Five Eyes warn: Patch your Cisco SD-WAN or risk root takeover
- Reference: 1772105995
- News link: https://www.theregister.co.uk/2026/02/26/five_eyes_cisco_sdwan/
- Source link:
First discovered by the Australian Signals Directorate (ASD), all five of the alliance's intelligence agencies co-signed the alert on Wednesday evening, confirming that hackers of unspecified origin are trying to use the SD-WAN devices for persistent access.
"Malicious cyber threat actors are targeting Cisco Catalyst SD-WAN used by organizations globally," the UK's NCSC said. "These actors are compromising SD-WANs to add a malicious rogue peer and then conduct a range of follow-on actions to achieve root access and maintain persistent access to the SD-WAN."
[1]
The first of the two is [2]CVE-2022-20775 (7.8), a path traversal vulnerability disclosed in September 2022 affecting the SD-WAN's command line interface, allowing for privilege escalation.
[3]
[4]
The second is [5]CVE-2026-20127 (10.0), a max-severity bug fresh off the press this week. Classed as an improper authentication flaw, the issue affects Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager, formerly known as SD-WAN vSmart and SD-WAN vManage respectively.
The latter appears to be the biggie, not just because of the perfect 10 CVSS, but because successfully exploiting it grants hackers admin rights. Cisco said that cyberbaddies could also access NETCONF and reconfigure the SD-WAN fabric at their whim.
[6]
According to a separate report from Cisco Talos, the vendor attributed the attacks that use CVE-2026-20127 to a group it tracks as UAT-8616 and said current signals suggest it has been exploited since at least 2023.
Naturally, neither the intelligence agencies nor Cisco revealed precise details about the vulnerabilities that were reportedly exploited.
However, Talos's [7]report suggested that CVE-2026-20127 was exploited first to gain admin rights, before downgrading the SD-WAN's software version using CVE-2022-20775 so that the attackers could gain root access.
[8]CISA gives federal agencies three days to patch actively exploited Dell bug
[9]Misconfigured AI could trigger the next national infrastructure meltdown
[10]Zero-day deja vu as another Cisco IOS bug comes under attack
[11]Patch these 4 critical, make-me-root SolarWinds bugs ASAP
Talos did not provide any details about who or what country might be behind UAT-8616, but described it as a " [12]highly sophisticated cyber threat actor ."
An undisclosed number of attacks have already been carried out by exploiting the two vulnerabilities. Details about the victims remain sparse, although Talos suggested that targets were likely in high-value, sensitive sectors.
[13]
It stated: "UAT-8616's attempted exploitation indicates a continuing trend of the [14]targeting of network edge devices by cyber threat actors looking to establish persistent footholds into high-value organizations, including [15]critical infrastructure sectors."
Defenders are strongly urged to follow the Five Eyes [16]Hunt Guide [PDF] to first find signs of compromise. If that search is positive, share the data with the relevant security authorities and upgrade to the latest version of Cisco Catalyst SD-WAN Controller/Manager.
NCSC CTO Ollie Whitehouse said: "Our new alert makes clear that organizations using Cisco Catalyst SD-WAN products should urgently investigate their exposure to network compromise and hunt for malicious activity, making use of the new threat hunting advice produced with our international partners to identify evidence of compromise.
"UK organizations are strongly advised to report compromises to the NCSC, and to apply vendor updates and hardening guidance as soon as practicable to reduce the risk of exploitation." ®
Get our [17]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aaB8NVhzYlAHtEM-pbRzzgAAAEQ&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://www.cve.org/CVERecord?id=CVE-2022-20775
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaB8NVhzYlAHtEM-pbRzzgAAAEQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aaB8NVhzYlAHtEM-pbRzzgAAAEQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[5] https://www.cve.org/CVERecord?id=CVE-2026-20127
[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aaB8NVhzYlAHtEM-pbRzzgAAAEQ&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[7] https://blog.talosintelligence.com/uat-8616-sd-wan/
[8] https://www.theregister.com/2026/02/20/cisa_dell_vulnerability/
[9] https://www.theregister.com/2026/02/13/gartner_ai_infrastructure/
[10] https://www.theregister.com/2025/09/25/zeroday_deja_vu_another_cisco/
[11] https://www.theregister.com/2026/02/24/patch_these_4_critical_makemeroot/
[12] https://www.theregister.com/2025/03/24/nation_state_supply_chain_attack/
[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aaB8NVhzYlAHtEM-pbRzzgAAAEQ&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[14] https://www.theregister.com/2025/12/04/prc_spies_brickstorm_cisa/
[15] https://www.theregister.com/2026/01/19/dont_underestimate_prorussia_hacktivists_warns/
[16] https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf
[17] https://whitepapers.theregister.com/
Completely new and unexplored vector
From what I see, this is not just an attack, it's an entire attack vector.
This is the problem with products like SD-WAN and worse Catalyst Center.
No one bothers with SD-WAN because most hackers don't realize how many companies use it. It's MASSIVE. I wouldn't be surprised if every Fortune 500 company didn't have at least one SD-WAN deployment. Banks, governments, etc... all use SD-WAN.
But now, after a perfect 10, people will start realizing
1) It's everywhere
2) It's poorly coded
3) If you can download SDWAN, you can hack it
4) SD-WAN vulnerabilities often open up vulnerabilities to Catalyst Center and allow hackers to fully compromise the entire network
5) SD-WAN vulnerabilities can lie unreported for years
6) Cisco Talos is highly unresponsive to initial reports of known compromises
I can go on.
Moving away from service provider VPNs in favor of tools like SD-WAN has been a total disaster from a security landscape. Cisco really screwed their entire customer base by selling SD-WAN as a secure solution. It was only secure until the hackers figured out there's gold in those hills.
Using encrypted tunnels on top of MPLS VPNs were substantially better. And using open source encryption was the best idea possible since close encryption systems are rarely properly tested.
I expect a lot of SD-WAN attacks over the near term and I expect most of them to go unreported.
Re: Completely new and unexplored vector
>> Cisco Talos is highly unresponsive to initial reports of known compromises
Seemingly they sat on this for over 2 years. The question is 'why?'. It's very handy for the American regime to be able to hack at will.
The only solution
Rip and replace all Cisco equipment. They are a never ending series of backdoors, bypasses, and insecurities.
Isn't is interesting: Cisco Talos tracks the latest insecurity since (at least) 2023. Yet only now is it revealed.
A more sanguine reporter might ask Cisco: Why have you kept silent about this for over two years?
My guess is the American regime was using this was hacking around the world, and Cisco kept quiet about it.