CVE-2026-20127 - Vulnerability Analysis
CriticalCVSS: 10.0Last Updated: February 25, 2026
Cisco Catalyst SD-WAN Controller & Manager - Authentication Bypass
Published: February 25, 2026Updated: February 25, 2026KEVRemote Exploitable
Overview
Cisco Catalyst SD-WAN Controller and Manager contain an authentication bypass caused by improper peering authentication, letting unauthenticated remote attackers obtain administrative privileges, exploit requires sending crafted requests.
Severity & Score
Severity: Critical
CVSS Score: 10.0
Impact
Unauthenticated attackers can gain administrative access and manipulate network configurations, risking full control over the SD-WAN fabric.
Mitigation
Update to the latest available version that fixes the peering authentication mechanism.
References
- https://media.defense.gov/2026/Feb/25/2003880301/-1/-1/0/CSA_Exploitation_of_SD-WAN_Appliances.PDF
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20127
- https://blog.talosintelligence.com/uat-8616-sd-wan/
Related Resources
Details
- CVE ID
- CVE-2026-20127
- Severity
- Critical
- CVSS Score
- 10.0
- Type
- broken_authentication
- Status
- unconfirmed
CWE
- CWE-287
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H