Attackers Have Been Exploiting Cisco SD-WAN Zero-Day Flaw Since 2023
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要快速浏览一下文章内容。看起来这篇文章讲的是思科公司的Talos威胁情报团队和其他网络安全机构警告组织注意一个高级威胁行为者利用思科Catalyst SD-WAN控制器的一个零日漏洞。这个漏洞已经被修补了,但攻击者已经从2023年开始利用它。 文章提到攻击者被识别为UAT-8616,他们是一个高度复杂的网络威胁行为者。攻击者利用了两个漏洞:CVE-2026-20127和CVE-2022-20775。他们通过降级软件版本来提升权限,最终获得root访问权限。 此外,五眼联盟的成员也发布了类似的警告,并提供了一个40页的狩猎指南来帮助组织检测和缓解威胁。攻击者还采取了一些措施来逃避检测,比如删除 forensic artifacts。 专家指出,这次攻击不仅仅是利用漏洞,而是通过多个阶段的策略来实现持久化的root访问权限,这显示出攻击者的高 sophistication。 最后,思科和CISA建议组织立即修补漏洞,并审计软件版本以防止类似攻击。 好的,现在我需要把这些要点浓缩到100字以内。重点包括:思科发现零日漏洞被高级威胁行为者利用,涉及两个CVE漏洞,攻击者通过降级版本获取root权限,并且五眼联盟发布了指南。同时强调这次攻击的复杂性和潜在影响。 所以总结的时候要涵盖这些关键点:思科发现零日漏洞被高级威胁行为者利用,涉及两个CVE漏洞;攻击者通过降级版本获取root权限;五眼联盟发布指南;强调攻击的复杂性和潜在影响。 </think> 思科发现其Catalyst SD-WAN控制器存在零日漏洞(CVE-2026-20127和CVE-2022-20775),已被高级威胁行为者UAT-8616利用以获取root权限并操控网络配置。该行为者通过软件降级和本地权限提升实现持久化控制,并采取措施规避检测。五眼联盟发布指南协助检测与缓解此类威胁。专家指出此次攻击复杂且针对关键基础设施,需立即修补漏洞并加强日志监控以应对潜在风险。 2026-2-26 22:22:13 Author: securityboulevard.com(查看原文) 阅读量:2 收藏

Researchers with Cisco Systems’ Talos threat intelligence unit as well as cybersecurity agencies in the United States and elsewhere are warning organizations about an advanced threat actor exploiting a now-patched zero-day vulnerability in the networking giant’s Catalyst SD-WAN (software-defined WAN) Controller.

Talos researchers identified the attacker as UAT-8616, describing them as a “highly sophisticated cyber threat actor” that has been exploiting the security flaw since at least 2023. They also noted in an alert that “UAT-8616’s attempted exploitation indicates a continuing trend of the targeting of network edge devices by cyber threat actors looking to establish persistent footholds into high value organizations including Critical Infrastructure (CI) sectors.”

The Talos alert came out the same day as similar notices from members of the Five Eyes cybersecurity alliance, including CISA in the United States, the UK’s National Cyber Security Centre (NCSC), and Australia’s Cyber Security Centre.

There are two vulnerabilities involved with the threat activity, according to Talos researchers, CVE-2026-20127 and CVE-2022-20775. An investigation by Talos and others “identified that the actor likely escalated to root user via a software version downgrade. The actor then reportedly exploited CVE-2022-20775 before restoring back to the original software version, effectively allowing them to gain root access.”

According to CISA, the first flaw lets an unauthenticated remote actor to bypass authentication and gain administrative privileges on a compromised system. The second is a path traversal vulnerability that allows an authenticated but local attacker to get elevated privileges and execute arbitrary commands as root, which means they can bypass all security restrictions and gain full and unrestricted control over the operating system.

U.S. Agencies Told to Inventory Devices

CISA is ordering federal agencies running networks and third parties that run them for the government to identify all the vulnerable Cisco systems – the Catalyst SD-WAN Manager (formerly SD-WAN vManage) and Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and to apply Cisco’s updates to them.

In its own alert, Cisco wrote that the “vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account.

Through this account, an attacker could manipulate the network configuration for the SD-WAN fabric.”

The Hunt Guide

The Five Eyes agencies also released a 40-page Hunt Guide to help organizations detect and remediate the threat.

In the Hunt Guide, they describe a flaw that “allowed a malicious cyber actor to create a rogue peer joined to the network management plane, or control plane, of an organization’s SD-WAN. The rogue device appears as a new but temporary, actor-controlled SD-WAN component that can conduct trusted actions within the management and control plane.”

According to the guide, after gaining initial access, the threat actor downgraded a vSmart controller to a version that had known local privilege escalation capabilities and that – after gaining privilege escalation and persistence as the user root – restored vSmart to the version it was running before being downgraded.

The attackers also took steps to evade detection, mostly by removing forensic artifacts on the host system, they wrote in the guide.

A Sophisticated Attack

Yagub Rahimov, co-founder and CEO of Polygraf AI, a startup that is building on-premises, zero-trust solutions for AI governance, said the vulnerability itself is worrisome, but it’s how UAT-8616 is exploiting it – from initial access to downgrading a compromised device to an earlier flaw – that should get the attention.

“Chaining it with an authentication bypass makes it into something different: a path to persistent root access across the entire SD-WAN fabric,” Rahimov said. “That transformation is the sophisticated part. The attacker didn’t just find a vulnerability, they mapped the target’s patch history, identified a flaw whose risk profile changes entirely when authentication is removed from the equation, and built a multi-stage campaign around that insight. This isn’t random exploitation. It’s deliberate infrastructure targeting.”

The ‘Blast Radius’

He added that “the blast radius compounds this.”

SD-WAN controllers manage the entire network fabric and having NETCONF (Network Configuration Protocol) access “means an attacker isn’t just on a device, they’re manipulating routing, segmentation, and configuration across the whole environment,” Rahimov said. “Root-level access through the privilege escalation chain then gives the attacker OS-level control over the device itself.”

This makes external logging as urgent as applying the patch. A threat actor operating at that level can tamper with whatever evidence remains on the device.

“Patch immediately to available versions,” he said. “Audit software versions across your entire fabric, not just recent deployments. The downgrade technique makes version consistency a security requirement. And if external logging isn’t already in place, treat it as equal priority to the patch itself.”

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/02/attackers-have-been-exploiting-cisco-sd-wan-zero-day-flaw-since-2023/
如有侵权请联系:admin#unsafe.sh