April 22, 2026 Critical Vulnerabilities

Four Cisco SD-WAN Flaws Under Active Attack: What Australian Networks Must Patch Now

Between 20 and 21 April 2026, CISA added four Cisco Catalyst SD-WAN Manager vulnerabilities to its Known Exploited Vulnerabilities catalogue — and a sophisticated threat actor tracked as UAT-8616 is already chaining them together to seize full control of enterprise networks. Australian organisations running Cisco SD-WAN infrastructure have until Friday 24 April to act, and every hour of delay widens the window for attackers.

Disclosure: This post contains affiliate links. We only recommend tools we've researched and trust. If you purchase through our links, we may earn a commission at no extra cost to you.

Why Cisco SD-WAN Matters to Australian Organisations

Software-Defined Wide Area Networking (SD-WAN) has become the backbone of modern enterprise connectivity. Where older networks relied on fixed, hardware-defined routes, SD-WAN gives IT teams centralised, software-driven control over how traffic flows between headquarters, branch offices, data centres, and cloud services. It is cheaper, more flexible, and far easier to manage than legacy MPLS infrastructure — which is precisely why it has been adopted so rapidly across Australian government agencies, financial services firms, healthcare networks, universities, and large retailers.

Cisco's Catalyst SD-WAN Manager (formerly known as vManage) is the control plane for Cisco's market-leading SD-WAN solution. It sits at the very heart of the network: it is the single pane of glass through which administrators configure routing policies, apply security rules, push firmware updates to edge devices, and manage every connected site. Compromise the SD-WAN Manager, and an attacker effectively owns the keys to the entire enterprise network.

That is exactly what the newly disclosed vulnerabilities allow. And based on CISA's catalogue additions this week, attackers are not waiting for organisations to patch.

The Four CVEs: What Was Added and When

On 20 April 2026, CISA added three Cisco Catalyst SD-WAN Manager vulnerabilities to its KEV catalogue in a single batch update. The following day, 21 April, a fourth was added. Together they form a coherent attack chain that researchers at Cisco Talos have observed being exploited in the wild by a threat actor designated UAT-8616.

CVE-2026-20133 — Information Disclosure (CVSS: Medium)

This is the entry point for the attack chain, and CISA's addition of it on 21 April was the final piece of the puzzle. CVE-2026-20133 is an information disclosure vulnerability in the Cisco Catalyst SD-WAN Manager API. An unauthenticated remote attacker can send specially crafted requests to the management API and receive back sensitive configuration data from the underlying operating system — including file paths, system settings, and partial credential material.

While a CVSS score in the "medium" range might suggest it can wait, that assessment does not account for how it functions within a chained attack. CVE-2026-20133 is the reconnaissance layer: it gives an attacker everything they need to mount the next two stages. Federal agencies have a hard deadline of 24 April 2026 to resolve this flaw.

CVE-2026-20128 — Password Storage in Recoverable Format (CVSS: High)

Discovered alongside CVE-2026-20133, this vulnerability stems from a design flaw in how Cisco Catalyst SD-WAN Manager handles DCA (Device Credential Accounts) credentials. Rather than storing these credentials using a modern, irreversible hashing algorithm, the software stores them in a format that can be decoded by an attacker with API access.

In practice, an attacker who has already used CVE-2026-20133 to enumerate the API can then use CVE-2026-20128 to harvest valid administrator credentials without ever needing to brute-force or guess a password. This transforms a passive information leak into active credential theft — and those stolen credentials are then immediately usable in the third stage of the attack.

CVE-2026-20122 — Incorrect Use of Privileged APIs (CVSS: High)

This is the payload-delivery stage of the chain. CVE-2026-20122 arises from improper access controls in several privileged API endpoints within Cisco Catalyst SD-WAN Manager. An attacker who has obtained valid credentials — for example, by exploiting CVE-2026-20128 — can invoke these privileged endpoints to overwrite arbitrary files on the system and escalate their own access level to full vManage administrator.

