Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

February 26, 2026

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 26, 2026

Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Hacking Campaign

February 26, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day
News

Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day

Team-CWDBy Team-CWDFebruary 26, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Government security agencies in the UK, US, Canada, Australia and New Zealand have urged Cisco customers to take immediate action to patch a critical zero-day bug in their SD-WAN kit that has been exploited since 2023.

CVE-2026-20127 is an authentication bypass vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage).

According to Cisco, it could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. It has a maximum CVSS score of 10.0.

“This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system,” the Cisco advisory noted.

“A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.”

Read more on zero-day exploits: Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure.

According to a detailed “Threat Hunt” guide issued by several Five Eyes security agencies, the sophisticated threat actors likely downgraded target systems to an older version, in order to exploit legacy local privilege escalation vulnerability CVE-2022-20775. They then restored back to the original software version, in order to gain root access.

Customers are urged to patch both the legacy 2022 bug and the new zero-day vulnerability for which Cisco released a fix yesterday.

The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive requiring all federal agencies to find and patch the vulnerabilities by 5pm ET on February 27, 2026.

“Based on collaboration with international partners and CISA’s forensic analysis, the ease with which these vulnerabilities can be exploited demands immediate action from all federal agencies,” said CISA acting director, Madhu Gottumukkala.

“We urge all entities to implement the measures outlined in this emergency directive without delay.”

Immediate Actions for Securing Vulnerable SD‑WAN Deployment

The Cisco Catalyst SD-WAN product streamlines and secures connectivity between branch offices, datacenters and the cloud.

According to the UK’s National Cyber Security Centre (NCSC), threat actors “are compromising SD-WANs to add a malicious rogue peer and then conduct a range of follow-on actions to achieve root access and maintain persistent access to the SD-WAN.”

By adding a malicious device in this way, they could silently penetrate a target’s network infrastructure.

The NCSC urged affected organizations to work through the following steps, in order:

The hardening guide lists steps covering network perimeter controls, SD-WAN manager access, control and data plane security, session timeout and logging.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article3 Ways to Start Your Intelligent Workflow Program
Next Article Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Hacking Campaign
Team-CWD
  • Website

Related Posts

News

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

February 26, 2026
News

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 26, 2026
News

3 Ways to Start Your Intelligent Workflow Program

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What are brushing scams and how do I stay safe?

December 24, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.