2nd March 2026 Cyber Update: Five Eyes Issue Urgent Warning on Cisco SD-WAN Zero-Day Exploited Since 2023

Five Eyes nations, led by Australia's ASD, have issued an urgent warning for a critical zero-day (CVE-2026-20127) in Cisco's SD-WAN products. The flaw, actively exploited since 2023 by a sophisticated actor, allows for complete network takeover and impacts critical infrastructure globally.

2nd March 2026 Cyber Update: Five Eyes Issue Urgent Warning on Cisco SD-WAN Zero-Day Exploited Since 2023
Cisco

Cyber News Centre's cyber update for 2nd March 2026: Cisco has confirmed a maximum-severity vulnerability in its Catalyst SD-WAN products is under active exploitation, prompting an urgent joint advisory from the Five Eyes intelligence alliance, including the Australian Signals Directorate.

Cisco is a multinational technology conglomerate that develops, manufactures, and sells networking hardware, software, telecommunications equipment and other high-technology services and products. Its SD-WAN solutions are widely used by enterprises and governments globally to connect and secure their networks.

The Update and Why It Matters

Update: A critical, maximum-severity (CVSS 10.0) authentication bypass vulnerability, identified as CVE-2026-20127, has been actively exploited in Cisco Catalyst SD-WAN products since at least 2023. The flaw, first discovered by the Australian Signals Directorate (ASD), allows unauthenticated, remote attackers to gain administrative privileges and full control over an affected network. The threat actor, tracked as UAT-8616, is described as highly sophisticated and has been leveraging the zero-day to create rogue peer devices within victims' networks, establishing persistent access.

The attack chain involves exploiting CVE-2026-20127 for initial access, then using a previously known vulnerability (CVE-2022-20775) to escalate privileges to root. The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive mandating federal agencies to patch the vulnerability immediately.

The joint advisory from the Five Eyes nations, the US, UK, Canada, Australia, and New Zealand, underscores the global reach and severity of the threat, which impacts on-premise and cloud-hosted SD-WAN deployments. Cisco has released security updates and a hardening guide, urging all customers to apply them without delay and hunt for evidence of compromise.

"Malicious cyber threat actors are targeting Cisco Catalyst SD-WAN used by organizations globally," the UK's NCSC said.

"These actors are compromising SD-WANs to add a malicious rogue peer and then conduct a range of follow-on actions to achieve root access and maintain persistent access to the SD-WAN."

The first of the two is CVE-2022-20775 (7.8), a path traversal vulnerability disclosed in September 2022 affecting the SD-WAN's command line interface, allowing for privilege escalation.

The second is CVE-2026-20127 (10.0), a max-severity bug fresh off the press this week. Classed as an improper authentication flaw, the issue affects Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager, formerly known as SD-WAN vSmart and SD-WAN vManage respectively.

The latter appears to be the biggie, not just because of the perfect 10 CVSS, but because successfully exploiting it grants hackers admin rights. Cisco said that cyberbaddies could also access NETCONF and reconfigure the SD-WAN fabric at their whim.

Why it Matters: The three-year exploitation of a critical Cisco vulnerability by a sophisticated actor highlights a significant failure in the security of widely deployed networking infrastructure, with Australia at the forefront of discovery. The involvement of the Australian Signals Directorate in identifying the flaw underscores the nation's critical role in global cybersecurity intelligence.

For Australian organizations, particularly in government and critical infrastructure sectors that rely on Cisco's SD-WAN technology, this incident poses a direct and severe threat to national security and economic stability.

The ability of an attacker to gain persistent, root-level access allows for espionage, data exfiltration, and the potential disruption of essential services. This breach serves as a another reminder that even trusted, enterprise-grade equipment can harbor long-term, undiscovered vulnerabilities, making proactive threat hunting and rapid patching essential for maintaining a secure posture.


Get the stories that matter to you.
Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Cyber News Centre.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.