With vManage admin access, an attacker can modify routing policies across every connected site, deploy malicious firmware to edge routers and WAN appliances, intercept or redirect traffic flows, and pivot laterally into the internal network. The blast radius is the entire organisation.

CVE-2026-20127 — The Earlier Flaw Still Being Exploited

This fourth vulnerability, which was actually added to the KEV catalogue slightly earlier, relates to another privilege escalation vector in Cisco Catalyst SD-WAN that Talos has linked to UAT-8616's toolset. While technical details remain partially redacted pending broader patching, Cisco has confirmed it was used alongside the above three in live intrusion campaigns. Patches are available; CISA's directive requires them applied immediately.

Who Is UAT-8616?

Cisco Talos first publicly named UAT-8616 in connection with Cisco SD-WAN exploitation, and their analysis paints a picture of a highly capable and patient threat actor. Unlike opportunistic attackers who simply scan the internet for exposed management interfaces, UAT-8616 demonstrates a deep understanding of Cisco's internal architecture — suggesting either significant reverse-engineering effort or access to insider knowledge of the platform's design.

Evidence collected by Talos indicates that UAT-8616's malicious activity stretches back at least three years to 2023, meaning they have been systematically developing SD-WAN exploitation capabilities long before these CVEs were publicly disclosed. This is characteristic of nation-state-level threat actors or highly sophisticated criminal organisations with nation-state backing.

The group's targets are consistent with espionage rather than ransomware: enterprise networks in critical infrastructure, government-adjacent organisations, financial institutions, and telecommunications providers. Australian organisations in these sectors should consider themselves specifically at risk, particularly given the intelligence-sharing context between Australia and the United States under the Five Eyes alliance.

The Australian Context: Why This Hits Hard Here

CISA's 20–21 April catalogue updates carry direct implications for Australian organisations, and not just because Cisco SD-WAN is ubiquitous. In February 2026, CISA and partner agencies — including Australia's own Australian Signals Directorate (ASD) — jointly released Emergency Directive 26-03 and accompanying Hunt and Hardening Guidance for Cisco SD-WAN Devices. That guidance was a strong signal that Five Eyes intelligence agencies were already aware of active exploitation affecting allied nations' networks.

The addition of four CVEs to the KEV catalogue within 48 hours this week is the escalation point: what was a targeted threat in February has become a broad-based exploitation campaign. Any organisation in Australia that is running Cisco Catalyst SD-WAN Manager without the February patches applied is, at this point, a sitting target.

The sectors of greatest concern in Australia include:

Immediate Action Steps for Australian Organisations

If your organisation uses Cisco Catalyst SD-WAN Manager, the following steps are non-negotiable. CISA's remediation deadline for US federal agencies is 24 April 2026 — but given that ASD has been aligned with CISA's SD-WAN guidance since February, Australian government organisations should treat the same deadline as authoritative.

1. Apply All Available Patches Immediately

Cisco has released patches addressing all four CVEs. Check your Catalyst SD-WAN Manager version and upgrade to the latest patched release. Do not wait for your next scheduled maintenance window — the active exploitation status of these vulnerabilities means every day without patches is a day you are potentially compromised without knowing it.

2. Audit API Exposure

CVE-2026-20133 is an unauthenticated API vulnerability, which means it only requires network-level access to the management interface. Audit whether your SD-WAN Manager's API is accessible from the internet or from untrusted network segments. If it is, restrict access to trusted administrative IP ranges immediately, even before patching is complete. This does not eliminate the vulnerability but significantly narrows the attack surface.

3. Hunt for Indicators of Compromise

Refer to CISA's Hunt and Hardening Guidance for Cisco SD-WAN Devices (available via cyber.gov.au and cisa.gov) for specific indicators of compromise associated with UAT-8616. Check SD-WAN Manager logs for anomalous API calls, unexpected authentication events, and configuration changes that were not initiated by known administrators. Given that UAT-8616 has been active since at least 2023, assume you may be looking for intrusion artefacts that are months or years old.

