On February 25, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two vulnerabilities impacting Cisco networking products to its Known Exploited Vulnerabilities (KEV) catalog. The inclusion confirms that both flaws are being actively exploited in the wild by malicious actors. The vulnerabilities, CVE-2026-20127 and CVE-2022-20775, affect Cisco Catalyst SD-WAN products and could allow attackers to bypass authentication or access sensitive files. In accordance with Binding Operational Directive (BOD) 22-01, U.S. Federal Civilian Executive Branch (FCEB) agencies are required to remediate these vulnerabilities promptly. CISA strongly urges all organizations to prioritize patching to mitigate the risk of compromise.
Organizations should consult the official Cisco security advisories for a complete list of affected product versions and software releases.
Both CVE-2026-20127 and CVE-2022-20775 have been added to the KEV catalog because CISA has reliable evidence of active exploitation in the wild. This means threat actors are actively targeting unpatched devices, elevating the urgency for remediation. Attackers frequently target vulnerabilities in edge networking devices like SD-WAN controllers as they are often internet-exposed and provide a gateway into an organization's network.
Security teams can hunt for signs of exploitation by looking for specific patterns in web server logs on their Cisco SD-WAN devices:
..%2F or ..\. For example, a request to /cgi-bin/..%2F..%2F..%2Fetc/passwd.D3-NTA - Network Traffic Analysis.D3-SU - Software Update.Cisco confirms CVE-2026-20127 (CVSS 10.0) actively exploited, chained with CVE-2022-20775 for root access. CISA issues Emergency Directive. Zero-day exploitation since 2023.
Cisco has confirmed CVE-2026-20127 has a critical CVSS score of 10.0. Threat actors are actively chaining this authentication bypass vulnerability with CVE-2022-20775 (privilege escalation) to achieve root access and persistence on affected Cisco Catalyst SD-WAN Manager and Controller products. CISA has issued Emergency Directive 26-03, mandating federal agencies to take immediate action. Evidence suggests this vulnerability may have been exploited as a zero-day since 2023. New IOCs, such as specific log patterns in /var/log/auth.log for vmanage-admin authentication, and enhanced detection guidance have been provided.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats