Open Nav
Sign Up

CVE-2026-20127 & CVE-2022-20775: Active Exploitation of Cisco SD-WAN Systems

CVE-2026-20127

Filip Dimitrov

February 26, 2026

A coordinated global campaign targeting Cisco SD-WAN environments has been identified by CISA, NSA, and international partners. Threat actors are actively exploiting a chain of vulnerabilities, most notably CVE-2026-20127 (authentication bypass) and CVE-2022-20775 (privilege escalation), to gain initial access, escalate privileges, and establish persistent footholds in enterprise networks.

Both vulnerabilities have been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in real-world attacks.

Technical Overview

CVE-2026-20127 enables attackers to bypass authentication mechanisms on Cisco SD-WAN controllers, effectively granting access to management interfaces without valid credentials. This type of vulnerability is particularly dangerous because it removes the need for phishing, credential theft, or brute force techniques, allowing direct entry into critical infrastructure.

Once access is established, CVE-2022-20775 is used to escalate privileges within the environment. This flaw is associated with insufficient authorization controls between different privilege contexts within the system, allowing attackers to move from initial foothold to full administrative control. With that level of access, they can modify configurations, create accounts, and embed persistence mechanisms within the SD-WAN control plane.

The combination of these two vulnerabilities creates a highly effective attack chain that is both low-friction and high-impact.

Attack Chain Analysis

Observed threat activity follows a structured and effective sequence:

  1. Initial Access
    • Exploitation of CVE-2026-20127 to bypass authentication
  2. Privilege Escalation
    • Use of CVE-2022-20775 to gain administrative control
  3. Persistence Establishment
    • Modification of configurations or credentials
    • Potential deployment of backdoors or rogue accounts
  4. Post-Exploitation Activity
    • Network reconnaissance
    • Lateral movement across connected environments
    • Long-term persistence within SD-WAN control plane

Affected Environments

Organizations using Cisco Catalyst SD-WAN solutions are most at risk, particularly where management interfaces are exposed or not adequately restricted. Environments that have not applied recent security updates or lack centralized logging and monitoring are especially vulnerable to undetected compromise.

Recommended Mitigations

Organizations should take immediate action to reduce exposure and assess potential compromise:

  • Apply all available patches and updates for Cisco SD-WAN systems
  • Inventory all SD-WAN assets and identify exposed management interfaces
  • Collect logs, configurations, and system snapshots to support threat hunting
  • Conduct a thorough review for indicators of compromise across network and identity telemetry

Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.