Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Cisco SD-WAN Zero-Days Let Attackers Breach Networks for Years
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Cisco SD-WAN Zero-Days Let Attackers Breach Networks for Years

Highlights

  • Attackers exploited Cisco SD-WAN vulnerabilities for at least three years undetected.

  • Authorities mandate urgent patching, auditing, and threat hunting in vulnerable systems.

  • Experts emphasize persistent, sophisticated tradecraft in these targeted cyber campaigns.

Ethan Moreno
Last updated: 26 February, 2026 - 3:21 am 3:21 am
Ethan Moreno 2 hours ago
Share
SHARE

For over three years, global threat actors have been secretly exploiting vulnerabilities in Cisco’s SD-WAN software, enabling unauthorized access to critical networks without detection. Despite the ongoing sophistication of cybersecurity tools, attackers managed to leverage these vulnerabilities to establish persistent footholds in high-value targets, including government agencies and infrastructure providers. The latest findings have prompted urgent action from multiple international authorities, highlighting the persistent challenges cybersecurity defenders face. Authorities stress the importance of systematic patching and monitoring, pointing out that some affected organizations may have difficulty fully remedying past breaches due to the duration of unmonitored activity.

Contents
How Did Cisco’s SD-WAN Vulnerabilities Get Exploited?What Action Are Authorities and Cisco Taking?How Does This Campaign Compare to Earlier Attacks?

When similar incidents involving Cisco edge technologies surfaced previously, detection lagged behind exploitation by more than a year, allowing attackers to operate undetected. Earlier attacks, which also used multiple zero-days, received emergency directives only after prolonged exposure, showing a recurring challenge in identifying these issues promptly. Comparing the current situation with prior cases reveals a consistent delay in both discovery and response—underscoring the systemic hurdles in threat intelligence sharing and vulnerability management across sectors.

How Did Cisco’s SD-WAN Vulnerabilities Get Exploited?

Security researchers identified two key zero-day vulnerabilities—CVE-2026-20127 and CVE-2022-20775—in Cisco’s SD-WAN software. Attackers first bypassed authentication with CVE-2026-20127, then downgraded the software to exploit CVE-2022-20775, enabling root-level access on targeted systems. This approach requires precise product knowledge and intent, as noted by Douglass McKee of Rapid7, who commented,

“That second step allows them to move from administrative control to root on the underlying operating system. That downgrade step shows deliberate knowledge of product versioning and patch history.”

What Action Are Authorities and Cisco Taking?

The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive, requiring all federal agencies to inventory and patch affected Cisco SD-WAN systems without delay. Joint guidance was released by CISA and its Five Eyes partners to help organizations detect compromises and harden network defenses. Cisco emphasized the need for immediate software upgrades, sharing that

“Customers should upgrade vulnerable software and closely follow advisory guidance to minimize exposure.”

The urgency of these measures reflects concerns that attackers may still be active on compromised networks.

How Does This Campaign Compare to Earlier Attacks?

This campaign follows a pattern observed in previous Cisco-related attacks, where adversaries used advanced techniques to avoid detection for extended periods. Both the current and earlier incidents involved zero-day vulnerabilities being used in the wild for over a year prior to public disclosure. Experts suggest the discipline and stealth shown signal objectives more consistent with espionage than financial theft, as attackers navigate patch histories and avoid raising alarms.

Organizations relying on Cisco SD-WAN solutions must approach security with awareness that advanced threat actors remain persistent and patient in maintaining access. Regular auditing, timely patching, and incident response readiness remain essential when dealing with high-value infrastructure. For those whose systems may already be compromised, rebuilding environments and reviewing historic logs for intrusions is advised. Swift information sharing and collaboration between security vendors, government agencies, and the private sector are key to minimizing the risk and scope of such sophisticated campaigns.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattackers Target Just 1% of 2025’s 40,000 New Vulnerabilities

CISA Faces Ongoing Strain as Staff Cuts and Leadership Delays Weigh Down Agency

Chinese Law Enforcement Officer Relies on ChatGPT for Cyber Operations

US Court Sends Ex-L3Harris Executive to Prison for Zero-Day Deal

Attackers Breach Networks in Minutes, CrowdStrike Warns

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Amazon Ends Maverick Games Publishing Deal, Refocuses on Luna Platform
Next Article Investors Fuel RLWRLD’s Expansion in Industrial Robotics

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Investors Fuel RLWRLD’s Expansion in Industrial Robotics
AI
Amazon Ends Maverick Games Publishing Deal, Refocuses on Luna Platform
Gaming
New York Takes Valve to Court Over Alleged Gambling in Games
Gaming
Ubisoft Leadership Shifts Move Assassin’s Creed Hexe in New Direction
Gaming
Tesla Sets End Date for Cybertruck AWD Launch Price
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?