Skip to main content
See every side of every news story
Published loading...Updated

Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

Federal agencies must patch Cisco SD-WAN vulnerability CVE-2026-20127 by Feb 27, as zero-day exploits enable attackers to gain persistent root access, CISA warns.

  • On February 25, 2026, CISA issued Emergency Directive 26-03 requiring Federal Civilian Executive Branch agencies to inventory Cisco SD‑WAN systems and collect forensic artifacts, citing ongoing exploitation as an imminent threat.
  • Cisco said CVE-2026-20127 stems from a peering authentication mechanism failure and impacts Cisco Catalyst SD‑WAN Controller and Manager with a maximum severity of 10.0, credited ASD's ACSC for reporting it.
  • Talos and partner advisories show attackers exploit authentication bypass to add rogue peers and use CVE-2022-20775 for root access; indicators include unexpected root logins and unauthorized SSH keys.
  • Federal agencies must apply patches by 5:00 PM ET on February 27, 2026 and report compliance to the secretary of homeland security, the national cyber director and Office of Management and Budget by May 1.
  • International partners urged nonfederal organizations to patch and harden affected devices, isolate SD-WAN management interfaces, forward logs externally, and apply Cisco hardening guidance as soon as practicable.
Insights by Ground AI
Podcasts & Opinions

12 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

Global Security Mag Online broke the news in on Wednesday, February 25, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal