CISA’s Known Exploited Vulnerabilities (KEV) Catalog expanded on February 25, 2026, with two additions that deserve immediate attention from network teams: CVE-2022-20775, a path traversal/privilege‑escalation flaw in Cisco Catalyst SD‑WAN components, and CVE-2026-20127, a critical authentication bypass in Cisco Catalyst SD‑WAN Controller and Manager that has confirmed exploitation in the wild. Both affect core SD‑WAN infrastructure — systems responsible for routing, security policy enforcement, and management across distributed enterprise networks — turning what might once have been a niche patch cycle into an urgent remediation priority.
Binding Operational Directive (BOD) 22‑01 created the KEV Catalog as a focused instrument for reducing risk across the federal enterprise by forcing accelerated remediation of vulnerabilities with evidence of active exploitation. The directive requires Federal Civilian Executive Branch (FCEB) agencies to remediate cataloged vulnerabilities on an accelerated schedule (typically two weeks for CVEs assigned after 2021), and it is the reason KEV additions immediately translate into binding deadlines for federal networks. Although BOD 22‑01 binds federal agencies, the KEV process is a best‑practice signal to the broader community: vulnerabilities added to the KEV are those that attackers are actively using, which elevates them to top priority for every organization with affected assets.
Cisco’s Catalyst SD‑WAN portfolio (Controller, Manager, and related components) is widely deployed in enterprises and service provider environments. These devices operate at the control and management plane of wide area networks, and compromise of these components can provide attackers with powerful capabilities: adding rogue peers, changing routing and security policies, intercepting traffic, and creating persistent footholds that are difficult to detect and remediate.
Key technical attributes:
Key technical attributes:
Caveat: statements about the scope of exploitation should be treated carefully. Cisco has characterized exploitation of some of these flaws as “limited” in public advisories; national CERTs have described incidents. That mix — limited but confirmed exploitation — is typical for high‑value targets: attackers act selectively but with high impact. Organizations should not wait for “mass exploitation” to patch; targeted exploitation against critical infrastructure requires immediate action.
That operational friction does not remove risk: an unpatched SD‑WAN controller offers a single high‑value target that, when compromised, can silently propagate malicious configuration. CISA’s KEV additions — and the federal remediation mandates that follow — rightly prioritize these flaws because patching a controller may be hard, but the alternative (persistent administrative compromise of your network fabric) is far worse.
Practical advice to align operations with security objectives:
Federal teams should:
Start with discovery and immediate isolation where possible, prioritize vendor‑provided fixes, and then move to verification and remediation of any suspected compromises. Importantly, treat management and control infrastructure with the same — or greater — urgency you would assign to internet‑facing servers: these systems are, in the modern enterprise, mission‑critical security choke points.
CISA’s KEV mechanism exists to force timely action; organizations that treat these additions as “optional” invite attackers to leverage widely trusted network management tools as their most effective attack vectors. Remediate now, harden the management plane, and bake SD‑WAN security into your ongoing change and asset‑management processes to prevent the next KEV addition from becoming an operational crisis.
Source: CISA CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA
Background
Binding Operational Directive (BOD) 22‑01 created the KEV Catalog as a focused instrument for reducing risk across the federal enterprise by forcing accelerated remediation of vulnerabilities with evidence of active exploitation. The directive requires Federal Civilian Executive Branch (FCEB) agencies to remediate cataloged vulnerabilities on an accelerated schedule (typically two weeks for CVEs assigned after 2021), and it is the reason KEV additions immediately translate into binding deadlines for federal networks. Although BOD 22‑01 binds federal agencies, the KEV process is a best‑practice signal to the broader community: vulnerabilities added to the KEV are those that attackers are actively using, which elevates them to top priority for every organization with affected assets.Cisco’s Catalyst SD‑WAN portfolio (Controller, Manager, and related components) is widely deployed in enterprises and service provider environments. These devices operate at the control and management plane of wide area networks, and compromise of these components can provide attackers with powerful capabilities: adding rogue peers, changing routing and security policies, intercepting traffic, and creating persistent footholds that are difficult to detect and remediate.
What CISA added and why it matters
The two new KEV entries (summary)
- CVE-2022-20775 — Path traversal / CLI privilege escalation in Cisco Catalyst SD‑WAN components. This is an older CVE (assigned in 2022) describing improper input validation in CLI/API endpoints that can be abused to write or manipulate files and ultimately escalate to root privileges.
- CVE-2026-20127 — Authentication bypass in Cisco Catalyst SD‑WAN Controller and Manager. This is a critical improper‑authentication vulnerability that allows an unauthenticated remote actor to bypass peering authentication and gain administrative access. Cisco and at least one national CERT have reported evidence of exploitation.
Why SD‑WAN vulnerabilities are high‑impact
SD‑WAN controllers and managers are not typical application servers. They:- Hold network topology and policy state that, if altered, can redirect, mirror, or intercept traffic.
- Control distribution of configurations to distributed edge appliances, meaning a single compromised controller can propagate malicious configuration to many sites.
