Three Years of Undetected Exploits: Hackers Target Cisco SD-WAN Zero-Day

Published:

spot_img

Critical Cisco SD-WAN Vulnerability Exposed for Years

Cisco Talos has revealed that a sophisticated cyber threat actor exploited a significant authentication bypass vulnerability in Cisco’s SD-WAN infrastructure, undetected for at least three years. This zero-day attack underscores serious weaknesses within network security frameworks.

An Overview of the Vulnerability

The vulnerability, identified as CVE-2026-20127, carries the highest severity score possible, a CVSS rating of 10.0. It allowed unauthorized remote attackers to gain administrative access, enabling them to introduce malicious rogue peers into enterprise networks. Such a breach poses severe risks, especially for organizations in critical infrastructure sectors, which rely on robust network security.

Talos has linked this exploitation to a group designated as UAT-8616. The organization successfully targeted network edge devices, establishing persistent footholds in high-value enterprises. Evidence suggests that the malicious activities associated with this vulnerability have been ongoing since at least 2023.

How Attackers Exploited the Flaw

The vulnerabilities primarily affect the Cisco Catalyst SD-WAN Controller and the Cisco Catalyst SD-WAN Manager, impacting both on-premises and cloud-hosted deployments. The root of the problem lies in flawed peering authentication mechanisms, which inadequately validated trust relationships during SD-WAN component connections.

Attackers managed to exploit this by sending specially crafted requests that the vulnerable systems accepted as credible. This breach enabled them to log in as high-privileged non-root user accounts, manipulating NETCONF configurations and gaining overarching control of the SD-WAN’s network settings, including routing policies and device authentication.

The Downgrade-Penetrate-Upgrade Technique

The sophistication of the attack chain is notable. Upon gaining initial access via CVE-2026-20127, investigators found that UAT-8616 likely escalated privileges to root level by first downgrading SD-WAN software to earlier versions vulnerable to a previously patched flaw (CVE-2022-20775). This approach allowed attackers to achieve root access without raising alarms, as they later restored the original software version to conceal their activities.

Acknowledgments from Cybersecurity Authorities

The discovery of this vulnerability has been credited to the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC). This agency promptly reported the issue to Cisco, publishing a joint hunt guide that warned organizations about ongoing threats targeting Cisco Catalyst SD-WAN deployments. Their findings provided vital insights into how attackers could introduce rogue peers and secure root access.

Urgent Responses from CISA

The Cybersecurity and Infrastructure Security Agency (CISA) responded by issuing Emergency Directive 26-03, mandating Federal Civilian Executive Branch agencies to take immediate action. By 5 PM ET on a specified date, agencies were required to inventory their Cisco SD-WAN systems, collect forensic artifacts, maintain external log storage, apply necessary updates, and assess potential compromises. The directive emphasized the immediate threat these vulnerabilities pose to federal networks.

CISA has also included both CVE-2026-20127 and CVE-2022-20775 in its Known Exploited Vulnerabilities catalog, indicating the urgency for organizations to take action. Simultaneously, the UK’s National Cyber Security Centre issued warnings advising organizations to swiftly check for potential vulnerabilities and malicious activities.

Identifying Indicators of Compromise

Talos identified several high-fidelity indicators indicating a potential compromise by UAT-8616. These include the unusual creation, usage, and deletion of user accounts, lack of user interaction history, unaccounted SSH keys, and even signs of log tampering. Most critically, any unexpected peering event, especially from unverified sources, may indicate attempted exploitation.

Organizations using Cisco Catalyst SD-WAN should closely monitor their logs for control connection peering events, as these can signal attempts to compromise their systems. The focus should not only be on external threats but also on internal mechanisms to ensure the integrity and security of network operations.

Final Thoughts for Organizations

Researchers have called attention to the trend of cybercriminals targeting network infrastructure devices, recognizing that control over these systems can offer significant operational leverage. The compromise of SD-WAN controllers, which manage critical routing and policy enforcement, significantly endangers network security worldwide.

This incident highlights the importance of not exposing SD-WAN management interfaces to the internet, as those facing the public face the highest risk of compromise. Ongoing vigilance, adherence to Cisco’s hardening guidelines, and regular audits are crucial in safeguarding against these advanced threats. Organizations should also implement thorough compromise assessments using insights provided by cybersecurity authorities.

In light of this security breach, it’s essential for companies to stay informed about the latest threats and take proactive measures to protect their systems.

spot_img

Related articles

Recent articles

Samsung SDS Unveils Key Cybersecurity Threats of 2026 Amid Rising AI Risks

The landscape of cybersecurity threats is expected to grow noticeably more intricate and difficult to manage by 2026. In response,...

Exploring Insider Threats in the UAE: 2026 Insights

The Silent Siphon: Unveiling Insider Threats in UAE Businesses In recent years, headlines in the UAE have been saturated with alarming reports of cyberattacks. Yet,...

How ₹590 Crores Were Lost in IDFC First Bank Transfers

CHANDIGARH: In a significant investigation, four individuals, including two former employees of IDFC First Bank, have been apprehended for their involvement in a scheme...

Liquid Intelligent Technologies Secures New Credit Facilities and Confirms Debt Repayment

Liquid Intelligent Technologies Successfully Repays Debt Liquid Intelligent Technologies, a division of Cassava Technologies, announced that it...