Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的英文内容,我需要先通读一遍,理解主要信息。 文章讲的是Cisco Talos披露了一个高度复杂的威胁行为者利用Cisco SD-WAN基础设施中的一个关键认证绕过漏洞进行了至少三年的攻击。这个漏洞被追踪为CVE-2026-20127,CVSS评分为满分10.0,允许未认证的远程攻击者获得管理权限,并添加恶意节点到企业网络中。 攻击者通过构造请求,绕过了认证机制,以内部高权限用户身份登录,进而操控网络配置,最终通过降级软件版本并利用另一个漏洞提升权限到root,然后恢复软件版本来隐藏痕迹。这个漏洞影响了多个版本的Cisco设备,并且已经发布了补丁。 澳大利亚的网络安全中心发现了这个漏洞,并发布了联合狩猎指南。CISA等机构也发布了紧急指令,要求相关机构采取措施应对威胁。 总结时需要包括关键点:Cisco SD-WAN漏洞被利用三年、CVSS满分、攻击者获取管理权限、利用CVE-2026-20127和CVE-2022-20775漏洞提升权限、补丁发布以及修复建议。 现在要将这些信息浓缩到100字以内,确保涵盖主要事件和影响。 </think> Cisco披露了SD-WAN基础设施中的一个关键认证绕过漏洞(CVE-2026-20127),该漏洞被用于三年以上的零日攻击。攻击者通过构造请求获得管理权限并添加恶意节点。 Cisco已发布补丁修复该漏洞,并建议组织升级系统以缓解风险。 2026-2-26 07:34:18 Author: thecyberexpress.com(查看原文) 阅读量:14 收藏

Cisco Talos disclosed that a highly sophisticated threat actor exploited a critical authentication bypass vulnerability in Cisco SD-WAN infrastructure for at least three years before security researchers discovered the zero-day attacks.

The vulnerability, tracked as CVE-2026-20127 with a maximum CVSS severity score of 10.0, allowed unauthenticated remote attackers to gain administrative privileges and add malicious rogue peers to enterprise networks.

Cisco Talos tracks the exploitation activity to UAT-8616, assessing with high confidence that a sophisticated cyber threat actor conducted the campaign targeting network edge devices to establish persistent footholds into high-value organizations including critical infrastructure sectors. Evidence shows malicious activity dates back to at least 2023, with the vulnerability actively exploited as a zero-day throughout that period.

The flaw affects Cisco Catalyst SD-WAN Controller, formerly known as vSmart, and Cisco Catalyst SD-WAN Manager, formerly vManage, in both on-premises and cloud-hosted deployments. The vulnerability stems from broken peering authentication mechanisms that fail to properly validate trust relationships when SD-WAN components establish connections.

Attackers exploited the authentication bypass by sending crafted requests that vulnerable systems accepted as trusted, allowing them to log in as internal, high-privileged, non-root user accounts. This access enabled manipulation of NETCONF configurations, granting control over the entire SD-WAN fabric’s network settings including routing policies and device authentication.

Downgrade-Penetrate-Upgrade

The attack chain demonstrated exceptional sophistication. After achieving initial access through CVE-2026-20127, intelligence partners identified that UAT-8616 likely escalated to root privileges by downgrading SD-WAN software to older versions vulnerable to CVE-2022-20775, a path traversal privilege escalation flaw patched in 2022. The attackers then exploited that vulnerability to gain root access before restoring the original software version, effectively covering their tracks while maintaining elevated privileges.

report-ad-banner

This downgrade-exploit-restore technique evaded detection mechanisms that would flag outdated software or unusual privilege escalations. By reverting to the original version after exploitation, attackers obtained root access while appearing to run current, patched software in routine security audits.

Australian Cyber Defenders Credited for the Findings

The Australian Signals Directorate’s Australian Cyber Security Centre credited with discovering and reporting the vulnerability to Cisco. ACSC published a joint hunt guide warning that malicious actors are targeting Cisco Catalyst SD-WAN deployments globally to add rogue peers, then conduct follow-on actions achieving root access and maintaining persistent control.

CISA and Others Scramble to Patch

CISA issued Emergency Directive 26-03 on Wednesday, requiring Federal Civilian Executive Branch agencies to inventory Cisco SD-WAN systems, collect forensic artifacts, ensure external log storage, apply updates and investigate potential compromise by 5:00 PM ET on Friday. The directive stated exploitation poses an imminent threat to federal networks.

CISA added both CVE-2026-20127 and CVE-2022-20775 to its Known Exploited Vulnerabilities catalog. The UK’s National Cyber Security Centre issued parallel warnings urging organizations to urgently investigate exposure and hunt for malicious activity using international partner guidance.

Also read: CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog

Cisco released patches for all affected software versions. The company said upgrading to fixed releases represents the only complete remediation, as no workarounds exist. Versions 20.11, 20.13, 20.14, 20.16 and versions prior to 20.9 have reached end-of-life and will not receive patches, requiring organizations to upgrade to supported releases.

Indicators to Lookout for

Talos identified high-fidelity indicators of UAT-8616 compromise including creation, usage and deletion of malicious user accounts with absent bash and CLI history, interactive root sessions on production systems with unaccounted SSH keys and known hosts, unauthorized SSH keys for the vmanage-admin account, abnormally small or empty logs, evidence of log clearing or truncation, and presence of CLI history files for users without corresponding bash history.

Organizations using Cisco Catalyst SD-WAN should immediately check for control connection peering events in logs, as this may indicate attempted exploitation. The most critical indicator is any unexpected peering event, particularly from unknown or unverified sources attempting to join the SD-WAN control plane.

This latest campaign follows a pattern of threat actors targeting network infrastructure devices that provide strategic access to enterprise environments. Compromising SD-WAN controllers offers exceptional operational leverage because these systems manage routing, policy enforcement and device authentication across distributed networks.

Talos stated SD-WAN management interfaces must never be exposed to the internet, yet organizations with internet-facing management planes face the greatest compromise risk. The targeting demonstrates continuing trends where advanced threat actors prioritize control-plane technologies over endpoints, recognizing that infrastructure compromise yields broader network access.

The three-year exploitation window before discovery also shows the detection challenges for infrastructure vulnerabilities. Unlike endpoint malware generating behavioral signatures, authentication bypasses in management systems may produce minimal forensic evidence, especially when attackers employ techniques like software version manipulation to evade monitoring.

Organizations should follow Cisco’s hardening guidance, implement robust logging with external storage, regularly audit SD-WAN peering configurations, restrict management interface access, and conduct thorough compromise assessments using indicators provided in the joint hunt guide from CISA, NCSC and Australian authorities.

Also read: Cisco Confirms Critical CVE-2025-20352 Zero-Day RCE Vulnerability Under Active Exploitation

文章来源: https://thecyberexpress.com/hackers-exploited-cisco-sd-wan-zero-day/
如有侵权请联系:admin#unsafe.sh