- Frequently have privileged management interfaces that, when accessed, equate to near‑total control of routed traffic and scanning visibility.
Technical snapshot: path traversal vs. authentication bypass
CVE‑2022‑20775 — Path traversal and CLI access
CVE‑2022‑20775 stems from inadequate validation of path inputs in SD‑WAN CLI/API functions. When exploited, an attacker who already has some level of authenticated local access to the CLI can craft inputs that traverse directories to overwrite or create files in protected locations, often enabling arbitrary command execution with root privileges.Key technical attributes:
- Class: CWE‑22 / CWE‑25 (Path traversal)
- Attack vector: local/authenticated CLI or API misuse that allows directory traversal
- Impact: arbitrary file write → potential root code execution or service disruption
- Remediation: upgrade to fixed software releases specified by Cisco or restrict CLI access until patched
CVE‑2026‑20127 — Authentication bypass with active exploitation
CVE‑2026‑20127 is more urgent. It is an improper authentication defect in the peering/authentication logic of Catalyst SD‑WAN Controller (formerly vSmart) and Manager (formerly vManage). An unauthenticated attacker can bypass authentication, potentially gaining the equivalent of administrative privileges on the controller/manager.Key technical attributes:
- Class: CWE‑287 (Improper Authentication)
- Attack vector: remote, unauthenticated requests against peering/authentication interfaces
- Impact: attacker can add rogue peers, obtain administrative access, execute follow‑on actions (persistence, policy changes)
- Exploitation evidence: vendor and national CERTs report observed incidents where malicious rogue peers were added to impacted SD‑WAN configurations
Evidence and reporting: what we know
Multiple vendor and national cyber centers have documented the issues and confirm exploitation activity for the 2026 authentication bypass.- Cisco’s security advisories outline the vulnerabilities, list affected releases, and publish mitigation and fixed‑release guidance. Cisco’s advisories also recommend specific detection actions (for example, auditing auth.log for suspicious SSH publickey acceptance events) and encourage customers to open TAC cases if compromise is suspected.
- The Canadian Centre for Cyber Security (and allied CERTs) has issued alerts noting active exploitation and incidents in which malicious rogue peers were introduced into SD‑WAN configurations, enabling persistent administrative access.
- Public vulnerability databases and CVE/NVD entries document CVE‑2022‑20775 (path traversal) with references to Cisco advisories and third‑party research.
Caveat: statements about the scope of exploitation should be treated carefully. Cisco has characterized exploitation of some of these flaws as “limited” in public advisories; national CERTs have described incidents. That mix — limited but confirmed exploitation — is typical for high‑value targets: attackers act selectively but with high impact. Organizations should not wait for “mass exploitation” to patch; targeted exploitation against critical infrastructure requires immediate action.
Immediate mitigation and remediation guidance
If you operate any Cisco Catalyst SD‑WAN Controller, Manager, or related component, treat this as a high‑urgency incident. Use the following prioritized steps:- Identify affected assets immediately
- Inventory your SD‑WAN estate: controllers, managers, orchestration components, and any devices exposing SD‑WAN management or control planes to the internet.
- Confirm software release versions against Cisco’s affected/fixed release matrices.
- Apply vendor fixes as the primary remediation
- Upgrade affected systems to the fixed software releases Cisco lists for each CVE.
- If a fixed release is not immediately available for your exact version, prioritize migration to a supported, patched release.
- If you cannot patch immediately, isolate and restrict access
- Remove internet exposure for management/control interfaces — do not allow public access to vManage/vSmart or their APIs.
- Restrict management plane access to a small set of trusted management IP addresses using access control lists (ACLs), VPN tunnels, or private management VLANs.
- Disable unnecessary services (HTTP, FTP) on the management interface as a temporary hardening measure.
- Detect and respond to possible compromise
- Audit auth.log (and equivalent logs) for unusual entries such as “Accepted publickey for vmanage-admin from [unknown IP]” and compare against your configured System IPs.
- Look for changes in peer lists, unexpected certificates or SSH keys, and unauthorized configuration pushes.
- For suspected compromise, collect admin‑tech output and open a case with Cisco TAC; preserve logs and configuration snapshots for forensic analysis.
- Rotate credentials and keys
- After remediation, rotate management passwords, administrative accounts, and SSH keys. Treat any pre‑patch credentials as suspect if exposure was possible.
- Reissue and validate TLS/SSH certificates used by management components as needed.
- Monitor and harden post‑patch
- Enable stricter logging and monitoring on SD‑WAN components.
- Deploy IDS/IPS rules tuned to detect anomalous SD‑WAN control traffic or configuration pushes.
- Validate configuration integrity with periodic checksums and configuration drift detection.
Detection checklist: indicators of compromise (IOC) for SD‑WAN administrators
- Unrecognised SSH public key authentications for administrator accounts in /var/log/auth.log.
- Presence of unknown or suspicious “peer” entries in the controller/manager peer lists.