4. Rotate All Credentials Associated with SD-WAN

Even if you have not confirmed a compromise, the nature of CVE-2026-20128 — which exposes DCA credentials in a recoverable format — means that credentials stored on an unpatched system should be treated as potentially stolen. Rotate all service account passwords and API keys associated with your SD-WAN deployment immediately after patching.

5. Harden Remote Access for Network Administrators

Network administrators who manage SD-WAN infrastructure often do so remotely, particularly in distributed organisations. If your team accesses the vManage console from home networks or over public internet connections, ensure those connections are themselves secured. Using a hardened VPN with strong encryption is essential — tools like NordVPN, with its military-grade AES-256 encryption and no-logs policy, ensure that administrator credentials and session data cannot be intercepted in transit, even if the underlying network infrastructure is under threat.

For SMBs Not Running SD-WAN: You Are Still Affected

Not every Australian organisation runs Cisco Catalyst SD-WAN — but the exploitation of enterprise network infrastructure at this scale has downstream effects that reach smaller businesses as well. MSPs and telecommunications providers that manage connectivity for small and medium businesses frequently use SD-WAN internally, meaning a compromised provider could expose client networks through no fault of the client's own.

If your business relies on a managed network service, now is the time to contact your provider and ask directly: are you running Cisco Catalyst SD-WAN Manager, and have you applied the patches released in response to CVE-2026-20122, CVE-2026-20128, CVE-2026-20127, and CVE-2026-20133? A responsible provider should be able to confirm patching status immediately.

For remote workers and employees who connect to corporate networks from home, an encrypted VPN tunnel is an important backstop. If your organisation's network infrastructure is compromised, a VPN ensures your local traffic cannot be captured or redirected by an attacker who has gained a foothold in the SD-WAN controller. Australian users looking for an affordable, full-featured option should consider PureVPN, which maintains local Australian servers for low-latency connections and operates under a verified no-logs policy.

The Broader Pattern: SD-WAN as an Attack Surface

These four CVEs are not an aberration — they are part of an accelerating trend. Network control planes have become one of the most prized targets for sophisticated threat actors, precisely because compromising the controller is far more efficient than compromising individual endpoints. Rather than deploying malware on hundreds of workstations, a single successful attack on the SD-WAN Manager gives an attacker the ability to manipulate the entire network simultaneously.

Security researchers have warned for several years that the rapid adoption of SD-WAN technology outpaced the security scrutiny applied to it. Many organisations deployed SD-WAN primarily for its cost and operational benefits without fully evaluating the security implications of centralising network control into a software platform. The UAT-8616 campaign is, in many respects, the predictable consequence of that oversight.

The lesson for Australian security teams is to apply the same rigorous scrutiny to network management infrastructure as you would to any externally facing system. SD-WAN managers should be treated as critical assets, with strict access controls, regular patch cycles, active log monitoring, and network segmentation to limit their blast radius if compromised.

What to Expect Next

Cisco Talos has indicated that their investigation into UAT-8616 is ongoing, and further technical indicators and attribution details are expected in coming weeks. CISA may add additional Cisco SD-WAN related CVEs to the KEV catalogue as the investigation progresses — the current batch of four may not be the complete picture of what UAT-8616 has been exploiting.

Australian organisations should also monitor the ASD's cyber.gov.au alerts page for any formal ACSC advisory that mirrors or extends the CISA guidance. In recent months, the ACSC has consistently issued local advisories within 24–48 hours of CISA catalogue updates that have significant relevance to Australian infrastructure. Such an advisory is likely imminent if it has not already been published by the time you read this.

In the meantime, the priority is clear: patch, audit, rotate credentials, and restrict access. The SD-WAN vulnerabilities disclosed this week are among the most operationally significant of 2026 so far — not because any individual CVE has a sky-high CVSS score, but because they work together to hand an attacker complete control of your enterprise network. That is a risk no Australian organisation can afford to leave open.

Stay Protected

Check out our recommended security tools to protect your digital life today.