By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly
News

Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly

News Room
Last updated: 2026/02/25 at 5:49 PM
News Room Published 25 February 2026
Share
Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly
SHARE

The UK’s National Cyber Security Centre (NCSC) and its partner agencies in the Anglophone Five Eyes intelligence-sharing group have warned users of Cisco Catalyst Software Defined Wide Area Networks (SD-WAN) to take immediate action after identifying a cluster of threat activity targeting the widely used products.

The activity appears indiscriminate in its targeting, but the modus operandi is largely the same – following compromise, the as-yet-unnamed threat actors add a malicious rogue peer before conducting follow-on actions to achieve root access and maintain persistent access to the victim’s network.

“Our new alert makes clear that organisations using Cisco Catalyst SD-WAN products should urgently investigate their exposure to network compromise and hunt for malicious activity, making use of the new threat hunting advice produced with our international partners to identify evidence of compromise,” said NCSC chief technology officer (CTO) Ollie Whitehouse.

“UK organisations are strongly advised to report compromises to the NCSC, and to apply vendor updates and hardening guidance as soon as practicable to reduce the risk of exploitation,” he added.

The NCSC said the activity itself appeared to date back to 2023, and a series of vulnerabilities in Catalyst SD-WAN Manager and Catalyst SD-WAN Controller have now been patched by Cisco.

Chief among these issues, and of most concern to Cisco, is CVE-2026-20127, an authentication bypass vulnerability in Catalyst SD-WAN.

In an advisory, Cisco said the vulnerability arose due to a failure of the peering authentication mechanism on an affected system.

“An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric,” the supplier said.

“Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.”

Organisations with management interfaces exposed to the public internet appear to be at greatest risk of compromise – exposing management interfaces to the internet is extremely ill-advised.

Besides performing threat hunting for evidence of compromise as detailed in a newly-published Hunt Guide – available here – security teams should immediately update to the appropriate fixed latest versions of Catalyst SD-WAN Manager and Controller, and apply the Cisco Catalyst SD-WAN Hardening Guide now available from Cisco.

UK-based organisations that discover they may have been compromised are advised to immediately collect artefacts from the relevant device and report it to the NCSC.

In the US, the Cybersecurity and Infrastructure Security Agency (Cisa) has issued a parallel emergency directive instructing government organisations to take action by 23:59 EST (04:59 GMT) on Thursday 26 February, and to have fully applied the patches by 17:00 EST on Friday.

Threat actor targets CNI operators

Meanwhile, Cisco’s threat intel unit Talos has been tracking active exploitation of CVE-2026-20127, and has assigned the cluster the designation UAT-8616.

Talos said it was confident that UAT-8616 is a “highly sophisticated cyber threat actor” given the historical extent of its activity dating back to 2023, and additional investigation, which found that its hackers likely escalated to root user by downgrading the software version then exploiting another flaw – CVE-2022-20775 – in the Catalyst software command line interface (CLI) before restoring back to the original.

Talos said UAT-8616 demonstrated an ongoing trend of targeting network edge devices in order to establish beachheads at high-value organisations, such as operators of critical national infrastructure (CNI).

While it stopped short of attributing the activity outright, the targeting of utilities and similar organisations could indicate UAT-8616 is backed by a nation-state.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Robots Learn to “See” With Language in Real Time Using 3D Gaussian Splatting | HackerNoon Robots Learn to “See” With Language in Real Time Using 3D Gaussian Splatting | HackerNoon
Next Article Opinion | Do A.I. Agents Actually Make You More Productive?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Mini-LED vs. OLED: Which TV Tech Should You Get?
Mini-LED vs. OLED: Which TV Tech Should You Get?
News
Mastering ChatGPT Prompts in 2026: The Practitioner’s Framework for Structured, High-Impact Prompting – Chat GPT AI Hub
Mastering ChatGPT Prompts in 2026: The Practitioner’s Framework for Structured, High-Impact Prompting – Chat GPT AI Hub
Computing
The Best Mini Desktops We’ve Tested for 2026
The Best Mini Desktops We’ve Tested for 2026
News
ProEmberCore Reviews: Is This Platform Legit or a Scam? Find Out Now
ProEmberCore Reviews: Is This Platform Legit or a Scam? Find Out Now
Gadget

You Might also Like

Mini-LED vs. OLED: Which TV Tech Should You Get?
News

Mini-LED vs. OLED: Which TV Tech Should You Get?

8 Min Read
The Best Mini Desktops We’ve Tested for 2026
News

The Best Mini Desktops We’ve Tested for 2026

36 Min Read
Happy Birthday, iPad: Apple’s Tablet Turns 16
News

Happy Birthday, iPad: Apple’s Tablet Turns 16

2 Min Read
Bitcoin gets new expiration date thanks to Google researchers
News

Bitcoin gets new expiration date thanks to Google researchers

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?