Emerging Threat

Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127): Emerging Threat published on Risk Ledger

Critical CVE-2026-20127 (CVSS 10.0) hits Cisco Catalyst SD-WAN Controller—unauthenticated attackers can seize control of your entire network fabric. NCSC confirms active exploits. Discover patching urgency, supply chain risks, and immediate steps in Risk Ledger's exclusive alert.

Cisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127): Emerging Threat published on Risk LedgerCisco Catalyst SD-WAN Controller Authentication Bypass (CVE-2026-20127): Emerging Threat published on Risk Ledger

Summary

A critical authentication bypass vulnerability (CVE-2026-20127) has been identified in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager. This vulnerability has been given the maximum CVSS base score of 10.0 (Critical) and allows an unauthenticated remote attacker to log in as a high-privileged internal user and manipulate network configuration across the entire SD-WAN fabric. Active exploitation has been observed. Cisco has released patches to address this vulnerability.

Threat Description

On 26 February 2026, Cisco disclosed CVE-2026-20127, an authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager. The vulnerability affects all device configurations, regardless of deployment type, including on-premises deployments, Cisco Hosted SD-WAN Cloud, Cisco Hosted SD-WAN Cloud - Cisco Managed, and Cisco Hosted SD-WAN Cloud - FedRAMP Environment.

A successful exploit allows an unauthenticated remote attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow them to manipulate network configuration for the SD-WAN fabric.

The UK National Cyber Security Centre (NCSC) has confirmed that this vulnerability is being actively exploited. Cisco Catalyst SD-WAN deployments with management interfaces exposed to the internet are at the greatest risk of compromise.

The affected components, SD-WAN Controller and SD-WAN Manager, are the central control plane of the entire SD-WAN fabric. Compromise of these components could, depending on context, result in disruption to business operations if networking configuration is altered, or could create opportunities for traffic re-routing towards malicious endpoints and man-in-the-middle attacks.

There are no workarounds that address this vulnerability. Patching is the only available remediation.

Applicability

This threat could affect any organisation that uses Cisco Catalyst SD-WAN Controller or Cisco Catalyst SD-WAN Manager. Cisco Catalyst SD-WAN is the dominant player in the enterprise SD-WAN market, deployed in approximately 70% of Fortune 100 companies, with Cisco claiming over 48,000 SD-WAN deployments globally. This threat is most likely to affect larger enterprises and government entities that rely on Cisco for networking infrastructure.

All deployment types are affected:

  • On-Premises Deployment
  • Cisco Hosted SD-WAN Cloud
  • Cisco Hosted SD-WAN Cloud - Cisco Managed
  • Cisco Hosted SD-WAN Cloud - FedRAMP Environment

Relevance to the Supply Chain

SD-WAN infrastructure underpins the connectivity and network security of organisations and their operational sites. Because the affected components form the central control plane that orchestrates routing, policy, and security across potentially thousands of branch locations, compromise of a supplier’s SD-WAN controller could have far-reaching consequences. It is important for organisations to understand whether any of their suppliers rely on Cisco Catalyst SD-WAN, as exploitation could lead to disruption of services, interception of network traffic, or provide a foothold for further malicious activity across interconnected networks.

What Should You Do About It

If your organisation uses Cisco Catalyst SD-WAN Controller or Cisco Catalyst SD-WAN Manager, we recommend you take the following steps without delay:

  1. Apply the latest security patches from Cisco. There are no workarounds for this vulnerability; patching is the only remediation. Refer to the Cisco Security Advisory for the specific fixed software versions.
  2. Ensure management interfaces are not exposed to the internet. Cisco Catalyst SD-WANs with management interfaces exposed to the internet are at the greatest risk of compromise. Management interfaces should not be accessible from the public internet.
  3. Perform a compromise assessment. Review logs and network activity for signs of unauthorised access to SD-WAN Controller or Manager components. Deploy threat hunting capabilities using the indicators and guidance provided in the Cisco SD-WAN Threat Hunt Guide.
  4. Conduct continuous network monitoring. Monitor for unusual NETCONF activity or unexpected configuration changes across the SD-WAN fabric.
  5. Understand to what extent your suppliers or partners are affected. Engage with your supply chain to determine whether they use the affected Cisco products and what remediation steps they have taken.

If you are a Risk Ledger customer: You can use the Emerging Threats feature in the Risk Ledger product to monitor all of your suppliers’ responses to this threat, including any mitigating actions in progress. You can find out more about how the Emerging Threats feature on Risk Ledger works here.

Where to Find More Information

This is an evolving situation. You can keep up to date with the latest information on this threat by referring to the following sources:

To understand how your supply chain is affected by CVE-2026-20127, speak to one of the Risk Ledger team.

Emerging Threat

Download for free

By submitting this form, you agree to Risk Ledger’s Terms of Service, Privacy Policy, and Risk Ledger contacting you.

Thank you!
Download
Oops! Something went wrong while submitting the form.
Emerging Threat

Download for free

Download
Pattern Trapezoid Mesh

Get the security manager's briefing

Monthly research, case studies and practical guides you won't find anywhere else.

Join thousands of security managers turning their TPRM programmes into success stories.