What is Cisco Catalyst SD-WAN?
Cisco Catalyst SD-WAN (formerly Cisco Viptela) is an enterprise Software-Defined WAN platform that centralises routing policy, configuration, and orchestration across an organisation's entire WAN fabric. Its architecture separates function across four planes: vManage (management console), vSmart/SD-WAN Controller (control plane, routing policy distribution), vBond (orchestration, device onboarding), and edge devices at each branch and data centre.
Central to the platform's operation is a peering authentication mechanism — the mutual authentication handshake by which SD-WAN controllers, managers, and edge devices establish trusted relationships with each other. The security of the entire SD-WAN fabric depends on this mechanism correctly identifying legitimate fabric components. CVE-2026-20127 demonstrates that the peering authentication in affected versions does not work correctly.
Overview
CVE-2026-20127 is a CVSS 10.0 authentication bypass in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly vSmart) and SD-WAN Manager (formerly vManage). By sending crafted requests to an exposed controller or manager, an unauthenticated remote attacker bypasses the authentication handshake and is admitted to the SD-WAN fabric as a trusted internal peer. The attacker's access is granted as the internal vmanage-admin account — a high-privileged, non-root user — which provides access to NETCONF: the network configuration management protocol through which routing policies, VPN configurations, and fabric-wide settings can be read and modified.
Affected Versions
| Status | Cisco Catalyst SD-WAN Release | First Fixed Release |
|---|---|---|
| Vulnerable | Earlier than 20.9 | Migrate to a fixed release |
| Vulnerable | 20.9 | 20.9.8.2 |
| Vulnerable | 20.11 | 20.12.6.1 |
| Vulnerable | 20.12.x prior to 20.12.5.3 | 20.12.5.3 or 20.12.6.1 |
| Vulnerable | 20.13–20.15.x | 20.15.4.2 |
| Vulnerable | 20.16–20.18.x | 20.18.2.1 |
There are no workarounds — patching is the only mitigation.
Technical Details
The vulnerability is rooted in the SD-WAN peering authentication mechanism — the protocol by which SD-WAN fabric components (controllers, managers, edge devices) establish trusted peer relationships with each other. In a correctly functioning deployment, a new component cannot join the fabric without presenting valid authentication credentials. In the affected versions, this mechanism is not working properly: crafted requests that deviate from the expected authentication flow are still accepted and result in the attacker being authenticated as a legitimate fabric peer.
The attacker's authenticated session is established as the internal vmanage-admin user — a high-privileged account used for internal fabric operations. This account is distinct from the root user but has sufficient privilege to access NETCONF (RFC 6241) on the controller or manager. Through NETCONF, the attacker can:
- Read the full SD-WAN fabric configuration: routing policies, VPN parameters, device inventory, authentication settings for all edge devices
- Write configuration changes that propagate to every edge device in the fabric — modifying routing tables, removing security segments, altering encryption parameters, or inserting rogue routing entries
The attack requires network access to port 22 (SSH) or port 830 (NETCONF) on a controller or manager instance. These ports do not need to be internet-facing; access from within a network that has any connectivity to the SD-WAN management plane is sufficient.
Discovery and Attribution
CVE-2026-20127 was discovered and reported to Cisco by the Australian Signals Directorate's Australian Cyber Security Centre (ASD-ACSC), credited in the Cisco security advisory. The ASD-ACSC also co-led the production of the threat hunt guide published alongside the advisory, jointly authored with CISA, NSA, the Canadian Centre for Cyber Security, NCSC-NZ, and NCSC-UK.
Cisco Talos published a concurrent analysis attributing exploitation to UAT-8616 — a threat actor cluster assessed with high confidence as "a highly sophisticated cyber threat actor" that had been exploiting CVE-2026-20127 since at least 2023. No formal nation-state attribution has been made public, but Tenable and other analysts noted that nation-state groups including Salt Typhoon and Volt Typhoon (both attributed to the Chinese People's Liberation Army) have established prior patterns of targeting Cisco network infrastructure. Three years of persistent, low-footprint access to WAN management planes is consistent with state-sponsored intelligence collection operations.
Exploitation Context
The exploitation timeline documented by Cisco Talos reveals the scope of the campaign: approximately two to three years of persistent access to enterprise SD-WAN management infrastructure before the vulnerability was disclosed. During that window, UAT-8616 conducted:
- Rogue peer insertion — joining the SD-WAN fabric as a trusted controller, giving persistent access that survives device reboots and routine maintenance
- Root escalation via firmware downgrade chain — deliberately downgrading the controller software using Cisco's own built-in update mechanism to a version vulnerable to CVE-2022-20775 (a CLI path traversal disclosed in 2022), exploiting it to escalate to root, then restoring the original firmware version to erase evidence of the downgrade
- Persistence establishment — adding SSH authorised keys, creating local accounts, modifying startup scripts
- Forensic destruction — purging authentication logs (
auth.log) and command history files before and after sensitive operations - Traffic monitoring and lateral movement — with root access to controller nodes, the actor was positioned to intercept traffic metadata and move laterally to branch office infrastructure
The simultaneous addition of CVE-2022-20775 to the CISA KEV catalog on February 25, 2026 — four years after its original disclosure — confirmed that UAT-8616's firmware downgrade technique had been used in active attacks.
Remediation
-
Upgrade Cisco Catalyst SD-WAN Manager and Controller to the fixed release for your train: 20.9.8.2, 20.12.5.3 (or 20.12.6.1), 20.15.4.2, or 20.18.2.1. Note that these same fixed versions also remediate CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133.
-
Conduct a compromise assessment before declaring clear. Follow the ACSC-led threat hunt guide and CISA's Hunt & Hardening Guidance. Specific indicators to investigate:
- Inspect the SD-WAN controller peer list for any rogue or unrecognised peers
- Review
auth.logfor SSH public key acceptance events from unexpected sources (gaps in auth.log are themselves indicators — UAT-8616 purged logs) - Check software version change history for unexplained version downgrades, even if the current version looks correct
- Look for Splunk/SIEM alerts on version transition events:
"Software upgrade not confirmed","revert to previous software version", or"Waiting for upgrade confirmation from user"in SD-WAN logs
-
Restrict management plane access — ensure port 22 (SSH) and port 830 (NETCONF) on SD-WAN controllers and managers are accessible only from trusted administrator jump hosts or management VPN segments. These ports should never be internet-facing.
-
Rotate all SD-WAN administrative credentials and review for unauthorised SSH keys and local accounts created by the attacker.
-
If root compromise is confirmed: CISA ED 26-03 directs agencies to rebuild vManage, vSmart, and vBond instances from clean patched images and migrate edge devices to the new infrastructure. A compromised SD-WAN controller cannot be trusted even after patching.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2026-20127 |
| Vendor / Product | Cisco — Catalyst SD-WAN Controller and Manager |
| NVD Published | 2026-02-25 |
| NVD Last Modified | 2026-02-26 |
| CVSS 3.1 Score | 10 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-287 — Improper Authentication |
| CISA KEV Added | 2026-02-25 |
| CISA KEV Deadline | 2026-02-27 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2023-01-01 | Earliest confirmed exploitation by UAT-8616 (Cisco Talos assessment: active since 'at least 2023') |
| 2026-02-25 | Cisco publishes advisory cisco-sa-sdwan-rpa-EHchtZk; CISA issues Emergency Directive ED 26-03; Five Eyes agencies (ASD-ACSC, CISA, NSA, Canadian Cyber Centre, NCSC-NZ, NCSC-UK) issue coordinated advisory; CVE-2026-20127 and CVE-2022-20775 simultaneously added to CISA KEV |
| 2026-02-26 | Cisco Talos publishes attribution to UAT-8616 and post-exploitation details; ACSC publishes ACSC-led threat hunt guide |
| 2026-02-27 | CISA ED 26-03 initial deadline: federal agencies must provide catalog of all in-scope SD-WAN systems |
| 2026-03-05 | Federal agencies must submit detailed inventory of affected products and actions taken |
| 2026-03-11 | CISA publishes updated ED 26-03 v2, superseding February version with updated remediation steps and reporting requirements |
| 2026-03-26 | Federal agencies must submit all steps taken to harden their SD-WAN environments |
References
| Resource | Type |
|---|---|
| NVD — CVE-2026-20127 | Vulnerability Database |
| Cisco Security Advisory — cisco-sa-sdwan-rpa-EHchtZk | Vendor Advisory / Patch |
| CISA Emergency Directive ED 26-03 — Mitigate Vulnerabilities in Cisco SD-WAN Systems | US Government |
| CISA Supplemental Direction ED 26-03 — Hunt & Hardening Guidance for Cisco SD-WAN Devices | US Government |
| The Hacker News — Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 | Press/Media Coverage |
| CISA KEV Catalog Entry | US Government |
| CISA BOD 22-01 | Remediation Directive |
| CWE-287 — Improper Authentication | Weakness Classification |