Critical (10.0) Actively Exploited

Cisco Vulnerability (CVE-2026-20127) [PoC]

CVE-2026-20127

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, r...

Affected: Cisco

Overview

A critical security flaw has been identified in Cisco’s software-defined wide area networking (SD-WAN) management software. This vulnerability allows an attacker to completely bypass login protections and gain high-level administrative control over the network management system without needing any credentials.

Vulnerability Explained Simply

The affected systems, Cisco Catalyst SD-WAN Controller and Manager, have a specific security check for communication between components (called “peering authentication”) that is not functioning correctly. Because this internal safeguard is broken, a remote attacker can send specially crafted data requests to the system’s management interface. If successful, the system mistakenly grants the attacker the privileges of a powerful built-in administrator account.

Potential Impact

The impact of this vulnerability is severe. A successful attacker gains the ability to:

  • Log in as a high-privileged administrator without a password.
  • Access NETCONF, a protocol used for device configuration, granting full control over the SD-WAN fabric.
  • Manipulate the entire network configuration, which could lead to service disruption, data interception (man-in-the-middle attacks), or unauthorized access to connected sites and data centers.

Given that these management systems control entire enterprise networks, exploitation could lead to widespread business operation disruption and significant security breaches.

Remediation and Mitigation Advice

Cisco has released software updates that address this critical vulnerability. Immediate action is required.

Primary Action: Patch Immediately

  • Upgrade to a Fixed Release: This is the only complete solution. Affected users must upgrade to a patched version of the software. Consult the official Cisco Security Advisory for the specific fixed versions for your product.
  • Download Links: Obtain the software from the Cisco Software Center.

Important Mitigation Note:

  • No Workarounds Available: Cisco has stated there are no viable workarounds for this vulnerability. Isolating the management interfaces from untrusted networks (like the internet) is a best practice but does not address the core flaw if an attacker gains a foothold on a trusted network segment.
  • Immediate Steps: If patching cannot be performed immediately, ensure the management interfaces for the Catalyst SD-WAN Controller and Manager are not exposed to the internet and are placed on tightly controlled network segments. Monitor these systems closely for any suspicious authentication or configuration change activity.

All administrators of affected Cisco Catalyst SD-WAN products should treat this with the highest priority and apply the provided updates without delay.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Metasploit Modules

Weaponized exploit code — authorized use only

The Metasploit Framework modules below are production-ready exploit code maintained by Rapid7. Unlike random GitHub PoCs, these are vetted by Metasploit maintainers and integrated into a point-and-click exploitation framework used by red teams worldwide. The presence of an MSF module means this CVE is trivially exploitable at scale — patch immediately.

Authorized use only. Run only against systems you own or have explicit written permission to test. Using exploit code against systems you do not own is illegal in most jurisdictions and violates Yazoul's terms of use.

Module Source
auxiliary/admin/networking/cisco_sdwan_auth_bypass View source

1 Metasploit module indexed for this CVE. Source: rapid7/metasploit-framework.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE ★ 31
sfewer-r7/CVE-2026-20127

An exploit for the Cisco Catalyst SD-WAN Controller authentication bypass vulnerability, CVE-2026-20127

★ 22
BugFor-Pings/CVE-2026-20127_EXP

Cisco Catalyst SD-WAN 身份验证绕过漏洞(CVE-2026-20127)利用EXP

★ 4
yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE ★ 2
randeepajayasekara/CVE-2026-20127

Walkthrough of the CVSS 10.0 authentication bypass in Cisco Catalyst SD-WAN from first malformed peering request to root on the management plane.

★ 0

Showing 5 of 5 known references. Source: nomi-sec/PoC-in-GitHub.

Related Advisories

Other Cisco Vulnerabilities

View all Cisco vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.