- Unexpected configuration pushes or rollbacks to device configurations, including changes to security policies or routing.
- New or altered system accounts with admin privileges.
- Abnormal system processes, scheduled tasks, or files written to protected directories (suggestive of path traversal abuse).
- Outbound connections from SD‑WAN control/management plane to unfamiliar external IPs.
The operational reality: patching SD‑WAN is hard — but non‑negotiable
Enterprises commonly delay network device upgrades for reasons including change‑control windows, service‑level constraints, inter‑device compatibility, and fear of breaking live traffic. SD‑WAN controllers are especially sensitive because they coordinate deployment of configuration to hundreds or thousands of edge devices.That operational friction does not remove risk: an unpatched SD‑WAN controller offers a single high‑value target that, when compromised, can silently propagate malicious configuration. CISA’s KEV additions — and the federal remediation mandates that follow — rightly prioritize these flaws because patching a controller may be hard, but the alternative (persistent administrative compromise of your network fabric) is far worse.
Practical advice to align operations with security objectives:
- Pre‑stage upgrades in a lab with realistic topology and compatibility checks so the upgrade path is validated before hitting production windows.
- Implement maintenance windows and phased rollouts that allow rapid upgrade while containing potential service impacts.
- Use canary deployments for critical controller upgrades: patch a subset, validate behavior, then roll out to the whole estate.
- Where patching requires vendor coordination (for hosted or managed environments), enforce contractual SLAs that include security patch timelines and incident notifications.
For federal agencies: BOD 22‑01 timelines and compliance implications
Under BOD 22‑01, vulnerabilities listed in the KEV Catalog become remediation requirements with fixed timelines. The directive’s default timelines generally require remediation within two weeks for CVEs assigned after 2021; agencies must update internal vulnerability management procedures to comply and report remediation status via the Continuous Diagnostics and Mitigation (CDM) Federal Dashboard or CyberScope.Federal teams should:
- Treat KEV additions as operational directives and begin remediation immediately.
- Report status and exceptions per BOD 22‑01 requirements; if mitigation cannot be completed within the required timeframe, remove or isolate the asset from agency networks.
- Coordinate with enterprise risk, network engineering, and change management to ensure that required patches are deployed within the directive’s mandatory timelines.
Broader implications and risk analysis
Adding these SD‑WAN CVEs to the KEV Catalog underscores several broader trends in adversary targeting and defensive gaps.- Attackers focus increasingly on management and control infrastructure. Compromise of those assets yields outsized impact relative to effort.
- Historically “internal” or “management” interfaces are now commonly exposed — sometimes deliberately for remote management, sometimes accidentally — creating an attack surface that must be tightly controlled.
- Vulnerability lifecycle friction persists: even when patches are available, organizational constraints often delay remediations, leaving high‑value targets exposed.
- Detection is difficult. A well‑crafted configuration change or a new peer can blend into legitimate administrative activity; strong logging, baselining, and out‑of‑band verification are crucial.
Recommended 10‑point action checklist (for immediate use)
- Inventory — Identify all Cisco Catalyst SD‑WAN Controller, Manager, and associated devices.
- Version check — Map installed versions to Cisco’s affected/fixed release tables.
- Patch — Plan and apply vendor‑recommended updates immediately; treat KEV entries as high‑priority.
- Isolate — Remove internet exposure for management planes until patched.
- Restrict — Apply ACLs or VPN gating to limit management access to trusted IPs.
- Audit — Search admin logs for suspicious publickey acceptances and anomalous config changes.
- Rotate — Reset administrative credentials and reissue keys/certificates post‑remediation.
- Detect — Deploy monitoring rules for abnormal peer additions, config pushes, and control‑plane anomalies.
- Validate — Verify integrity of configuration and device file systems for signs of tampering.
- Report — If federal, update CDM/CyberScope as required; if compromised, involve vendor TAC and your incident response team.
Final analysis: act now, assume compromise, plan for resilience
The addition of CVE‑2022‑20775 and CVE‑2026‑20127 to CISA’s KEV Catalog is a clear, actionable warning: SD‑WAN control and management planes are being targeted and, in at least some cases, successfully exploited. For network operators and security teams the calculus is straightforward — the risk (complete control of your WAN fabric) far outweighs the operational pain of patching and hardening.Start with discovery and immediate isolation where possible, prioritize vendor‑provided fixes, and then move to verification and remediation of any suspected compromises. Importantly, treat management and control infrastructure with the same — or greater — urgency you would assign to internet‑facing servers: these systems are, in the modern enterprise, mission‑critical security choke points.
CISA’s KEV mechanism exists to force timely action; organizations that treat these additions as “optional” invite attackers to leverage widely trusted network management tools as their most effective attack vectors. Remediate now, harden the management plane, and bake SD‑WAN security into your ongoing change and asset‑management processes to prevent the next KEV addition from becoming an operational crisis.
Source: CISA CISA Adds Two Known Exploited Vulnerabilities to Catalog | CISA