Fixed Intel

CISA Known Exploited Vulnerability

This vulnerability is actively exploited in the wild and listed in the CISA Known Exploited Vulnerabilities catalog.

Remediation Deadline: Feb 27, 2026

CVE-2026-20127

High
EPSS 2.6%CISA KEV
Cisco/Catalyst SD-WAN Controller and Manager

Description

Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

EPSS — Exploit Probability

2.6%

Higher than 85.4% of all CVEs

Required Action

CISA Mitigation Instructions: https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems ; https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk ; https://nvd.nist.gov/vuln/detail/CVE-2026-20127

Related Articles (6)

Risk Assessment

ELEVATED
In CISA KEV

Details

Severity
High
EPSS
2.6%
CISA KEV
Yes
Ransomware
Unknown
Articles
6

Timeline

Published

Feb 25, 2026

Added to KEV

Feb 25, 2026

Remediation Due

Feb 27, 2026

Affected Product

Cisco

Catalyst SD-WAN Controller and Manager

View all Cisco CVEs