{"id":15867,"date":"2026-02-25T22:52:31","date_gmt":"2026-02-25T22:52:31","guid":{"rendered":"https:\/\/newestek.com\/?p=15867"},"modified":"2026-02-25T22:52:31","modified_gmt":"2026-02-25T22:52:31","slug":"five-eyes-issue-emergency-directive-on-exploited-cisco-sd-wan-zero-day","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15867","title":{"rendered":"Five Eyes issue emergency directive on exploited Cisco SD-WAN zero-day"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Cybersecurity agencies across the Five Eyes alliance have issued <a href=\"https:\/\/www.cisa.gov\/news-events\/news\/immediate-action-required-cisa-issues-emergency-directive-secure-cisco-sd-wan-systemshttps:\/www.cisa.gov\/news-events\/news\/immediate-action-required-cisa-issues-emergency-directive-secure-cisco-sd-wan-systems\">an emergency directive<\/a> warning that a critical Cisco SD-WAN vulnerability is being actively exploited to gain unauthorized access to federal networks.<\/p>\n<p>Officials confirmed that threat actors are targeting core SD-WAN control systems \u2014infrastructure that manages traffic across government and enterprise networks \u2014 and urged organizations to patch affected devices immediately.<\/p>\n<p>Cisco\u2019s Talos threat intelligence group disclosed that <a href=\"https:\/\/blog.talosintelligence.com\/uat-8616-sd-wan\/\">attackers have been exploiting a previously unknown vulnerability<\/a> affecting Cisco Catalyst SD-WAN controllers, tracked as <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-20127\">CVE-2026-20127<\/a>. The flaw allows an unauthenticated attacker to bypass authentication controls and gain administrative-level access to vulnerable SD-WAN control plane components.<\/p>\n<p>Talos said the activity is associated with a threat cluster it tracks as UAT-8616, and that evidence suggests exploitation may have begun as early as 2023. Successful exploitation would allow attackers to manipulate controller-to-device communications, alter network configurations, and potentially establish persistent access within enterprise environments.<\/p>\n<h2 class=\"wp-block-heading\" id=\"attackers-are-attempting-active-exploitation\">Attackers are attempting active exploitation<\/h2>\n<p><a href=\"https:\/\/www.cisa.gov\/about\/leadership\/nick-andersen\">Nick Andersen<\/a>, executive assistant director for cybersecurity at the US Cybersecurity and Infrastructure Security Agency, said during a media briefing that threat actors are actively attempting to access and potentially compromise federal networks through exploitation of the flaw, but did not identify which agencies were affected.<\/p>\n<p>He also warned that the activity appears to be increasing. \u201cWe continue to see the volumetric increase in both threat actor behavior and the extension of the attack surface that they\u2019re targeting,\u201d Andersen said, adding that CISA is in the early stages of remediating the vulnerability. \u201cIt\u2019s a far-reaching activity that we\u2019ve seen and the persistent commitment of the cyber threat actor to both take advantage of SD-WAN and other technologies sort of continues to evolve within the space.\u201d<\/p>\n<p>CISA is not currently attributing the activity to a specific threat actor, Andersen noted.<\/p>\n<h2 class=\"wp-block-heading\" id=\"software-updates-available\">Software updates available<\/h2>\n<p>SD-WAN controllers play a central role in orchestrating traffic across distributed enterprise networks, including branch offices and cloud environments. Compromise at the controller level could provide attackers with broad visibility and control across large portions of an organization\u2019s network infrastructure.<\/p>\n<p>In a separate security advisory, <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sdwan-rpa-EHchtZk\">Cisco confirmed the vulnerability<\/a> and released software updates to address it. According to the company, the flaw stems from insufficient validation of authentication requests within the SD-WAN peering process. An attacker sending specially crafted traffic could gain unauthorized access to the system and interact with internal interfaces.<\/p>\n<p>Cisco said there are no workarounds for the vulnerability and urged customers to apply available patches immediately. The company also recommended reviewing system logs, validating controller integrity, and implementing additional hardening measures where possible.<\/p>\n<p>CISA and other Five Eyes agencies advise organizations operating Cisco SD-WAN systems to prioritize patch deployment and conduct thorough compromise assessments to determine whether exploitation has already occurred.<\/p>\n<p>CISA and the authoring organizations strongly urge network defenders to take the following steps immediately:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Inventory<\/strong> all in-scope Cisco SD-WAN systems.<\/li>\n<li><strong>Collect artifacts<\/strong>, including virtual snapshots and logs of SD-WAN systems.<\/li>\n<li><strong>Patch<\/strong> Cisco SD-WAN systems, including for CVE-2026-20127 and CVE-2022-20775.<\/li>\n<li><strong>Hunt<\/strong> for evidence of compromise.<\/li>\n<li><strong>Implement<\/strong> as outlined in Cisco\u2019s Catalyst SD-WAN Hardening Guide and review their blog.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"disclosure-comes-amid-strain-at-cisa\">Disclosure comes amid strain at CISA<\/h2>\n<p>The disclosure comes amid heightened scrutiny of network infrastructure security. It also comes at a time when CISA, facing staffing reductions and operating under constraints tied to the ongoing Department of Homeland Security shutdown, is <a href=\"https:\/\/cyberscoop.com\/cisa-personnel-cuts-trump-second-term-analysis\/\">managing limited resources<\/a> during a period of elevated threat activity.<\/p>\n<p>CISA\u2019s Andersen, however, said that despite the ongoing multi-week Department of Homeland Security shutdown, \u201cCISA remains fully committed to protecting federal networks from a malicious separate threat.\u201d<\/p>\n<p>Emergency directives are binding on federal civilian agencies and are reserved for vulnerabilities that pose significant, immediate threats. Although the order applies specifically to government networks, CISA frequently encourages private-sector organizations to follow similar remediation timelines when critical vulnerabilities are being exploited in the wild.<\/p>\n<h2 class=\"wp-block-heading\" id=\"shift-toward-control-plane-targets\">Shift toward control plane targets<\/h2>\n<p>The coordinated disclosures from Talos, Cisco, and the government agencies highlight an ongoing shift in attacker priorities. Rather than targeting only endpoints or user-facing applications, sophisticated groups are increasingly pursuing control-plane technologies such as SD-WAN, firewalls, and identity systems that offer strategic network access.<\/p>\n<p>Compromising SD-WAN infrastructure <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/sd-wan-security\">can yield<\/a> high operational leverage. Because controllers manage routing, policy enforcement, and device authentication across distributed environments, an attacker with privileged access could disrupt traffic flows, redirect communications, or use the position to move laterally into cloud and on-premises assets.<\/p>\n<p>The disclosures also reinforce <a href=\"https:\/\/www.isaca.org\/resources\/news-and-trends\/newsletters\/atisaca\/2023\/volume-51\/the-window-of-exposure-a-critical-component-of-your-cybersecurity-strategy\">long-standing concerns<\/a> about the risk window between the discovery of a vulnerability and the deployment of patches. In this case, Talos indicated that exploitation activity may have preceded public disclosure by a significant period, suggesting that attackers were able to leverage the flaw before customers were aware of it.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity agencies across the Five Eyes alliance have issued an emergency directive warning that a critical Cisco SD-WAN vulnerability is being actively exploited to gain unauthorized access to federal networks. Officials confirmed that threat actors are targeting core SD-WAN control systems \u2014infrastructure that manages traffic across government and enterprise networks \u2014 and urged organizations to patch affected devices immediately. Cisco\u2019s Talos threat intelligence group disclosed&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15867\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15867","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15867"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15867\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}