Threat Advisory

Critical Advisory: Active Exploitation of CVE-2026-20127 in Cisco Catalyst SD-WAN

Threat actor UAT-8616 actively exploiting CVE-2026-20127 authentication bypass in Cisco Catalyst SD-WAN controllers, chaining with CVE-2022-20775 for root escalation across government and critical infrastructure sectors.

TLT
Threat Landscape Team
2026-02-268 min read

Critical Advisory: Active Exploitation of CVE-2026-20127 in Cisco Catalyst SD-WAN

Date: February 26, 2026
Subject: Authentication Bypass and Chained Root Escalation (CVE-2026-20127 & CVE-2022-20775)
Threat Actor: UAT-8616

Overview

Active exploitation of CVE-2026-20127, a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controllers (formerly vManage). Intelligence indicates that threat actor UAT-8616 has been leveraging this flaw since at least 2023 to gain administrative access and establish persistent, high-privilege footholds within target environments.

The exploitation is particularly sophisticated, involving a "downgrade-to-root" strategy where attackers chain the new vulnerability with a legacy privilege escalation flaw (CVE-2022-20775) to achieve full system compromise while evading traditional detection.


Vulnerability Analysis & Relational Context

The attack sequence observed in the wild follows a specific, multi-stage lifecycle:

  1. Initial Access: Attackers exploit CVE-2026-20127 to bypass authentication and gain access to a non-root high-privilege account (e.g., vmanage-admin).
  2. Configuration Manipulation: Once authenticated, the actor uses NETCONF manipulation and rogue peering to alter the SD-WAN fabric's configuration.
  3. Firmware Downgrade: To escalate privileges, the actor performs a deliberate firmware downgrade to a version known to be vulnerable to CVE-2022-20775.
  4. Root Escalation: By exploiting CVE-2022-20775 on the downgraded firmware, the actor attains root-level access to the underlying Linux operating system.
  5. Persistence & Evasion: The actor installs unauthorized SSH keys, creates backdated accounts, and modifies PermitRootLogin settings. Finally, they restore the firmware to the original version to obscure the exploitation artifacts and clear system logs/bash histories.

Targeted Sectors & Organizations

The actor UAT-8616 has demonstrated a preference for high-value targets, including:

  • Government & Administrations: Specifically targeting Federal Civilian Executive Branch (FCEB) agencies.
  • Heavy Industries: Critical infrastructure and manufacturing.
  • Information & Communication: Telecommunications and technology providers.
  • Geographies: Primarily the United States and the United Kingdom.

MITRE ATT&CK TTP Mapping

The following table maps the observed behaviors of UAT-8616 to the MITRE ATT&CK framework:

TacticsTechnique IDTechnique NameDetails
Initial AccessT1190Exploit Public-Facing ApplicationExploitation of CVE-2026-20127 for auth bypass.
PersistenceT1098Account ManipulationCreation of unauthorized accounts and installation of SSH keys.
PersistenceT1133External Remote ServicesMaintenance of access via unauthorized SSH/NETCONF peering.
Privilege EscalationT1068Exploitation for Privilege EscalationUse of CVE-2022-20775 to gain root access.
Defense EvasionT1070Indicator Removal on HostClearing of logs, CLI histories, and firmware restoration.
Defense EvasionT1495Firmware ModificationDeliberate firmware downgrade to re-introduce vulnerabilities.

Indicators of Compromise (IOCs)

Security teams should monitor for the following high-fidelity indicators:

TypeIndicatorDescription
Log EventAccepted publickey for vmanage-adminSSH logins from unknown or unauthorized IP addresses.
BehaviorUnauthorized PeeringUnexpected control-connection peering events (rogue peers).
Artifactauthorized_keysUnauthorized entries in the root or admin SSH key files.
ArtifactFirmware VersioningDiscrepancies in version history suggesting a downgrade/upgrade cycle.
ConfigurationPermitRootLoginUnauthorized changes to SSH configuration to allow root access.
AnomalyTruncated LogsAbnormally small or cleared system logs and bash_history files.

Mitigation and Response

The vendor has announced fixes for maintained branches (with release 20.9.8.2 scheduled for late February 2026). However, several older branches (20.11, 20.13, 20.14, and 20.16) have reached end-of-maintenance and will not receive a patch.

Immediate Actions:

  1. Inventory & Isolate: Identify all internet-facing Catalyst SD-WAN Controllers and isolate management interfaces.
  2. Audit Peering: Validate all control-connection peering events against authorized maintenance windows and known public IPs.
  3. Off-Device Logging: Ensure all logs are forwarded to a remote Syslog/SIEM to prevent local log tampering.
  4. Patching: Apply vendor updates immediately. If the device belongs to an end-of-maintenance branch, migration to a supported release is mandatory.
  5. Root Recovery: If root compromise is confirmed (e.g., unauthorized SSH keys or PermitRootLogin changes), the system must be completely rebuilt.

Note: There are currently no full workarounds for CVE-2026-20127 other than upgrading to a patched software version.

Sources and Further Reading

The intelligence provided in this advisory is derived from the following authoritative threat intelligence and vulnerability records:

Ready to Transform Your Threat Intelligence?

See how Threat Landscape can reduce alert fatigue and improve your security operations