Cyber Posture

CVE-2026-20127

CriticalCISA KEVActive Exploitation

Published: 25 February 2026

Published
25 February 2026
Modified
26 February 2026
KEV Added
25 February 2026
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.5480 98.1th percentile
Risk Priority 73 60% EPSS · 20% KEV · 20% CVSS

Description

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This…

more

vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of known flaws like the improper peering authentication bypass in Cisco SD-WAN controllers.

prevent

Ensures devices such as SD-WAN controllers authenticate mutually before communications, preventing peering authentication bypass by remote attackers.

prevent

Monitors and controls external communications to block crafted requests from unauthenticated remote attackers targeting the vulnerable peering service.

Security SummaryAI

CVE-2026-20127 is a critical vulnerability (CVSS 10.0, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) affecting the peering authentication mechanism in Cisco Catalyst SD-WAN Controller, formerly known as SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage. The issue stems from the peering authentication not functioning properly (CWE-287: Improper Authentication), enabling an unauthenticated remote attacker to bypass authentication controls and gain administrative privileges on affected systems.

An unauthenticated remote attacker can exploit this vulnerability by sending crafted requests to a vulnerable system. Successful exploitation allows the attacker to log in using an internal high-privileged non-root user account, providing access to NETCONF services. From there, the attacker can manipulate network configurations across the SD-WAN fabric, potentially disrupting operations or enabling further compromise.

The Cisco Security Advisory at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk provides details on affected versions, exploitation status, and recommended mitigations or patches. This vulnerability is also listed in CISA's Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20127, indicating real-world exploitation and requiring urgent remediation by federal agencies.

Published on 2026-02-25, this flaw underscores risks in SD-WAN management platforms, with its perfect CVSS score highlighting the need for immediate patching in enterprise environments.

Details

CWE(s)
KEV Date Added
25 February 2026

Affected Products

cisco
catalyst sd-wan manager
20.12.6 · ≤ 20.9.8.2 · 20.11 — 20.12.5.3 · 20.13 — 20.15.4.2
cisco
sd-wan vsmart controller
20.12.6 · ≤ 20.9.8.2 · 20.11 — 20.12.5.3 · 20.13 — 20.15.4.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables an unauthenticated remote attacker to bypass authentication on a network-accessible SD-WAN management platform (AV:N/PR:N), directly facilitating exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References