A perfect-10 authentication bypass in Cisco's SD-WAN Controller and Manager lets unauthenticated attackers seize control of enterprise wide-area networks. Cisco confirms active exploitation, CISA issues Emergency Directive 26-03.

Attackers are actively exploiting a maximum-severity authentication bypass vulnerability in Cisco's Catalyst SD-WAN Controller and Manager — the software that acts as the central nervous system for enterprise wide-area networks worldwide. With a CVSS score of 10.0 out of 10 and zero authentication required, this flaw lets anyone on the internet silently step into the role of a highly privileged network administrator and rewrite the routing rules for an entire corporate WAN. The Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on February 25, 2026 and issued Emergency Directive 26-03 with a remediation deadline of February 27, 2026 — a timeline that leaves virtually no room for delay.
On February 25, 2026, Cisco's Product Security Incident Response Team (PSIRT) published security advisory cisco-sa-sdwan-rpa-EHchtZk disclosing a critical authentication bypass vulnerability, tracked as CVE-2026-20127, in two cornerstone products of its Catalyst SD-WAN architecture: the Catalyst SD-WAN Controller (formerly known as SD-WAN vSmart) and the Catalyst SD-WAN Manager (formerly known as SD-WAN vManage). The defect is catalogued internally under Cisco bug ID CSCws52722.
The vulnerability was reported to Cisco by the Australian Signals Directorate's Australian Cyber Security Centre (ASD/ACSC) — Australia's national cyber intelligence agency — a detail that hints at the sophistication of the discovery and underscores the seriousness of the finding. Cisco's advisory notes the vulnerability was discovered internally, but the ASD/ACSC attribution in the knowledge base confirms external government researchers played a key role in surfacing the flaw.
Critically, Cisco's PSIRT stated in the advisory: "The Cisco PSIRT is aware of limited exploitation of this vulnerability." That single sentence changes everything. This is not a theoretical risk. Real attackers, whose identities remain unknown as of February 26, 2026, have already weaponized this flaw against production networks. CISA simultaneously listed CVE-2026-20127 in its KEV catalog and classified it as actively exploitable with "Automatable: Yes" and "Technical Impact: Total" under the Stakeholder-Specific Vulnerability Categorization (SSVC) framework — meaning scripted, automated attacks at scale are entirely feasible.
Before diving into the flaw itself, it helps to understand what's at stake. Cisco's Catalyst SD-WAN is a Software-Defined Wide-Area Network platform deployed by enterprises, government agencies, healthcare organizations, financial institutions, and critical infrastructure operators to connect distributed offices, data centers, and cloud environments. Think of it as the intelligent traffic controller for a company's entire inter-site network.
The two affected components play the most sensitive roles in the entire architecture:
The vulnerability is classified under CWE-287: Improper Authentication, a category describing situations where a system either fails to prove a user's identity at all, or does so with a mechanism that can be trivially bypassed. In this case, the flaw lives specifically in the peering authentication mechanism — the handshake process by which SD-WAN controllers authenticate and establish trusted relationships with one another and with the Manager.
Cisco's official description reads:
In plain language: the locks on the door between SD-WAN controllers don't actually work. An attacker can knock in just the right way and the system waves them through as a trusted administrator — no password, no certificate, no prior relationship required.
While Cisco has not publicly released the specific structure of the malformed peering request required for exploitation (and no public proof-of-concept code has been identified as of the date of this writing), the attack chain is well understood at a functional level:
Step 1 — Target Identification The attacker scans the internet for hosts listening on TCP port 830 (NETCONF over SSH) or TCP port 22 (SSH), which are the ports used by the SD-WAN peering and management interfaces on Catalyst SD-WAN Controller and Manager instances.
Step 2 — Crafted Peering Request The attacker sends a specially crafted request designed to exploit the broken peering authentication mechanism. Because the flaw affects the default configuration of these products — there are no non-standard settings required to be vulnerable — any reachable, unpatched instance is a viable target. The CVSS vector confirms this:
1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HBreaking this down:
This combination produces the maximum possible base score of 10.0.
Step 3 — Authentication Bypass The vulnerable peering authentication mechanism fails to properly validate the crafted request. The system accepts the attacker's connection as legitimate, bypassing all authentication controls.
Step 4 — Privileged Account Access The attacker is granted access as an internal, high-privileged, non-root user account — specifically surfacing in logs as the vmanage-admin account. This is not a low-privilege foothold. This is a highly privileged internal system account with broad access to management functions.
