Categories: Cyber Security News

PoC Exploit Released for Cisco SD-WAN 0-Day Vulnerability Actively Exploited in the Wild

A proof-of-concept exploit for CVE-2026-20127, a critical zero-day in Cisco Catalyst SD-WAN products, has surfaced publicly, heightening risks for global networks.

Security researcher zerozenxlabs released the code on GitHub yesterday, including Python scripts and JSP webshells targeting pre-authentication remote code execution (RCE).

This comes weeks after Cisco’s February 25, 2026, disclosure of active exploitation dating back to 2023.sec.cloudapps.

Sponsored
class="wp-block-heading" id="h-vulnerability-breakdown">Vulnerability Breakdown

CVE-2026-20127 stems from a flawed peering authentication mechanism in Cisco Catalyst SD-WAN Controller (ex-vSmart) and SD-WAN Manager (ex-vManage), earning a perfect CVSS 3.1 score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

An unauthenticated attacker sends crafted requests to bypass login entirely, gaining highly privileged non-root access.

From there, foes tap NETCONF on port 830 to read and alter SD-WAN fabric configs, injecting rogue peers into management or control planes.

Affected versions span 20.6 to 20.18.x, excluding recent patches like 20.9.8.2 and 20.18.2.1.nvd.nist+4

Cisco Talos attributes the exploitation to UAT-8616, a sophisticated actor active since 2023, first flagged by Australian officials.

Post-bypass, attackers downgrade software via built-in updates to exploit CVE-2022-20775 for root escalation, then restore versions to evade detection.

They add SSH keys, mimic legit users, purge logs in /var/log, clear histories, and pivot via NETCONF/SSH across the fabric.

Sponsored

CISA added it to its Known Exploited Vulnerabilities catalog on February 25, mandating federal fixes by February 27 under Emergency Directive 26-03.

The zerozenxlabs repo features cisco-sdwan.py for exploitation, cmd.jsp/cmd.war for webshell deployment, and a README warning of educational use only on owned systems.

It highlights rogue peer creation and admin takeover, mirroring wild tactics. Updated yesterday, the code risks accelerating copycat attacks on exposed controllers.

Cisco urges immediate patching to fixed releases and disabling unused peering if possible. Hunt for signs like suspicious accounts, empty logs, or downgrade artifacts; isolate exposed instances.

With PoC public, unpatched SD-WANs face imminent threats from nation-states and opportunists. Organizations must audit internet-facing deployments now.

Read Cisco advisory (sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk) and CISA guidance.sec.cloudapps.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post PoC Exploit Released for Cisco SD-WAN 0-Day Vulnerability Actively Exploited in the Wild appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Birdbuddy’s AI-powered hummingbird feeder is matching its best price to date

Birdbuddy’s smart hummingbird feeder can capture both photo and video of your feathery friends. |…

26 minutes ago

Today’s Top Deals: Borderlands 3 for $10, $20 Off Game Pass Ultimate, LEGO The Starry Night Hits New Low

If you’ve been wanting to try out an Xbox Game Pass Ultimate subscription, today might…

50 minutes ago

Disney+ Drops Its Best Deal of 2026 Right Before Zootopia 2 Comes to Streaming

Disney+ has revealed a new discount on its Hulu bundle for March 2026. The offer…

50 minutes ago

AliExpress Has Popular Sofirn High-Powered LED Flashlights for Less Than Half the Price on Amazon

It's smart to have a light source on hand for emergencies, especially since everyday carry…

50 minutes ago

LG’s C6 and G6 OLEDs Will be Available This Month Without a Price Increase

LG has announced that it's now taking preorders for its next generation of OLED TVs,…

51 minutes ago

Best Buy Has Open Box Asus ROG Zephyrus G14 RTX 5070 Ti Gaming Laptops for $1,765

Best Buy is offering an outstanding deal on a laptop that marries powerful gaming performance…

51 minutes ago

This website uses cookies.