February 25, 2026 Source: BleepingComputer 3 min read · 617 words

Critical Cisco SD-WAN bug exploited in zero-day attacks since 2023

Критична вразливість Cisco SD-WAN, яка використовується в атаках zero-day з 2023 року

Critical Cisco SD-WAN Bug Exploited in Zero-Day Attacks Since 2023

Cisco just dropped a bomb: a critical authentication bypass vulnerability in its Catalyst SD-WAN has been actively exploited by attackers for nearly three years without anyone knowing. We're talking about CVE-2026-20127, a flaw that lets remote attackers waltz past security controls and inject malicious rogue peers directly into corporate networks. That's not a small problem.

According to BleepingComputer, the vulnerability affects Cisco's software-defined wide area network controllers—the nerve center of many enterprise network architectures. And here's what makes this particularly nasty: the attackers weren't just poking around. They were actively weaponizing this thing since 2023.

The Breach

So who got hit? That's still unclear. Cisco's disclosure doesn't name specific victims, which is both frustrating and telling. The vulnerability existed in plain sight for three years, which means the real question is: how many organizations were already compromised before Cisco even realized there was a problem?

The scope here is potentially massive. SD-WAN has become the backbone of modern enterprise networking. If you're running Cisco Catalyst SD-WAN, there's a decent chance your organization was using it during the window when this vulnerability was being exploited in the wild.

And that matters because SD-WAN isn't just some isolated tool. It's the infrastructure layer connecting your branch offices, data centers, and cloud services.

Under the Hood

The technical details are where things get really interesting. The vulnerability allows unauthenticated remote attackers to bypass authentication mechanisms on SD-WAN controllers. Once they're past that gate, they can inject malicious rogue peers into the network topology.

Think about what that means operationally.

Rogue peers essentially become trusted nodes in your network. They can intercept traffic, redirect data flows, or pivot deeper into your infrastructure. This isn't a denial-of-service attack where systems just go down. This is a persistent compromise that could let attackers lurk inside your network undetected.

The flaw lives in how the controllers handle authentication requests—a breakdown in the security handshake that should have been caught during Cisco's development and testing phases. Frankly, this should have been caught sooner. Authentication bypass vulnerabilities at the controller level aren't subtle.

The Fallout

So what does this mean for your organization? If you're running Cisco SD-WAN, you're looking at potential network compromise. The signs of cyber attack might not be obvious at first—rogue peers could sit quietly, collecting data or establishing backdoors for lateral movement.

This also raises bigger questions about WAN security itself. Is WAN secure? It should be. But when critical infrastructure like SD-WAN controllers can be breached through authentication bypasses, it calls into question whether the products we're betting our networks on have actually been stress-tested against real adversaries.

Organizations need to assume they could have been affected during the 2023 through early 2026 window. That's nearly three years of potential exposure. Network logs from that period should be reviewed for suspicious peer activity or unusual controller behavior.

Protecting Yourself

Cisco has released patches. Apply them immediately. Don't wait for a maintenance window or quarterly update cycle.

Next, audit your SD-WAN topology. Look for unexpected peers, unusual traffic patterns, or controller configurations you don't recognize. If you've got network telemetry in place, search backwards through historical data for signs of compromise.

Consider implementing network segmentation if you haven't already. If an attacker does inject a rogue peer, segmentation limits how far they can move laterally. It's not a fix for this vulnerability, but it's a solid defensive layer.

Finally, check whether Cisco published a security advisory with specific version numbers. Not all Cisco Catalyst SD-WAN installations are vulnerable—some versions may have roundcube-vulnerabilities-actively-exploited-in-attacks/" class="internal-link">patched this before it was discovered. Knowing your exact software version matters here.

This vulnerability is a reminder that even major vendors ship critical flaws. The real question is: what else is lurking in your infrastructure that hasn't been discovered yet?

Read original article →

// FAQ

What is CVE-2026-20127 and which Cisco products does it affect?

CVE-2026-20127 is a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN controllers that allows remote attackers to inject malicious rogue peers into networks. It affects Cisco's software-defined wide area network controllers used across enterprise deployments.

How long has this Cisco SD-WAN vulnerability been exploited?

The vulnerability has been actively exploited in zero-day attacks since 2023, meaning attackers were weaponizing it for nearly three years before Cisco publicly disclosed it in February 2026.

What should I do if my organization uses Cisco SD-WAN?

Immediately apply Cisco's security patches, audit your SD-WAN topology for rogue peers or suspicious configurations, review historical network logs for suspicious activity, and implement network segmentation to limit lateral movement if compromise is discovered.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →