BridgeLynk logo
BRIDGELYNK
Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127

Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127

A maximum-severity vulnerability (CVSS 10.0) in Cisco Catalyst SD-WAN controllers is being actively exploited in the wild. Attackers are bypassing authentication, escalating to root, and establishing persistent access across enterprise network infrastructure.

BridgeLynk Threat Intelligence
BridgeLynk Threat Intelligence
Mar 13, 2026

In this article

Overview

Cisco has issued a critical security advisory for CVE-2026-20127, a maximum-severity authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage). Active exploitation has been observed in the wild, with threat actors targeting SD-WAN infrastructure across organisations globally. The vulnerability allows unauthenticated attackers to gain high-privileged access to SD-WAN controllers, manipulate network configurations, and establish persistent footholds across enterprise environments. Multiple international cybersecurity agencies — including ASD, NSA, CISA, CCCS, and NCSC-UK — have collaborated to release a joint Threat Hunt Guide in response.

Vulnerability Summary

CVE: CVE-2026-20127 | CVSS Score: 10.0 (Critical) | CVSSv3.1: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H | MITRE ATT&CK: TA0001 – Initial Access / T1556 – Exploit Public-Facing Application | Affected Products: Cisco Catalyst SD-WAN Controller and SD-WAN Manager across On-Prem, Cisco Hosted Cloud, Cisco Managed Cloud, and FedRAMP environments. SD-WAN controllers are the central nervous system of enterprise network infrastructure, managing connectivity between branch offices, cloud services, and data centres. Compromise at this layer gives an adversary strategic control over an organisation's entire network fabric.

How the Attack Works

The vulnerability lies in a flaw within the SD-WAN controller's peering authentication mechanism. The process responsible for validating peer devices fails to function correctly, allowing a threat actor to send specially crafted requests to an affected system and bypass authentication entirely without credentials. Once initial access is achieved, the attacker logs in as a high-privileged internal user account. This grants direct interaction with NETCONF — the network configuration protocol underpinning SD-WAN infrastructure — enabling manipulation of routing behaviour, network policies, and segmentation controls across the entire SD-WAN fabric. In observed exploitation activity, attackers have followed a consistent and severe escalation path: gaining initial access via the authentication bypass, adding a rogue peer device to the SD-WAN fabric, manipulating SD-WAN configurations to redirect or intercept traffic, escalating privileges to obtain root-level access, and establishing long-term persistence at the network control layer. Persistence at this level is particularly dangerous — even if individual compromised endpoints are remediated, the attacker remains embedded in the infrastructure that connects everything. Threat intelligence reporting has referenced a China-linked actor known as UAT-9686 as having previously targeted network infrastructure technologies consistent with this activity, though Cisco Talos has not made a definitive attribution to this group for CVE-2026-20127 at this time.

Affected Versions and Fixes

Cisco does not recommend any workaround for this vulnerability. Organisations must upgrade to a fixed version as the only effective remediation. Versions prior to 20.9 — migrate to a fixed release. Version 20.9 — upgrade to 20.9.8.2. Version 20.11 — upgrade to 20.12.6.1. Version 20.12.5 — upgrade to 20.12.5.3. Version 20.12.6 — upgrade to 20.12.6.1. Versions 20.13, 20.14, 20.15 — upgrade to 20.15.4.2. Versions 20.16 and 20.18 — upgrade to 20.18.2.1. In addition to patching, Cisco's Catalyst SD-WAN Hardening Guide should be reviewed in full. Key hardening actions include: ensuring all control components sit behind a firewall with VPN 512 interfaces isolated; replacing the self-signed certificate on the SD-WAN Manager web interface; enabling pairwise keying for control and data plane security; setting session timeouts to the shortest operationally viable period; and forwarding all logs to a remote syslog server for independent monitoring and detection.

International Agency Response

The severity of this vulnerability has prompted an unprecedented collaborative response from international cybersecurity authorities. The Australian Signal Directorate (ASD), United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Canadian Centre for Cyber Security (CCCS), and the United Kingdom's National Cyber Security Centre (NCSC-UK) have jointly published a Cisco SD-WAN Threat Hunt Guide. The guide provides defenders with investigative insights, detection indicators, and technical guidance to identify suspicious activity within affected SD-WAN environments. Organisations should review and apply this guidance as part of their incident response and threat hunting activities.

How BridgeLynk Can Help

Network infrastructure vulnerabilities like CVE-2026-20127 represent some of the highest-impact risks an organisation can face. A compromised SD-WAN controller gives an adversary persistent, strategic access that is difficult to detect and costly to remediate. BridgeLynk's attack-informed defence approach helps organisations assess the exposure of their network management systems, identify indicators of compromise, and build the detection and response capabilities needed to defend critical infrastructure. Explore our security services or speak to our team today.

Our Articles

Check out other related articles

Check out other related articles

Tool and strategies modern teams need to help their companies grow.

Tool and strategies modern teams need to help their companies grow.

View All Articles

Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"
Advisory

Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"

A critical unauthenticated RCE vulnerability (CVE-2026-21858, CVSS 10.0) in the popular AI workflow tool n8n allows attackers to read sensitive server files and escalate to full remote code execution. Here is what you need to know.

Mar 13, 2026
Read
Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"
Advisory

Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"

A critical unauthenticated RCE vulnerability (CVE-2026-21858, CVSS 10.0) in the popular AI workflow tool n8n allows attackers to read sensitive server files and escalate to full remote code execution. Here is what you need to know.

Mar 13, 2026
Read
Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127
Advisory

Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127

A maximum-severity vulnerability (CVSS 10.0) in Cisco Catalyst SD-WAN controllers is being actively exploited in the wild. Attackers are bypassing authentication, escalating to root, and establishing persistent access across enterprise network infrastructure.

Mar 13, 2026
Read
Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127
Advisory

Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127

A maximum-severity vulnerability (CVSS 10.0) in Cisco Catalyst SD-WAN controllers is being actively exploited in the wild. Attackers are bypassing authentication, escalating to root, and establishing persistent access across enterprise network infrastructure.

Mar 13, 2026
Read
Notepad++ Update Feature Hijacked by Chinese State Hackers for Months
Advisory

Notepad++ Update Feature Hijacked by Chinese State Hackers for Months

Between June and December 2025, Chinese state-linked hackers from the Lotus Blossom group hijacked the Notepad++ update mechanism to deliver a custom backdoor to millions of users. Here is a full breakdown of what happened and what organisations must do now.

Mar 13, 2026
Read
Notepad++ Update Feature Hijacked by Chinese State Hackers for Months
Advisory

Notepad++ Update Feature Hijacked by Chinese State Hackers for Months

Between June and December 2025, Chinese state-linked hackers from the Lotus Blossom group hijacked the Notepad++ update mechanism to deliver a custom backdoor to millions of users. Here is a full breakdown of what happened and what organisations must do now.

Mar 13, 2026
Read
Get Started Today

Ready to Build a Cyber Resilient Business?
Book a Free 60 Minute Threat Assessment Consultation