{"id":4669,"date":"2026-03-01T00:36:50","date_gmt":"2026-03-01T00:36:50","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/03\/01\/global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day\/"},"modified":"2026-03-01T00:36:50","modified_gmt":"2026-03-01T00:36:50","slug":"global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2026\/03\/01\/global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day\/","title":{"rendered":"Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day"},"content":{"rendered":"<div>\n<p><img decoding=\"async\" src=\"https:\/\/ft365.org\/wp-content\/uploads\/2025\/06\/localimages\/ea721ff9-8ba4-4d88-b386-57e9e1606077.jpg?width=64&#038;height=64&#038;mode=crop&#038;scale=both&#038;format=webp\" alt=\"Photo of Phil Muncaster\" loading=\"lazy\"><\/p>\n<\/div>\n<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Government security agencies in the UK, US, Canada, Australia and New Zealand have urged Cisco customers to take immediate action to patch a critical zero-day bug in their SD-WAN kit that has been exploited since 2023.<\/p>\n<p>CVE-2026-20127 is an authentication bypass vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage).<\/p>\n<p>According to Cisco, it could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. It has a maximum CVSS score of 10.0.<\/p>\n<p>\u201cThis vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system,\u201d the Cisco advisory noted.<\/p>\n<p>\u201cA successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non<em>-root<\/em>\u00a0user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.\u201d<\/p>\n<p><em>Read more on zero-day exploits: Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure.<\/em><\/p>\n<p>According to a detailed \u201cThreat Hunt\u201d guide issued by several Five Eyes security agencies, the sophisticated threat actors likely downgraded target systems to an older version, in order to exploit legacy local privilege escalation vulnerability CVE-2022-20775. They then restored back to the original software version, in order to gain root access.<\/p>\n<p>Customers are urged to patch both the legacy 2022 bug and the new zero-day vulnerability for which Cisco released a fix yesterday.<\/p>\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive requiring all federal agencies to find and patch the vulnerabilities by 5pm ET on February 27, 2026.<\/p>\n<p>\u201cBased on collaboration with international partners and CISA\u2019s forensic analysis, the ease with which these vulnerabilities can be exploited demands immediate action from all federal agencies,\u201d said CISA acting director, Madhu Gottumukkala.<\/p>\n<p>\u201cWe urge all entities to implement the measures outlined in this emergency directive without delay.\u201d<\/p>\n<h2><strong>Immediate Actions for Securing Vulnerable SD\u2011WAN Deployment<\/strong><\/h2>\n<p>The Cisco Catalyst SD-WAN product streamlines and secures connectivity between branch offices, datacenters and the cloud.<\/p>\n<p>According to the UK\u2019s National Cyber Security Centre (NCSC), threat actors \u201care compromising SD-WANs to add a malicious rogue peer and then conduct a range of follow-on actions to achieve root access and maintain persistent access to the SD-WAN.\u201d<\/p>\n<p>By adding a malicious device in this way, they could silently penetrate a target\u2019s network infrastructure.<\/p>\n<p>The NCSC urged affected organizations to work through the following steps, in order:<\/p>\n<ul>\n<li>Perform threat hunting for evidence of compromise detailed in the\u00a0Hunt Guide<\/li>\n<li>If compromise looks likely, collect artefacts from the device and report it to the NCSC (for UK organizations)<\/li>\n<li>Update to the latest version of\u00a0Cisco Catalyst SD-WAN Manager\u00a0and\u00a0Cisco Catalyst SD-WAN Controller\u00a0as detailed in their respective advisories<\/li>\n<li>Apply the\u00a0Cisco Catalyst SD-WAN Hardening Guide<\/li>\n<li>Perform continuous threat hunting activities<\/li>\n<\/ul>\n<p>The hardening guide lists steps covering network perimeter controls, SD-WAN manager access, control and data plane security, session timeout and logging.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Government security agencies in the UK, US, Canada, Australia and New Zealand have urged Cisco customers to take immediate action to patch a critical zero-day bug in their SD-WAN kit that has been exploited since 2023. CVE-2026-20127 is an authentication bypass vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and<\/p>\n","protected":false},"author":2,"featured_media":4670,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2026\/03\/4669-55054dbc-a97e-4e53-b1ed-ecd7b14aa874-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=4669"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/4669\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/4670"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=4669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=4669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=4669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}