Cisco Catalyst Software Defined Wide Area Network (SD-WAN) solutions are actively exploited by a highly sophisticated cyber threat actor, as assessed in the latest Cisco Talos advisory. The Five Eyes intelligence alliance agencies and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued emergency directives due to significant network security risks.
The advisory specifically flags CVE-2026-20127 and CVE-2022-20775 as the primary vectors for these attacks. This group, tracked by Cisco Talos as UAT-8616, leveraged carefully crafted requests to:
UAT-8616's tactics include establishing unauthorized control connection peering events, introducing rogue peers into the network management plane, and performing software version downgrades to facilitate further exploitation, notably of CVE-2022-20775, before restoring the device to its original software state.Â
These actions effectively grant the actor persistent root-level access while minimizing detection.Â
Intelligence from the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) indicates that incidents involving UAT-8616 date back at least to 2023. Cisco Talos added that the actor has consistently targeted network edge devices to establish long-term footholds in high-value critical infrastructure environments.Â
Successful exploitation of these Cisco SD-WAN vulnerabilities could particularly impact federal civilian executive branch networks and critical infrastructure organizations globally, CISA warned.Â
Mitigation steps are offered by the CISA advisory, the British National Cyber Security Centre (NCSC), and other allied agencies, which are urging organizations to immediately:
Cisco has released additional recommendations specific to Cisco and software updates for Catalyst SD-WAN Manager and Catalyst SD-WAN Controller.
The Hunt Guide is released by the following authoring and co-sealing agencies: