back to 2023.

This vulnerability, tracked as CVE-2026-20127 (CVSS score: 10.0), allows an unauthenticated, remote attacker to bypass authentication and gain administrative privileges on an affected system by sending a crafted request to the affected system.

Successful exploitation of this flaw could allow an adversary to gain elevated privileges on the system as an internal highly privileged non-root user account.

“This vulnerability exists because the peering authentication mechanism on the affected system is not functioning properly,” Cisco said in an advisory, adding that an attacker could leverage a non-root user account to access NETCONF and manipulate the network configuration of the SD-WAN fabric.

This drawback affects the following deployment types, regardless of device configuration:

On-Premise Deployment Cisco Hosted SD-WAN Cloud Cisco Hosted SD-WAN Cloud – Cisco Managed Cisco Hosted SD-WAN Cloud – FedRAMP Environment

Cisco confirmed that the Australian Signals Directorate-Australian Cyber ​​Security Center (ASD-ACSC) reported the vulnerability. The networking equipment giant describes the cluster as a “highly sophisticated cyber threat actor” and is tracking the exploit and subsequent post-breach activity under the name UAT-8616.

This vulnerability is resolved in the following versions of Cisco Catalyst SD-WAN:

Versions prior to 20.91 – Migrate to fix release. Version 20.9 – 20.9.8.2 (planned release date February 27, 2026) Version 20.111 – 20.12.6.1 Version 20.12.5 – 20.12.5.3 Version 20.12.6 – 20.12.6.1 Version 20.131 – 20.15.4.2 Version 20.141 – 20.15.4.2 Version 20.15 – 20.15.4.2 Version 20.161 – 20.18.2.1 Version 20.18 – 20.18.2.1

“Cisco Catalyst SD-WAN controller systems with ports exposed to the Internet are at risk of compromise,” Cisco warns.

The company also recommends customers audit the “/var/log/auth.log” file for entries related to “vmanage-admin authorized public key” from unknown or unauthorized IP addresses. We also recommend checking the IP address in the auth.log log file against the configured system IP listed in the Cisco Catalyst SD-WAN Manager Web UI (WebUI > Device > System IP).

According to information released by ASD-ACSC, UAT-8616 has been able to infiltrate Cisco SD-WAN and gain elevated access since 2023 through a zero-day exploit.

“This vulnerability allowed a malicious cyber attacker to create a rogue peer that connects to an organization’s SD-WAN network management or control plane,” ASD-ACSC said. “A rogue device appears as a new, but ephemeral, adversary-controlled SD-WAN component that can perform trusted actions within the management and control planes.”

After successfully compromising a public application, attackers were found to leverage the built-in update mechanism to incrementally downgrade the software version, exploiting CVE-2022-20775 (CVSS score: 7.8), a high-severity privilege escalation bug in the CLI of Cisco SD-WAN software, to escalate to the root user and restore the software to the version it was originally running.

Some of the subsequent steps initiated by threat actors are:

I created a local user account that mimics other local user accounts. Added Secure Shell Protocol (SSH) authentication keys for root access and modified SD-WAN related startup scripts to customize the environment. Connect to and from the Cisco SD-WAN appliance in the management plane using network configuration protocols and SSH on port 830 (NETCONF). We took steps to remove evidence of the intrusion by clearing logs under ‘/var/log’, command history, and network connection history.

“The attempted exploitation of UAT-8616 demonstrates the continued trend of targeting network edge devices by cyber attackers seeking to establish a durable foothold in high-value organizations, including the critical infrastructure (CI) sector,” Talos said.

Due to this development, the Cybersecurity and Infrastructure Security Agency (CISA) has added both CVE-2022-20775 and CVE-2026-20127 to its Known Exploited Vulnerabilities (KEV) Catalog, requiring federal civilian executive branch (FCEB) agencies to apply fixes within the next 24 hours.

To check for version downgrades or unexpected restart events, CISA recommends analyzing the following logs:

/var/volatile/log/vdebug /var/log/tmplog/vdebug /var/volatile/log/sw_script_synccdb.log

CISA also issued a new emergency directive, 26-03: Mitigating Vulnerabilities in Cisco SD-WAN Systems, which requires federal agencies to inventory SD-WAN devices, apply updates, and assess potential for compromise.

To this end, agencies are ordered to provide a catalog of all eligible SD-WAN systems on their networks by February 26, 2026 at 11:59 PM ET. In addition, a detailed inventory of all affected products and actions taken must be submitted by March 5, 2026 at 11:59 PM ET. Finally, agencies must submit a list of all actions they have taken to enhance the environment by March 26, 2026 at 11:59 PM ET.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSalesforce CEO Marc Benioff: This isn’t our first SaaSpocalypse
Next Article Global muon detector network advances space weather monitoring
user
  • Website

Related Posts

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

February 25, 2026

Flaw in Claude code allows remote code execution and API key disclosure

February 25, 2026

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why hasn’t Europe become a renewable energy powerhouse yet?

Global muon detector network advances space weather monitoring

Cisco SD-WAN zero-day CVE-2026-20127 has been exploited for administrator access since 2023

Salesforce CEO Marc Benioff: This isn’t our first SaaSpocalypse

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.