Exploiting zero-days: The stealthy infiltration of Cisco SD-WAN networks by hackers

Feb 27, 2026 | Threat Intelligence Research

Critical Zero-Day Vulnerability in Cisco SD-WAN Manager Under Active Exploitation

TL;DR: A zero-day vulnerability in Cisco Catalyst SD-WAN Manager (CVE-2026-20127) is being exploited by the UAT-8616 group, granting unauthorized administrative access. This flaw allows attackers to execute arbitrary commands on the system, emphasizing the vulnerabilities associated with edge infrastructure.

Main Analysis:
The research highlights a severe vulnerability in the Cisco Catalyst SD-WAN Manager, attributed to improper authorization checks in its REST API. An attacker can exploit this flaw to gain administrative access without valid credentials, thereby executing arbitrary commands with root privileges. The UAT-8616 group has been observed using this vulnerability to establish a foothold in enterprise networks, facilitating long-term espionage and manipulation of network traffic.

The exploitation process commences with reconnaissance, where attackers identify exposed instances of the Cisco SD-WAN Manager. Following this, they exploit the REST API flaw to bypass the standard authentication process. This leads to command execution capabilities on the underlying Linux OS, allowing attackers to modify system configurations and maintain persistence across reboots. The attack is particularly concerning because the SD-WAN Manager serves as a central point for managing wide-area networks, enabling significant visibility and control over sensitive network operations.

UAT-8616’s technique of prioritizing stealth is notable; by bypassing traditional security measures that focus on credential validation, the group can operate without triggering alerts. Their ability to monitor encrypted network traffic and manipulate routing policies poses a severe risk to organizations utilizing Cisco’s SD-WAN infrastructure.

Defensive Context
Organizations reliant on Cisco Catalyst SD-WAN Manager must prioritize assessing their exposure to this vulnerability. The threat primarily affects enterprises that utilize this management tool to oversee their wide-area networks. Most affected are businesses with significant assets in edge infrastructure, where traditional endpoint detection mechanisms might not be correctly deployed.

Why This Matters
The exploitation of this zero-day vulnerability has immediate implications for enterprise network security, particularly in sectors where edge devices are prevalent. Attackers can not only access sensitive corporate traffic but also remain undetected due to the stealthiness inherent in their method of exploitation.

Defender Considerations
Defenders should focus on monitoring for unauthorized REST API calls and unexpected activities from the root user account. Additionally, organizations should ensure that administrative accounts are reviewed for unauthorized changes and configurations in system startup directories are regularly inspected for anomalies.

Indicators of Compromise (IOCs)

  • CVE ID: CVE-2026-20127
  • Affected Products: Cisco Catalyst SD-WAN Controller and Manager
  • Exploitation Indicators: Unauthorized REST API calls and unexpected command execution from root accounts.

Patching efforts targeting versions 20.6.3.5, 20.9.3.4, and higher should be prioritized alongside restricting management access through Access Control Lists to mitigate the risk posed by this vulnerability.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles