Critical Cisco SD WAN vulnerability alert that allows to take control of the management plane without authentication

Published 5 min de lectura 212 reading

A maximum-gravity security failure has once again placed network edge devices in the focus: Cisco has confirmed that critical vulnerability in its SD-WAN Catalyst drivers and managers (formerly known as vSmart and vManage) is being actively exploited since 2023 by a sophisticated actor, and has resulted in coordinated responses from several national and commercial security teams.

Vulnerability, listed as CVE-2026-20127 and with CVSS score 10.0, allows a remote attacker without authentication to skip authentication mechanisms and assume administrative privileges within the SD-WAN management plan. In practice, a malicious device can "join" as a pair of confidence in the control plane and run actions that would normally require high-level credentials, such as manipulating network configuration through NETCONF or SSH.

Critical Cisco SD WAN vulnerability alert that allows to take control of the management plane without authentication
Image generated with IA.

Cisco has explained that the root of the problem is a failure in the peer authentication mechanism. The company attributes the discovery to the Australian Signals Directorate / Australian Cyber Security Centre (ASD-ACSC) and labels the campaign against its SD-WAN systems as UAT-8616, describing the responsible group as highly sophisticated. The Talos team, which has investigated the operation, stresses that the operation and post-commitment activity follow a pattern designed to establish persistence and move laterally within the affected installations - a typical behavior when the attackers seek support points in critical infrastructure. More information and technical analysis can be found on the Talos blog: https: / / blog.talosintelligence.com / uat-8616-sd-wan /.

The risks arising from this failure are not limited to the immediate lifting of privileges. In documented incidents, attackers have taken advantage of the initial gap to force a software version degradation, exploit a prior vulnerability (CVE-2022-20775) that allows you to climb to root, and then restore the original version to hide traces. The CVE-2022-20775 is collected in the NIST database and explains the climbing technique used as part of the attack chain: https: / / nvd.nist.gov / vuln / detail / cve-2022-20775.

After detection of intrusion attempts, attackers have proceeded to create local accounts that mimic other existing ones, add SSH keys authorized for root access, modify SD-WAN-related boot scripts and use NETCONF and SSH to communicate between management plane devices. They have also deleted records and commands from the history to complicate the investigations. These steps allow to maintain persistent access and operate with a certain sigil within critical corporate and infrastructure environments.

The scope is wide: have been indicated as affected on-premises deployments, cloud implementations of Cisco SD-WAN (including environments managed by Cisco and FedRAMP environments). Cisco has published a guide with corrected versions and migration recommendations; it is essential to review and implement the updates indicated in your official notice: Cisco's safety notice.

The seriousness of the incident has motivated regulatory actions: the US Infrastructure and Cybersecurity Agency. USA (CISA) has added both CVE-2026-20127 and CVE-2022-20775 to its catalogue of Known Exploited Vulnerabilities (KEV) and issued emergency guidelines for federal agencies. These orders require the inventor of SD-WAN systems, the application of patches and the submission of detailed reports in very tight time; the CISA note can be consulted at: CISA alert on inclusion in KEV and the related directives and guides are published here: ED-26-03: Mitigar vulnerabilities in Cisco SD-WAN and Hunt and Hardening Supplements.

For security teams and network managers, the priority should be immediate: to apply the parcheed versions that Cisco has published or to migrate to corrected releases according to your guide. In addition, it is appropriate to audit commitment signals in the affected systems; Cisco recommends reviewing the authentication file (/ var / log / auth.log) in search of entries such as "Accepted publickey for vmanage-admin" from unrecognized IP addresses and comparing those IPs with the System IPs configured in the manager's web interface. CISA also suggests checking records that indicate unexpected reinitiations or version degradations, reviewing debugging files and system-specific traces.

It's not just about patching: a complete response includes checking the existence of suspicious local accounts, reviewing recently added SSH keys, inspecting start and restoration scripts, and tracking NETCONF / SSH movements within the management plan. If there is a sign of commitment, it must be assumed that the attacker may have obtained persistence and therefore plan containment, eradication and recovery with change of keys and credentials, safe reinstallation of the software where appropriate and a forensic investigation that preserves evidence before cleaning systems.

Critical Cisco SD WAN vulnerability alert that allows to take control of the management plane without authentication
Image generated with IA.

This incident fits into a worrying trend: edge devices and network management systems are priority targets for actors seeking entry points with high strategic value. As researchers have pointed out, compromising the control plane of a SD-WAN allows an attacker to influence the behaviour of the network in multiple locations and to exfilter or manipulate traffic in a very harmful way.

If your organization uses Cisco Catalyst SD-WAN, the essential thing now is to act quickly: review Cisco's notice and technical recommendations, audit the above records, check the integrity of local accounts and keys, and, if necessary, coordinate with incident response teams and the relevant regulatory bodies. For official information and technical steps, see Cisco's notice and Talos analysis; and for mandatory measures or compliance requirements, follow the guidelines and inclusion in the CISA KEV catalogue: Cisco, Talos, NVD (CVE-2022-20775) and CISA KEV.

The lesson is clear: keeping the critical elements of the network infrastructure up to date and actively monitoring management plans is no longer an optional good practice, but an operational need to prevent intrusions that can scale up to compromise distributed services and critical assets.

Coverage

Related

More news on the same subject.