Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day
CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-20127

CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

A maximum-severity authentication bypass in Cisco Catalyst SD-WAN (CVE-2026-20127, CVSS 10.0) has been actively exploited by threat actor UAT-8616 since...

Dylan H.

Security Team

March 4, 2026
4 min read

Affected Products

  • Cisco Catalyst SD-WAN Controller
  • Cisco Catalyst SD-WAN Manager

Three Years of Silent Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 26-03, mandating federal agencies to immediately patch a maximum-severity zero-day vulnerability in Cisco Catalyst SD-WAN that has been actively exploited since at least 2023.

The flaw, tracked as CVE-2026-20127 with a perfect CVSS score of 10.0, allows an unauthenticated remote attacker to bypass authentication and obtain full administrative privileges on affected SD-WAN infrastructure.


Vulnerability Details

DetailValue
CVECVE-2026-20127
CVSS Score10.0 (Maximum Severity)
TypeImproper Authentication (CWE-287)
Affected ProductsCisco Catalyst SD-WAN Controller (formerly vSmart), Cisco Catalyst SD-WAN Manager (formerly vManage)
Attack VectorNetwork — unauthenticated, remote
ExploitationActive since 2023 by UAT-8616
CISA ActionEmergency Directive 26-03, added to KEV catalog

How UAT-8616 Exploited the Flaw

Cisco Talos Intelligence published a detailed analysis attributing the exploitation to UAT-8616, described as a "highly sophisticated cyber threat actor" targeting critical infrastructure, telecommunications, finance, and government sectors.

Phase 1: Rogue Peer Injection

The vulnerability exists in the peering authentication process of Cisco Catalyst SD-WAN. By sending a crafted request, UAT-8616 was able to:

  • Create a rogue peer that joined the network management and control plane
  • The rogue device appeared as a legitimate, temporary SD-WAN component
  • This granted the ability to conduct trusted actions within the management plane

Phase 2: Software Downgrade and Privilege Escalation

After establishing their rogue peer, the attackers leveraged the built-in software update mechanism to stage a version downgrade, then escalated to root by chaining with CVE-2022-20775 (CVSS 7.8), a known privilege escalation bug in Cisco SD-WAN CLI.

Phase 3: Persistent Access

With root-level access, UAT-8616 established persistent footholds across compromised SD-WAN infrastructure, potentially gaining visibility into all network traffic routed through affected devices.


Impact Assessment

Impact AreaDescription
ScopeOrganizations with internet-exposed SD-WAN management interfaces
Sectors targetedCritical infrastructure, telecommunications, finance, government
DurationAt least 3 years of undetected exploitation (since 2023)
Access achievedFull administrative and root-level control
RiskComplete network traffic interception and manipulation

Five Eyes Response

The severity of this campaign prompted a coordinated Five Eyes response. Intelligence agencies from the United States, United Kingdom, Canada, Australia, and New Zealand jointly issued IoC hunt guidance and remediation resources.

CISA's Emergency Directive 26-03 requires Federal Civilian Executive Branch (FCEB) agencies to:

  1. Inventory all Cisco SD-WAN devices within 24 hours
  2. Apply patches immediately — no workarounds exist
  3. Assess potential compromise using Cisco's remediation resources and Five Eyes IoC guidance

Recommendations

For Network Administrators

  1. Patch immediately — apply Cisco's security updates for CVE-2026-20127
  2. Audit SD-WAN management interfaces — ensure they are not exposed to the internet
  3. Review peering configurations for unauthorized or unknown peer devices
  4. Check for indicators of compromise per Five Eyes guidance

For Security Teams

  1. Hunt for UAT-8616 IoCs across network telemetry and SD-WAN logs
  2. Monitor for software downgrade attempts on SD-WAN infrastructure
  3. Verify CVE-2022-20775 patches are also applied to prevent the privilege escalation chain
  4. Segment SD-WAN management planes from general network access

For Executives

  1. Treat this as a critical incident — the 3-year exploitation window means compromise may already exist
  2. Engage incident response if your organization uses Cisco SD-WAN with internet-facing management
  3. Report suspected compromise to CISA and relevant sector ISACs

Key Takeaways

  1. CVE-2026-20127 is the first CVSS 10.0 vulnerability to receive a CISA Emergency Directive in 2026
  2. Three years of exploitation went undetected, highlighting gaps in SD-WAN monitoring
  3. No workarounds exist — patching is the only remediation
  4. The chained exploitation with CVE-2022-20775 demonstrates sophisticated tradecraft
  5. Five Eyes joint advisory signals this is a top-tier national security concern
  6. Internet-exposed management interfaces remain the most common initial access vector for network infrastructure attacks
#Zero-Day#Vulnerability#Cisco#CISA#Critical Infrastructure#SD-WAN#Network Security

Related Articles

Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes

A CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN has been exploited since at least 2023. CISA issues Emergency Directive ED 26-03 as all Five...

3 min read

CVE-2026-28775: Unauthenticated Root RCE in IDC SFX

A critical unauthenticated RCE vulnerability in International Datacasting Corporation's SFX Series satellite receivers allows attackers to execute...

5 min read

CISA Adds Actively Exploited VMware Aria Operations RCE

CISA has added CVE-2026-22719, a high-severity command injection vulnerability in VMware Aria Operations allowing unauthenticated remote code execution,...

4 min read
Back to all Security Alerts