Critical Cisco SD-WAN Zero-Day Vulnerability Exploited in the Wild: PoC Released
A critical zero-day vulnerability, identified as CVE-2026-20127, has been discovered in Cisco Catalyst SD-WAN Controller and SD-WAN Manager. This flaw has been actively exploited since at least 2023, allowing unauthenticated remote attackers to bypass authentication mechanisms and gain administrative access to affected systems.
Vulnerability Overview
The vulnerability arises from a malfunctioning peering authentication mechanism within the affected Cisco SD-WAN systems. By sending specially crafted HTTP requests to the SD-WAN Controller’s REST API, attackers can completely bypass the login process, obtaining administrative sessions without valid credentials. This unauthorized access enables adversaries to manipulate the entire SD-WAN fabric configuration, posing significant risks to network integrity and security.
Attack Methodology
The exploitation of CVE-2026-20127 involves a multi-stage attack chain:
1. Initial Access: Attackers exploit the vulnerability to gain high-privileged, non-root administrative access and add rogue peer devices to the SD-WAN management and control planes.
2. Privilege Escalation: They deliberately downgrade the software version to reintroduce a previously patched flaw, CVE-2022-20775, allowing escalation to full root access.
3. Version Restoration: The system is then restored to its original software version to erase forensic evidence of the downgrade.
4. Persistence: Unauthorized SSH keys are added, and configurations are modified to maintain persistent access.
5. Lateral Movement: Using NETCONF and SSH, attackers pivot between SD-WAN appliances, manipulating the entire fabric configuration.
6. Cover-Up: Logs and histories are cleared to eliminate traces of the intrusion.
Proof-of-Concept Exploit Released
A public proof-of-concept (PoC) exploit for CVE-2026-20127 has been released by zerozenxlabs. The PoC includes a working Python exploit script, a JSP webshell (`cmd.jsp`), and a deployable WAR file, significantly lowering the barrier for other threat actors to weaponize this critical flaw.
Recommendations for Mitigation
Cisco Talos urges administrators to take immediate action:
– Audit Control Connection Peering Events: Review SD-WAN logs for unauthorized vManage peer connections, unexpected source IPs, and anomalous timestamps.
– Identify Indicators of Compromise: Look for log entries showing rogue peer additions, SSH key modifications, or version downgrade/upgrade cycles, treating them as high-fidelity indicators of compromise.
– Apply Patches Promptly: Organizations using Cisco Catalyst SD-WAN should apply the latest patches immediately to mitigate the vulnerability.
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20127 to its Known Exploited Vulnerabilities (KEV) catalog and mandated urgent patching for federal agencies. Organizations are also advised to follow the Australian Cyber Security Centre’s SD-WAN Threat Hunting Guide to check for potential compromises.
Conclusion
The release of a public PoC exploit for CVE-2026-20127 underscores the critical nature of this vulnerability. Organizations utilizing Cisco Catalyst SD-WAN must act swiftly to apply patches, audit logs for signs of compromise, and implement robust security measures to protect their networks from potential exploitation.