Step 5 — NETCONF Access With the vmanage-admin account, the attacker accesses the NETCONF (Network Configuration Protocol) interface. NETCONF, operating over SSH on port 830, is the programmatic interface used to read and write device configurations. Using NETCONF, an attacker can push arbitrary configuration changes to any device managed by the SD-WAN fabric.
Step 6 — Full SD-WAN Fabric Manipulation The attacker now has the keys to the kingdom. They can modify routing policies, VPN configurations, Quality of Service (QoS) rules, security policies, and the cryptographic key distribution that underlies the entire SD-WAN control plane — across every connected site and device in the deployment.
NETCONF is explicitly designed to be a machine-readable, fully programmable interface for bulk network configuration. Unlike a web dashboard that requires human interaction, NETCONF interactions can be fully scripted and automated. An attacker with NETCONF access can enumerate all device configurations, extract credentials stored within them, push malicious routing changes to hundreds of sites simultaneously, and do all of this programmatically in a matter of minutes. This is precisely why CISA's SSVC classification rates the exploit as "Automatable: Yes" — once the authentication bypass is achieved, everything that follows can be scripted at scale.
The scope of affected versions is extraordinarily wide. The CVE JSON data from Cisco's CNA entry lists over 250 individual version strings for the Catalyst SD-WAN Manager alone, spanning from version 17.2.4 all the way through 20.18.2. The following table consolidates the affected release trains and their corresponding fixed versions:
Cisco | Catalyst SD-WAN Controller & Manager | Releases earlier than 20.9 (all versions) | 20.9.8.2 | Estimated 2026-02-27 |
Cisco | Catalyst SD-WAN Controller & Manager | 20.11 (all versions) | 20.9.8.2 or upgrade to fixed train | Estimated 2026-02-27 |
Cisco | Catalyst SD-WAN Controller & Manager | 20.12.5 | 20.12.5.3 | Available 2026-02-25 |
Cisco | Catalyst SD-WAN Controller & Manager | 20.12.6 | 20.12.6.1 | Available 2026-02-25 |
Cisco | Catalyst SD-WAN Controller & Manager | 20.13 (all versions) | Upgrade to fixed train |
Notable specific affected versions from the official CVE data include (but are not limited to): 17.2.4, 17.2.5, 17.2.6, 17.2.7, 17.2.8, 17.2.9, 17.2.10, 18.2.0, 18.3.0, 18.3.1, 18.3.3, 18.3.4, 18.3.5, 18.3.6, 18.3.7, 18.3.8, 18.4.0, 18.4.1, 18.4.3, 18.4.4, 18.4.5, 18.4.6, 19.0.0, 19.0.1a, 19.1.0, 19.2.0, 19.2.1, 19.2.2, 19.2.3, 19.2.4, 19.3.0, 20.1.1, 20.1.2, 20.1.3, 20.3.x (all subversions through 20.3.8), 20.4.x (all subversions), 20.5.x, 20.6.x (all subversions through 20.6.8), 20.7.x, 20.8.1, 20.9.x (all subversions through 20.9.8 and associated LI_Images variants), 20.10.x, 20.11.x, 20.12.x (through 20.12.6 and associated LI_Images variants), 20.13.x, 20.14.x, 20.15.x (through 20.15.4.1), 20.16.x, 20.18.1, 20.18.2, and all associated LI_Images variants of the above.
Important deployment context: Cisco customers running cloud-hosted instances managed by Cisco (including FedRAMP-authorized deployments) have already had mitigating controls applied by Cisco directly. Those customers should confirm their status with Cisco but are not the primary population at risk. On-premises deployments — where the customer manages their own SD-WAN Controller and Manager instances — are at the highest risk and must take immediate manual action.
Cisco's PSIRT has confirmed that exploitation is occurring in the wild as of the advisory publication date of February 25, 2026. The phrase used — "limited exploitation" — is consistent with the early stages of a targeted campaign, but the combination of a CVSS 10.0 score, trivial exploit complexity, and the availability of what appears to be a working exploit technique means that "limited" is a word that has a very short shelf life. History has repeatedly shown that once a maximum-severity, authentication-bypass vulnerability in widely deployed network infrastructure is confirmed exploited in the wild, the volume of exploitation attempts escalates dramatically within days.
CISA's SSVC assessment classified the exploit as "Automatable: Yes" — meaning threat actors can build scanners and exploit frameworks that automatically identify and compromise vulnerable instances at internet scale without human intervention for each target. Think of it as the difference between a burglar who tries one door at a time versus a machine that simultaneously tries every door on every street in the world.
As of February 26, 2026, no specific threat actor groups or named campaigns have been publicly attributed to exploitation of CVE-2026-20127. CISA lists the ransomware use status as "Unknown." However, the target profile — centralized network management infrastructure for enterprises and government agencies — is precisely the type of high-value target that attracts both financially motivated ransomware groups and nation-state actors engaged in espionage or pre-positioning for destructive attacks.
The involvement of the Australian Signals Directorate's Australian Cyber Security Centre in reporting this vulnerability is notable. The ASD/ACSC is Australia's signals intelligence and cybersecurity agency, operating within the Five Eyes intelligence alliance. Their involvement in discovering and reporting this flaw suggests it may have been identified through threat intelligence activities, potentially meaning it was observed being exploited by sophisticated actors before the public advisory was issued.
If an attacker successfully exploits CVE-2026-20127 against an organization's on-premises SD-WAN infrastructure, the potential consequences are severe and far-reaching:
Traffic Interception and Espionage: By manipulating routing policies through NETCONF, an attacker can redirect traffic flows through attacker-controlled infrastructure, enabling passive interception of all unencrypted (and potentially encrypted, via man-in-the-middle attacks) data traversing the WAN. For organizations with SD-WAN connecting offices, hospitals, financial branches, or government facilities, this represents a total loss of data confidentiality.
Configuration Tampering and Persistence: An attacker with NETCONF access can push malicious configurations to every managed edge device simultaneously. These configurations can create persistent backdoors, disable security controls, modify VPN parameters, and alter access control lists across hundreds of sites in a single programmatic operation.
Traffic Redirection for Further Attacks: Modified routing policies can be used to redirect specific traffic flows — for example, directing authentication traffic through a rogue DNS server, or routing internal management traffic to an attacker-controlled system — facilitating credential harvesting and lateral movement into otherwise segmented networks.
Ransomware Propagation: By gaining control of the routing fabric and disabling network segmentation controls, ransomware operators can dramatically accelerate the spread of encryption malware across geographically distributed sites, maximizing the scope of damage before defenders can respond.
Wide-Area Network Denial of Service: An attacker can simply destroy WAN connectivity across an organization's entire footprint by pushing invalid or contradictory routing configurations, effectively taking down inter-site communications for every connected location simultaneously.
Credential Extraction: SD-WAN Manager stores configuration data that includes authentication credentials and cryptographic material for managed devices. An attacker with administrative NETCONF access can extract this material, gaining footholds into every device managed by the compromised Controller or Manager.
Given that exploitation is actively occurring and CISA has issued an Emergency Directive, the response posture must be treated as an incident response situation, not a routine patch management exercise.
1. Implement Network-Level ACLs Immediately
If you cannot patch right now, the single most important mitigation is to restrict inbound access to the vulnerable ports to known, trusted IP addresses only. Apply Access Control Lists (ACLs) or firewall rules to block all traffic to TCP port 22 (SSH) and TCP port 830 (NETCONF) from any IP address that is not a known, authorized SD-WAN Controller or trusted management station.
1! Example Cisco IOS-XE ACL snippet (adapt to your environment)2access-list 110 permit tcp [trusted_controller_subnet] [wildcard] any eq 223access-list 110 permit tcp [trusted_management_subnet] [wildcard] any eq 224access-list 110 deny tcp any any eq 22 log5access-list 110 permit tcp [trusted_controller_subnet] [wildcard] any eq 8306access-list 110 permit tcp [trusted_management_subnet] [wildcard] any eq 8307access-list 110 deny tcp any any eq 830 logCritical caveat: ACLs must be scoped precisely. If they are too broad or misconfigured, legitimate controller-to-controller communication and management operations will break. Document all operational source IPs before deploying these rules. This is a partial mitigation only — it reduces the attack surface but does not fix the underlying vulnerability.
2. Audit Authentication Logs for Signs of Compromise
Before assuming your environment is clean, check for indicators of compromise. Examine /var/log/auth.log on all SD-WAN Controller and Manager instances for the following pattern:
1Accepted publickey for vmanage-admin from [IP_ADDRESS]Any IP address appearing in this log entry that is not a recognized, authorized controller IP in your SD-WAN topology is a strong indicator of compromise. Cross-reference these IP addresses against your SD-WAN Manager's configured System IPs (accessible via WebUI > Devices > System IP). Unknown IPs in this log are a red flag that demands immediate escalation.
