Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes
Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-20127

Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes

A CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN has been exploited since at least 2023. CISA issues Emergency Directive ED 26-03 as all Five...

Dylan H.

Security Team

February 26, 2026
3 min read

Affected Products

  • Cisco Catalyst SD-WAN Controller
  • Cisco Catalyst SD-WAN Manager

A Perfect 10 — And It's Been Exploited for Three Years

CVE-2026-20127 is the kind of vulnerability that keeps network defenders up at night. Rated CVSS 10.0 — the maximum possible severity — it allows an unauthenticated remote attacker to bypass authentication entirely and obtain full administrative privileges on affected Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage) systems.

What makes this worse: evidence confirms the vulnerability has been actively exploited in the wild since at least 2023, meaning adversaries have had years of access before the bug was even publicly identified.


Attack Chain

The exploitation follows a two-stage approach:

StageActionResult
1. Auth BypassAttacker sends crafted request exploiting CVE-2026-20127Full admin access to SD-WAN controller/manager
2. Privilege EscalationAttacker downgrades software to a version vulnerable to CVE-2022-20775Root-level system access

This chaining technique — using a zero-day to land, then downgrading to exploit a known bug — demonstrates sophisticated operational tradecraft. The attackers gain complete control of the SD-WAN fabric, potentially allowing them to intercept, redirect, or manipulate all network traffic flowing through the managed infrastructure.


Five Eyes Emergency Response

On February 25, 2026, CISA published Emergency Directive ED 26-03 alongside a joint advisory co-authored by all Five Eyes intelligence agencies:

  • NSA (United States)
  • NCSC-UK (United Kingdom)
  • Cyber Centre (Canada)
  • ASD's ACSC (Australia)
  • NCSC-NZ (New Zealand)

The joint advisory includes a comprehensive threat hunting guide to help organizations detect signs of compromise, along with hardening recommendations for Cisco SD-WAN deployments in both on-premises and cloud configurations.

Federal Agency Requirements (ED 26-03)

DeadlineRequirement
February 26, 2026Provide a catalog of all in-scope SD-WAN systems
March 5, 2026Submit detailed inventory with version and configuration data
March 12, 2026Complete patching or apply mitigations to all affected systems
OngoingRun threat hunting playbook and report any indicators of compromise

Affected Products

The vulnerability impacts:

  • Cisco Catalyst SD-WAN Controller (formerly Cisco vSmart Controller)
  • Cisco Catalyst SD-WAN Manager (formerly Cisco vManage)
  • Both on-premises and SD-WAN Cloud deployments

Cisco has released patches and urges all customers to update immediately. Organizations that cannot patch should isolate management interfaces from the internet and restrict access to trusted networks only.


Why This Matters

SD-WAN controllers sit at the heart of modern enterprise networking. Compromising one gives an attacker visibility into — and control over — traffic routing across an organization's entire wide-area network, including branch offices, data centers, and cloud connections.

The fact that this exploitation has been ongoing since 2023 suggests that the scope of compromise across government and enterprise networks could be extensive. The Five Eyes coordination signals that this is not a theoretical risk — it's an active, ongoing campaign affecting organizations globally.


What You Should Do

  1. Inventory all Cisco SD-WAN Controller and Manager instances immediately
  2. Patch to the latest Cisco-recommended version
  3. Hunt for indicators of compromise using the Five Eyes threat hunting guide
  4. Restrict management interface access to trusted networks only
  5. Monitor for unusual administrative activity, configuration changes, or software downgrades
  6. Report any suspected compromise to CISA at cisa.gov/report

Related Reading

  • CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day
  • Ivanti Connect Secure Under Active Attack - CISA Issues
  • Cisco Unified Communications Zero-Day Exploited for
#Cisco#SD-WAN#Zero-Day#CISA#Five Eyes#CVE-2026-20127#Emergency Directive#Critical Infrastructure

Related Articles

CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day

A maximum-severity authentication bypass in Cisco Catalyst SD-WAN (CVE-2026-20127, CVSS 10.0) has been actively exploited by threat actor UAT-8616 since...

4 min read

Cisco Unified Communications Zero-Day Exploited for

An actively exploited zero-day in Cisco Unified Communications allows unauthenticated remote code execution with root privileges via crafted HTTP...

3 min read

Critical Stack-Based Buffer Overflow in Delta Electronics

A critical CVSS 9.8 stack-based buffer overflow in Delta Electronics COMMGR2 allows unauthenticated remote code execution, posing severe risk to...

5 min read
Back to all Security Alerts