Critical alert: exploitation of Cisco SD-WAN appliances


Friday, 27 February, 2026

Critical alert: exploitation of Cisco SD-WAN appliances

The Australian Cyber Security Centre (ACSC) last night (26 February) released a critical alert that malicious cyberthreat actors are targeting SD-WANs of organisations globally thorough an exploitation of Cisco Software-Defined Wide Area Network (SD-WAN) technology, including via CVE-2026-20127.

Those organisations using Cisco Catalyst SD-WAN technology are urged to act now to investigate and mitigate.

CVE-2026-20127 refers to a Cisco Catalyst SD-WAN controller authentication bypass vulnerability. After exploitation of this vulnerability the malicious actors add a rogue peer, and eventually gain root access to establish long-term persistence in SD-WANs.

The following agencies, hereafter referred to as the authoring organisations, released a Cisco SD-WAN Threat Hunt Guide (the Hunt Guide), based on investigative data, to support network defenders’ detection of and response to the malicious actors’ threat activity:

The Hunt Guide is being released by the following authoring and co-sealing agencies:

  • United States National Security Agency (NSA)
  • United States Cybersecurity and Infrastructure Security Agency (CISA)
  • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
  • Canadian Centre for Cyber Security (Cyber Centre)
  • New Zealand National Cyber Security Centre (NCSC-NZ)
  • United Kingdom National Cyber Security Centre (NCSC-UK).
     

The authoring organisations strongly urge network defenders to:

Cisco’s Catalyst SD-WAN hardening guidance should be reviewed in full and includes advice on the following:

  • Network perimeter controls: Ensure control components are behind a firewall, isolate VPN 512 interfaces, and use IP blocks for manually provisioned edge IPs.
  • SD-WAN manager access: Replace the self-signed certificate for the web user interface.
  • Control and data plane security: Use pairwise keying.
  • Session timeout: Limit to the shortest period possible.
  • Logging: Forward to a remote syslog server.
     

ASD's ACSC is monitoring the situation and is able to provide assistance and advice as required. Organisations or individuals that have been impacted or require assistance can contact the ACSC via 1300 CYBER1 (1300 292 371).

Links

Image credit: iStock.com/peshkov

Related News

ASD launches malware analysis tool on GitHub

ASD says its new open-source tool, Azul, will allow oganisations to explore, analyse and...

NSW Government offers free face‍-‍to‍-‍face scam support for seniors

As scammers increasingly target older Australians, the NSW Government is bringing free, practical...

Check Point unveils AI security strategy

Check Point says it has developed a four‍-‍pillar strategy aimed at transforming its...


  • All content Copyright © 2026 Westwick-Farrow Pty Ltd