Cisco Catalyst SD-WAN platforms are widely deployed across enterprises, governments, and service providers, often serving as the core infrastructure that links remote offices, data centers, and cloud environments. Because these controllers are frequently reachable from external networks to support distributed operations, they represent a highly visible and attractive target for threat actors.
Cisco has disclosed a critical authentication bypass vulnerability, CVE-2026-20127, affecting both the Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage). The flaw carries a CVSS score of 10.0, allowing a remote, unauthenticated attacker to gain administrative-level access by sending crafted requests to an exposed system.
The vulnerability stems from a failure in the SD-WAN peering authentication process, effectively breaking a core trust mechanism in the control plane. Once exploited, an attacker can log in as an internal high-privileged (non-root) user and use NETCONF to manipulate SD-WAN fabric configuration.
Security agencies in the U.S., UK, Australia, Canada, and New Zealand have jointly confirmed active exploitation, with evidence showing that threat actors have been abusing this flaw since at least 2023. Cisco has linked the activity to a sophisticated intrusion cluster known as UAT-8616.
CISA has also added the CVE to its Known Exploited Vulnerabilities (KEV) list, emphasizing its operational impact.
The vulnerability affects all deployment types of Cisco Catalyst SD-WAN components, regardless of configuration:
Applicable to:
There are no workarounds, and patching is required.
What the attacker can do
By exploiting the broken peering authentication mechanism, an attacker can:
Because SD-WAN sits at the heart of distributed enterprise routing, unauthorized access at this layer gives attackers deep visibility and control over connected sites.
Cisco has released updates across all major SD-WAN software trains. Affected users must upgrade to patched releases such as:
(depends on current software branch)
Devices running versions prior to 20.9.1 must migrate to a fixed release.
1. Patch immediately
Apply the appropriate Cisco-provided update without delay. There are no supported workarounds.
2. Conduct targeted threat hunting
National agencies recommend collecting snapshots, checking logs, and reviewing indicators of compromise. Key items include:
3. Strengthen SD-WAN management exposure
Follow Cisco SD-WAN hardening guidance:
If you are worried about any of the threats outlined in this bulletin or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please contact your account manager, or alternatively Get in touch to find out how you can protect your organisation.