Joint Advisory on SD-WAN Appliance Exploitation
Summary
The NSA, CISA, and international cybersecurity agencies have issued a joint advisory regarding the exploitation of Cisco SD-WAN appliances. Threat actors are exploiting a specific vulnerability (CVE-2026-20127) to gain root access and establish persistence. The advisory includes a threat hunt guide and mitigation recommendations.
What changed
A joint cybersecurity advisory has been issued by the United States National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and international partners, detailing the exploitation of Cisco SD-WAN controllers. Threat actors are leveraging a Cisco Catalyst SD-WAN controller authentication bypass vulnerability (CVE-2026-20127) to add rogue peers, gain root access, and achieve long-term persistence within targeted networks. The advisory references a Cisco SD-WAN Threat Hunt Guide to aid network defenders in detecting and responding to this activity.
Organizations utilizing Cisco SD-WAN technology are strongly urged to implement the recommended mitigations. This includes collecting relevant artifacts, reviewing and applying patches for Cisco SD-WAN vulnerabilities, specifically CVE-2026-20127, and hunting for evidence of compromise as outlined in the provided guide. Additionally, network defenders should review and implement hardening guidance from Cisco, focusing on network perimeter controls, SD-WAN manager access, control and data plane security, session timeouts, and logging configurations. Failure to patch and secure these systems could lead to unauthorized access and persistent compromise.
What to do next
- Collect artifacts and logs from SD-WAN technology.
- Review Cisco advisories and fully patch SD-WAN technology, including for CVE-2026-20127.
- Hunt for evidence of compromise and implement Cisco Catalyst SD-WAN hardening guidance.
Source document (simplified)
PP-26-0656 | February 2026 Ver. 1.0 Joint Cybersecurity Advisory Exploitation of Cisco SD-WAN appliances Introduction Malicious cyber threat actors are targeting Software-Defined Wide Area Networks (SD-WANs) of organizations globally. These actors exploited a Cisco Catalyst SD-WAN controller authentication bypass vulnerability, CVE-2026-20127. After exploitation of this vulnerability the malicious actors add a rogue peer, and eventually gain root access to establish long-term persistence in SD-WANs. The following agencies, hereafter referred to as the authoring organizations, released a Cisco SD-WAN Threat Hunt Guide, based on investigative data, to support network defenders’ detection of and response to the malicious actors’ threat activity. The Hunt Guide is being released by the following authoring and co-sealing agencies: • United States National Security Agency (NSA) • United States Cybersecurity and Infrastructure Security Agency (CISA) • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) • Canadian Centre for Cyber Security (Cyber Centre) • New Zealand National Cyber Security Centre (NCSC-NZ) • United Kingdom National Cyber Security Centre (NCSC-UK) Mitigations The authoring organizations strongly urge network defenders to: • Collect artifacts, including virtual snapshots and logs off of SD-WAN technology; • Review Cisco’s advisories, Cisco Catalyst SD-WAN Vulnerabilities and Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability, and fully patch SD-WAN technology, including for CVE-2026-20127; • Hunt for evidence of compromise as detailed in the Hunt Guide; and • Implement the Cisco Catalyst SD-WAN Hardening Guide. Cisco’s Catalyst SD-WAN hardening guidance should be reviewed in full and includes advice on the following: • Network perimeter controls: Ensure control components are behind a firewall, isolate VPN 512 interfaces, and use IP blocks for manually provisioned edge IPs.
PP-26-0656 | February 2026 Ver. 1.0 Exploitation of Cisco SD-WAN appliances • SD-WAN manager access: Replace the self-signed certificate for the web user interface • Control and data plane security: Use pairwise keying Session timeout: Limit to the shortest period possible • Logging: Forward to a remote syslog server References • Cisco’s Cisco Catalyst SD-WAN Hardening Guide • ASD’s ACSC’s Cisco SD-WAN Threat Hunt Guide co-sealed by NSA, CISA, Cyber Centre, NCSC-NZ, and NCSC-UK • Cisco Talos blog: "Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" • Cisco security advisory for CVE-2026-20127 • Cisco security advisory for CVE-2026-20122, CVE-2026-20126 and CVE-2026-20128 • See also: o CVE-2026-20127 o CVE-2026-20122 o CVE-2026-20126 o CVE-2026-20128 Notices and contact information Disclaimer of endorsement The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes. Purpose This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. Contact information Cybersecurity Report Feedback: CybersecurityReports@nsa.gov Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov Media Inquiries / Press Desk: NSA Media Relations: 443-634-0721, MediaRelations@nsa.gov
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Cybersecurity Intelligence alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when NSA Cybersecurity Advisories publishes new changes.