
Handala Threat Group
An Iranian aligned threat group conducting destructive and espionage focused cyber operations against organizations in Israel and Western countries.

CVE-2026-20127 is an improper authentication vulnerability impacting Cisco Catalyst SD-WAN Controller, formerly vSmart, and SD-WAN Manager, formerly vManage, components. The two solutions respectively serve as the centralized control plane and centralized management plane for software-defined wide area networks (SD-WANs). The vulnerability has a maximum Common Vulnerability Scoring System version 3.1 (CVSSv3.1) score of 10.0 due to low attack complexity, remote exploitation possibility, lack of user interaction and a high impact on confidentiality, availability and integrity.
Intel 471’s Vulnerability Intelligence team identified 2,675 exposed Cisco SD-WAN instances worldwide, but no publicly available proof of concept (PoC) or exploit was observed at the time of this report. We assess CVE-2026-20127 is more likely to be weaponized by sophisticated financially motivated and state-sponsored actors due to the unavailability of technical details about the vulnerability.
Cisco Talos disclosed the vulnerability is under active exploitation in the wild. This activity is consistent with the trend of targeting vulnerabilities in security network edge routing devices at the perimeter to gain initial access and establish persistence.

On Feb. 25, 2026, Cisco published a security advisory to address a critical improper authentication vulnerability tracked as CVE-2026-20127, which impacts the Catalyst SD-WAN Controller and Catalyst SD-WAN Manager products. Successful exploitation allows an attacker to log in as a highly privileged user with access to modify Network Configuration Protocol (NETCONF) configurations. With access to NETCONF, an attacker could add a rogue peer to the SD-WAN management plane or channel the CVE-2022-20775 path traversal vulnerability to escalate privileges on vulnerable instances. Cisco has observed exploitation of CVE-2026-20127 as a zero-day since 2023 and attributed observed initial exploitation and post-compromise activity to the UAT-8616 activity cluster. This cluster was assessed as highly sophisticated but limited information is available at the time of this report.
The same day the vulnerability was disclosed, security researchers at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-20127 and CVE-2022-20775 to its Known Exploited Vulnerabilities (KEV) catalog and advised agencies to address the vulnerabilities in two days.
We observed 2,675 exposed Cisco SD-WAN instances as of Feb. 27, 2026.

Figure 1: The image depicts discovered internet-exposed instances of Cisco SD-WAN as of Feb.27, 2026.
Following exploitation of CVE-2026-20127 to obtain initial access, adversaries exploited CVE-2022-20775 to escalate privileges via a path traversal bug that exists on the confd_cli_grp binary. Execution of this binary is controlled via the set user ID (SUID) permission, a special Unix file attribute that allows an executable to run with the file owner’s privileges rather than those of the invoking user. This mechanism is typically used when a program must perform administrative tasks requiring elevated privileges. However, it is also commonly abused by adversaries for privilege escalation.
The confd_cli_grp binary is used to establish a command-line interface (CLI) session with the confd service, a configuration management daemon responsible for enforcing authentication and access control on the device. During session initialization, user-related parameters such as the user ID (UID) and group ID (GID) are supplied and validated. These parameters, along with additional authentication metadata, are cryptographically protected using a secret key stored in the confd_ipc_secret file.
While creating the CLI session, confd_cli_grp reads a file whose path is constructed after the concatenation of a fixed directory path with a username variable value, as illustrated in the following pseudocode:

An adversary can manipulate the value of the username variable through environment variables, such as $USER, if the application relies on it without proper validation. For example, instead of a legitimate value such as “USER=admin,” the attacker may supply a crafted value containing directory traversal sequences, such as “USER=../../../../../tmp/foo.” Because the application constructs the file path through direct string concatenation without sanitizing the input, the filesystem interprets the traversal patterns “../” and causes it to escape the intended directory. As a result, the aforementioned function examines the following path:

If not properly sanitized, this allows a path traversal condition in which the binary reads files outside the intended directory. As the binary executes with elevated SUID privileges, this behavior may enable attackers to access or influence sensitive files, potentially leading to privilege escalation. This is the scenario proposed in the PoC code analyzed in this report and explained below:
We observed a threat actor shared an open source article about the vulnerability; however, we assess this likely is a bot operating on a forum that regularly shares information about notable events and vulnerabilities of interest. We assess the lack of further discussion is due to the unavailability of technical details about the vulnerability. In conclusion, CVE-2026-20127 is more likely to be weaponized by sophisticated financially motivated and state-sponsored actors.
Cisco Talos and Australian Signals Directorate (ASD) investigators reported details of a successful intrusion the UAT-8616 cluster conducted.
The threat cluster UAT-8616’s observed initial and post exploitation activity includes:

CVE-2026-20127 carries a maximum CVSSv3.1 score of 10.0, reflecting the vulnerability’s remote exploitability, absence of required authentication and lack of user interaction, collectively indicating a high and reliable potential for initial access. While underground activity remains low and no public exploit code or PoC was observed at the time of this report, these factors should not be interpreted as a reduced threat level as a highly sophisticated threat cluster leveraged this vulnerability for about three years to obtain initial access into high-value organizations, including entities operating with critical infrastructure.
The consequences of successful exploitation extend well beyond initial access. Observed intrusion demonstrates a deliberate and methodical post-exploitation chain. The actor escalated to root, established persistent access through local accounts and SSH keys and deleted any forensics artifacts generated in the various log files. We assess the likelihood of continued exploitation as medium to low given the absence of publicly available exploits and limited interest within the underground community at the time of this report.
For entities using vulnerable products, we recommend immediate prioritization for remediation with guidelines available in the “Mitigations, recommendations” and “Observed post-exploitation activity” sections of this report.
Cisco released patches that addressed the vulnerabilities impacting SD-WAN. Intel 471 recommends the following steps to mitigate, prevent and detect exploitation of Cisco SD-WAN:


Intel 471’s Intelligence collates the most prevalent threats and vulnerabilities observed in the cyber underground, providing expert context and analytical assessment to help security teams prioritize the most significant vulnerabilities.

An Iranian aligned threat group conducting destructive and espionage focused cyber operations against organizations in Israel and Western countries.

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.