3. Audit Peering Events
Review peering logs for vmanage peer types originating from unexpected IP addresses. Specifically look for:
peer-system-ip does not match any device in your SD-WAN topologyThe following fixed software versions are available. Upgrade to the appropriate version for your current release train:
20.9.x | 20.9.8.2 | Estimated 2026-02-27 |
20.12.5.x | 20.12.5.3 | Available now (released 2026-02-25) |
20.12.6.x | 20.12.6.1 | Available now (released 2026-02-25) |
20.15.x | 20.15.4.2 | Available now (released 2026-02-25) |
20.18.x | 20.18.2.1 | Available now (released 2026-02-25) |
All patches are available through Cisco's Software Center. The official advisory URL for patch downloads and verification is: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk
For customers on the 20.9.x release train: The fix (20.9.8.2) has an estimated release date of February 27, 2026 — the same day as the CISA Emergency Directive deadline. This is a genuine race condition. If your organization operates on the 20.9.x train and cannot wait for 20.9.8.2, evaluate whether upgrading to a parallel fixed train (such as 20.12.5.3 or 20.12.6.1) is feasible given your hardware and feature requirements. Regardless, implement ACL mitigations immediately while awaiting the 20.9.8.2 release.
For customers on release trains with no direct fix listed (20.11, 20.13, 20.14, 20.16): These trains do not have direct point-release fixes listed. You must upgrade to a fixed release train. Consult the full Cisco advisory and Cisco TAC for guidance on the appropriate migration path.
Cisco has published Snort intrusion detection rules for this vulnerability. If you operate a Snort-based IDS/IPS (including those embedded in Cisco Firepower/FTD), ensure your rule sets are updated and specifically verify the following rules are active and generating alerts:
If your log review reveals indicators of compromise, do not simply patch and move on. A compromised SD-WAN Controller or Manager may have been used to push malicious configurations to edge devices across your entire WAN. The following steps should be taken:
request admin-tech on all control plane components (Controllers and Manager) and submit the resulting diagnostic bundle to Cisco TAC immediately. This command collects comprehensive diagnostic data that Cisco engineers need to assess the scope of compromise.For U.S. Federal Civilian Executive Branch (FCEB) agencies, CISA Emergency Directive 26-03 mandates remediation by February 27, 2026. All FCEB agencies must adhere to this directive and should also consult CISA's published "Hunt & Hardening Guidance for Cisco SD-WAN Devices" as part of their response.
CVE-2026-20127 is not just another enterprise software vulnerability. It represents something more structurally concerning: a maximum-severity, authentication-bypass flaw in the very infrastructure layer that enterprises and governments trust to securely connect their distributed operations. SD-WAN was sold — correctly — as a way to simplify and centralize WAN management. That centralization is now a liability when the management plane itself is compromised.
This is at least the second major critical vulnerability to affect Cisco's SD-WAN product line in recent years, and the pattern is worth noting. Centralized network management platforms are enormously attractive targets precisely because of their reach: a single compromised Controller or Manager can cascade impact across every site, device, and user in an organization's WAN footprint. The architectural principle that makes SD-WAN operationally efficient — centralized control — is the same principle that makes a vulnerability in that control plane catastrophically dangerous.
The involvement of a Five Eyes signals intelligence agency (ASD/ACSC) in the discovery of this vulnerability, combined with Cisco's confirmation of active exploitation prior to the public advisory, raises a question that remains unanswered as of this writing: how long were attackers exploiting this before the patch was ready? The Cisco advisory lists the CVE reservation date as October 8, 2025 — meaning the vulnerability was reserved in the CVE system over four months before patches were made available to customers. The advisory does not specify when exploitation began relative to the patch development timeline, and this gap represents a significant intelligence uncertainty.
Organizations should watch for:
The bottom line is stark: if your organization runs Cisco Catalyst SD-WAN Controller or Manager on-premises and you have not yet implemented ACL restrictions on ports 22 and 830 and begun your patching process, you are operating vulnerable internet-facing infrastructure that attackers are demonstrably and actively exploiting today. The patch is available. The workaround is documented. The indicators of compromise are specific and actionable. Every hour of delay is an hour of unnecessary exposure.
See advisory
Cisco | Catalyst SD-WAN Controller & Manager | 20.14 (all versions) | Upgrade to fixed train | See advisory |
Cisco | Catalyst SD-WAN Controller & Manager | 20.15 | 20.15.4.2 | Available 2026-02-25 |
Cisco | Catalyst SD-WAN Controller & Manager | 20.16 (all versions) | Upgrade to fixed train | See advisory |
Cisco | Catalyst SD-WAN Controller & Manager | 20.18 | 20.18.2.1 | Available 2026-02-25 |