radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

sourceBleeping Computer
calendar_todayFebruary 25, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical Cisco SD-WAN Vulnerability Exploited in Zero-Day Attacks

Summary

A critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, identified as CVE-2026-20127, has been actively exploited in zero-day attacks. This vulnerability allows remote attackers to compromise controllers and introduce malicious rogue peers into targeted networks.

Key Points

  • Vulnerability: CVE-2026-20127 is a critical authentication bypass issue.
  • Product Affected: Cisco Catalyst SD-WAN.
  • Exploitation: The vulnerability has been actively exploited in zero-day attacks.
  • Impact: Attackers can compromise controllers and add rogue peers to networks.
  • Year of Discovery: The exploitation has been ongoing since 2023.

Analysis

The exploitation of CVE-2026-20127 in Cisco Catalyst SD-WAN highlights the persistent threat of zero-day vulnerabilities in critical network infrastructure. This particular vulnerability's ability to allow unauthorized access and network compromise underscores the importance of timely patch management and vulnerability assessment in maintaining network security.

Conclusion

IT professionals should prioritize patching Cisco Catalyst SD-WAN systems and review network configurations to mitigate the risk of unauthorized access and rogue peers. Continuous monitoring and threat intelligence are crucial to detect and respond to such vulnerabilities promptly.