Site icon TheCyberThrone

CISA Adds Cisco SD-WAN Vulnerabilities to KEV Catalog

Advertisements

CISA added two critical Cisco Catalyst SD-WAN vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog on February 25, 2026, triggering Emergency Directive 26-03 for federal agencies.These flaws pose severe risks to network management in enterprise and critical infrastructure environments. Immediate patching is essential amid confirmed active exploitation.

Vulnerability Breakdown

The KEV update spotlights flaws in Cisco Catalyst SD-WAN Controller (vSmart) and Manager (vManage), core components for secure WAN orchestration.

Cisco Talos tracks attackers as UAT-8616, exploiting CVE-2026-20127 since 2023 to add rogue peers, alter configurations, and erase logs.

Attack Tactics and Impact

Adversaries exploit the auth bypass for unauthorized control-plane access, then leverage path traversal for persistence. Targets favor SD-WAN setups bridging branches to cloud services in sectors like energy and finance. Australian CERTs tipped off Cisco about the zero-day.

Common post-exploit signs include rogue SSH keys and wiped audit trails, enabling stealthy network pivots.

Detection Methods

Monitor for these indicators across SD-WAN managers:

Enable detailed logging and integrate with SIEM for real-time anomaly detection.

Patch and Mitigation Playbook

Prioritize these steps per Cisco advisories:

  1. Inventory all SD-WAN assets and verify versions against fixed releases.
  2. Apply patches immediately; isolate manager interfaces to trusted IPs.
  3. Rotate credentials, hunt for IOCs, and harden with least-privilege access.

Broader Implications

This KEV addition underscores SD-WAN’s rising attack surface as hybrid networks expand. Organizations should audit patch cycles against CISA KEV and align with NIST frameworks for vulnerability management. With exploitation dating back years, proactive threat hunting remains key to staying ahead of UAT-8616 and similar actors.

Exit mobile version