{"id":43983,"date":"2026-02-26T23:54:45","date_gmt":"2026-02-26T15:54:45","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day-infosecurity-magazine\/"},"modified":"2026-02-26T23:54:45","modified_gmt":"2026-02-26T15:54:45","slug":"global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/26\/global-cyber-agencies-urge-immediate-patching-of-cisco-sd-wan-zero-day-infosecurity-magazine\/","title":{"rendered":"Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Government security agencies in the UK, US, Canada, Australia and New Zealand have urged Cisco customers to take immediate action to patch a critical zero-day bug in their SD-WAN kit that has been exploited since 2023.<\/p>\n<p>CVE-2026-20127 is an authentication bypass vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage).<\/p>\n<p>According to Cisco, it could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. It has a maximum CVSS score of 10.0.<\/p>\n<p>&ldquo;This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system,&rdquo; the <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-rpa-EHchtZk\" target=\"_self\">Cisco advisory<\/a> noted.<\/p>\n<p>&ldquo;A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non<em>-root<\/em>&nbsp;user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.&rdquo;<\/p>\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/zeroday-exploits-surge-vulncheck\/\" target=\"_blank\"><em>Read more on zero-day exploits: Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure.<\/em><\/a><\/p>\n<p>According to a detailed &ldquo;Threat Hunt&rdquo; guide issued by several <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/five-eyes-guidance-improve-edge\/\" target=\"_self\">Five Eyes<\/a> security agencies, the sophisticated threat actors likely downgraded target systems to an older version, in order to exploit legacy local privilege escalation vulnerability CVE-2022-20775. They then restored back to the original software version, in order to gain root access.<\/p>\n<p>Customers are urged to patch both the legacy 2022 bug and the new zero-day vulnerability for which Cisco released a fix yesterday.<\/p>\n<p>The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive requiring all federal agencies to find and patch the vulnerabilities by 5pm ET on February 27, 2026.<\/p>\n<p>&ldquo;Based on collaboration with international partners and CISA&rsquo;s forensic analysis, the ease with which these vulnerabilities can be exploited demands immediate action from all federal agencies,&rdquo; said CISA acting director, Madhu Gottumukkala.<\/p>\n<p>&ldquo;We urge all entities to implement the measures outlined in this emergency directive without delay.&rdquo;<\/p>\n<h2><strong>Immediate Actions for Securing Vulnerable SD\u2011WAN Deployment<\/strong><\/h2>\n<p>The Cisco Catalyst SD-WAN product streamlines and secures connectivity between branch offices, datacenters and the cloud.<\/p>\n<p>According to the UK&rsquo;s National Cyber Security Centre (NCSC), threat actors &ldquo;are compromising SD-WANs to add a malicious rogue peer and then conduct a range of follow-on actions to achieve root access and maintain persistent access to the SD-WAN.&rdquo;<\/p>\n<p>By adding a malicious device in this way, they could silently penetrate a target&rsquo;s network infrastructure.<\/p>\n<p>The NCSC urged affected organizations to work through the following steps, in order:<\/p>\n<ul>\n<li>Perform threat hunting for evidence of compromise detailed in the&nbsp;<a href=\"https:\/\/www.cyber.gov.au\/sites\/default\/files\/2026-02\/ACSC-led Cisco SD-WAN Hunt Guide.pdf\" target=\"_blank\">Hunt Guide<\/a><\/li>\n<li>If compromise looks likely, collect artefacts from the device and <a href=\"https:\/\/report.ncsc.gov.uk\/\">report it to the NCSC<\/a> (for UK organizations)<\/li>\n<li>Update to the latest version of&nbsp;<a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-authbp-qwCX8D4v\" target=\"_blank\" title=\"Cisco Catalyst SD-WAN Manager advisory\">Cisco Catalyst SD-WAN Manager<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-rpa-EHchtZk\" target=\"_blank\" title=\"Cisco Catalyst SD-WAN Controller advisory\">Cisco Catalyst SD-WAN Controller<\/a>&nbsp;as detailed in their respective advisories<\/li>\n<li>Apply the&nbsp;<a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/Cisco-Catalyst-SD-WAN-HardeningGuide\" target=\"_blank\">Cisco Catalyst SD-WAN Hardening Guide<\/a><\/li>\n<li>Perform continuous threat hunting activities<\/li>\n<\/ul>\n<p>The hardening guide lists steps covering network perimeter controls, SD-WAN manager access, control and data plane security, session timeout and logging.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Government security agencies in the UK, US, Canada, Aus [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43983","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43983"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43983\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}