Three Years of Undetected Exploits: Hackers Target Cisco SD-WAN Zero-Day

Published:

spot_img

Critical Cisco SD-WAN Vulnerability Exposed for Years

Cisco Talos has revealed that a sophisticated cyber threat actor exploited a significant authentication bypass vulnerability in Cisco’s SD-WAN infrastructure, undetected for at least three years. This zero-day attack underscores serious weaknesses within network security frameworks.

An Overview of the Vulnerability

The vulnerability, identified as CVE-2026-20127, carries the highest severity score possible, a CVSS rating of 10.0. It allowed unauthorized remote attackers to gain administrative access, enabling them to introduce malicious rogue peers into enterprise networks. Such a breach poses severe risks, especially for organizations in critical infrastructure sectors, which rely on robust network security.

Talos has linked this exploitation to a group designated as UAT-8616. The organization successfully targeted network edge devices, establishing persistent footholds in high-value enterprises. Evidence suggests that the malicious activities associated with this vulnerability have been ongoing since at least 2023.

How Attackers Exploited the Flaw

The vulnerabilities primarily affect the Cisco Catalyst SD-WAN Controller and the Cisco Catalyst SD-WAN Manager, impacting both on-premises and cloud-hosted deployments. The root of the problem lies in flawed peering authentication mechanisms, which inadequately validated trust relationships during SD-WAN component connections.

Attackers managed to exploit this by sending specially crafted requests that the vulnerable systems accepted as credible. This breach enabled them to log in as high-privileged non-root user accounts, manipulating NETCONF configurations and gaining overarching control of the SD-WAN’s network settings, including routing policies and device authentication.

The Downgrade-Penetrate-Upgrade Technique

The sophistication of the attack chain is notable. Upon gaining initial access via CVE-2026-20127, investigators found that UAT-8616 likely escalated privileges to root level by first downgrading SD-WAN software to earlier versions vulnerable to a previously patched flaw (CVE-2022-20775). This approach allowed attackers to achieve root access without raising alarms, as they later restored the original software version to conceal their activities.

Acknowledgments from Cybersecurity Authorities

The discovery of this vulnerability has been credited to the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC). This agency promptly reported the issue to Cisco, publishing a joint hunt guide that warned organizations about ongoing threats targeting Cisco Catalyst SD-WAN deployments. Their findings provided vital insights into how attackers could introduce rogue peers and secure root access.

Urgent Responses from CISA

The Cybersecurity and Infrastructure Security Agency (CISA) responded by issuing Emergency Directive 26-03, mandating Federal Civilian Executive Branch agencies to take immediate action. By 5 PM ET on a specified date, agencies were required to inventory their Cisco SD-WAN systems, collect forensic artifacts, maintain external log storage, apply necessary updates, and assess potential compromises. The directive emphasized the immediate threat these vulnerabilities pose to federal networks.

CISA has also included both CVE-2026-20127 and CVE-2022-20775 in its Known Exploited Vulnerabilities catalog, indicating the urgency for organizations to take action. Simultaneously, the UK’s National Cyber Security Centre issued warnings advising organizations to swiftly check for potential vulnerabilities and malicious activities.

Identifying Indicators of Compromise

Talos identified several high-fidelity indicators indicating a potential compromise by UAT-8616. These include the unusual creation, usage, and deletion of user accounts, lack of user interaction history, unaccounted SSH keys, and even signs of log tampering. Most critically, any unexpected peering event, especially from unverified sources, may indicate attempted exploitation.

Organizations using Cisco Catalyst SD-WAN should closely monitor their logs for control connection peering events, as these can signal attempts to compromise their systems. The focus should not only be on external threats but also on internal mechanisms to ensure the integrity and security of network operations.

Final Thoughts for Organizations

Researchers have called attention to the trend of cybercriminals targeting network infrastructure devices, recognizing that control over these systems can offer significant operational leverage. The compromise of SD-WAN controllers, which manage critical routing and policy enforcement, significantly endangers network security worldwide.

This incident highlights the importance of not exposing SD-WAN management interfaces to the internet, as those facing the public face the highest risk of compromise. Ongoing vigilance, adherence to Cisco’s hardening guidelines, and regular audits are crucial in safeguarding against these advanced threats. Organizations should also implement thorough compromise assessments using insights provided by cybersecurity authorities.

In light of this security breach, it’s essential for companies to stay informed about the latest threats and take proactive measures to protect their systems.

spot_img

Related articles

Recent articles

OpenAI CEO’s Home Targeted in Drive-By Shooting Days After Molotov Cocktail Attack

OpenAI CEO's Home Targeted in Drive-By Shooting Days After Molotov Cocktail Attack In a troubling series of events, Sam Altman, CEO of OpenAI, experienced a...

Lenovo Advances Regional Strategy with Opening of META Headquarters in Riyadh, Supporting Saudi Arabia’s Vision 2030

Lenovo Advances Regional Strategy with Opening of META Headquarters in Riyadh, Supporting Saudi Arabia's Vision 2030 Lenovo has officially inaugurated its Middle East, Türkiye, and...

Bank Alerts Customers: 97% of Exposed SSNs on Dark Web Face Identity Theft Risks—Here’s How to Protect Yourself

Bank Alerts Customers: 97% of Exposed SSNs on Dark Web Face Identity Theft Risks—Here’s How to Protect Yourself A recent alert from financial institutions regarding...

Surat Homemaker Loses ₹11.03 Lakh in Elaborate Insurance Fraud; Cyber Police Launch Investigation

Surat Homemaker Loses ₹11.03 Lakh in Elaborate Insurance Fraud; Cyber Police Launch Investigation In a striking incident of cyber fraud, a 62-year-old homemaker from Surat...