
Cisco SD‑WAN Compromised; CISA and Five Eyes Order Emergency Hunts
Context and Chronology
A coalition of Western cyber agencies publicly disclosed active exploitation of Cisco SD‑WAN appliances, identifying two distinct vulnerabilities and directing operators to begin immediate threat hunts and forensic preservation. CISA led the advisory and coordinated technical guidance with Five Eyes partners; the bulletin links to vendor mitigations and multi‑agency hunt playbooks. Vendor telemetry attributed campaign activity to an advanced actor tracked as UAT-8616, with indicators suggesting the group has reused similar intrusion patterns against network‑edge systems over multiple quarters.
Agencies warned that compromised SD‑WAN controllers and edge appliances can grant attackers sustained control over traffic flows, authentication handoffs, and routing logic — enabling covert eavesdropping, selective disruption, and lateral movement into connected estates. The published guidance combines Cisco’s technical advisory on privilege escalation with government hunt guides that provide detection queries, log‑collection recipes, and forensic steps to preserve volatile evidence.
The Cisco notice arrives amid a flurry of other active exploit events — including emergency fixes and KEV designations for different vendors and classes of equipment — that collectively shorten acceptable remediation windows for federal and critical infrastructure operators. Separately, CISA has been moving beyond single‑issue advisories: recent agency actions include accelerated remediation orders (KEV listings) and a binding timetable to inventory and remove unsupported internet‑facing edge devices. Those complementary policy levers mean agencies are using both immediate operational directives to stop in‑the‑wild attacks and longer‑term governance to eliminate recurring infrastructure risk.
Operationally, the advisory forces administrators to compress maintenance timelines: inventory exposed SD‑WAN instances, capture system images and extensive logs, apply vendor mitigations where feasible, and isolate management planes pending validation. These steps will divert SOC and network‑ops capacity toward live hunts and evidence preservation, increasing short‑term outage and change‑control friction for enterprises and federal networks alike.
From a defensive posture, the incident crystallizes a larger pattern: attackers are increasingly weaponizing management consoles, transit devices and legacy edge gear because those targets yield persistent, upstream access and longer dwell times than transient server compromises. Recent independent incidents — forced patches for Fortinet and a SolarWinds Web Help Desk RCE being added to KEV — reinforce that vendor fixes alone are rarely sufficient; compensating controls such as access restrictions, administrative‑plane isolation, and enhanced telemetry retention are vital.
Immediate practical steps that materially reduce risk are: treat every internet‑reachable management endpoint as compromised until proven otherwise; apply vendor security updates and configuration mitigations; preserve forensic artifacts (images, syslogs, configuration exports); implement temporary network controls (ACLs, firewall rules, segmentation) to block public management access; and prioritize hunts using shared IOCs and behavior‑based detection. Longer term, organizations should accelerate plans to replace unsupported edge hardware, integrate device‑level detection into change control, and consider managed telemetry services to shorten mean‑time‑to‑detect for appliance‑level intrusions.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Critical SolarWinds Web Help Desk Flaw Exploited; CISA Orders Rapid Patching
A critical unauthenticated remote code execution bug in SolarWinds Web Help Desk (WHD) rooted in AjaxProxy deserialization is being exploited in the wild and was added to CISA’s Known Exploited Vulnerabilities list, triggering compressed federal remediation deadlines. The listing arrived alongside other high-priority KEV additions this patch cycle, reinforcing that administrative consoles and legacy proxy components are high-risk and require immediate patching and network controls.
CISA orders federal agencies to inventory, patch and phase out unsupported edge devices
CISA has issued a binding directive requiring federal civilian agencies to identify, upgrade and remove internet-exposed edge devices that no longer receive vendor security updates, citing active exploitation by advanced threat actors. Agencies have staged deadlines — three months to inventory, 12 months to start removals and 18 months to finish decommissioning — with continuous monitoring required thereafter.

Fortinet pushes emergency patches after FortiCloud SSO zero‑day lets attackers cross account boundaries
Fortinet issued emergency fixes after attackers exploited a FortiCloud single‑sign‑on authentication bypass (CVE‑2026‑24858) to access devices across customer accounts; U.S. cyber authorities added the flaw to their Known Exploited Vulnerabilities list and set an urgent remediation date for federal agencies. The incident is part of a wider trend of rapid in‑the‑wild exploitation that compresses the window for defenders to patch and perform operational checks.

CISA Adds Five Bugs to KEV; Two Linux Flaws Draw Immediate Attention
CISA added five actively exploited vulnerabilities to its Known Exploited Vulnerabilities list, including two Linux issues and a Microsoft Office zero-day; agencies must remediate by Feb. 16, 2026 for the Office bug while operators should urgently inventory exposed Telnet services and apply available fixes or mitigations. Rapid in-the-wild activity—dozens of probes against a high-severity GNU Inetutils telnet authentication bypass—heightens the urgency for immediate patching, network controls, and telemetry-based detection.
Patch Rush, Penalties and Power Plays: This Week’s Cybersecurity Events
A fast-exploited Fortinet flaw and an agentic-AI vulnerability in ServiceNow forced urgent remediation, while telecoms, a university, and a logistics provider faced data and security crises that drew enforcement and public scrutiny. National agencies issued OT and zero-trust guidance and investors poured $136M into defense-focused software, highlighting shifting incentives toward resilience and regulatory accountability.

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
CISA added a high-severity vulnerability in TeamT5’s ThreatSonar (CVE-2024-7694) to its Known Exploited Vulnerabilities catalogue and required federal remediation by March 10, 2026. The bug allows unsafe file uploads that can be chained with elevated privileges to achieve remote command execution; a vendor patch was issued in August 2024 but evidence of in‑the‑wild exploitation has been reported.
Global cyber-espionage campaign breaches sensitive targets in 37 countries
A coordinated, long-duration hacking campaign has established persistent access to high-value government and diplomatic networks in 37 countries, prioritizing intelligence collection over immediate disruption. The operation leverages polymorphic tooling, credential harvesting and social-engineering techniques that complicate detection and raise urgent needs for identity-focused defenses and cross-border incident coordination.

Hackers Rapidly Exploit Critical BeyondTrust Remote-Access Flaw After PoC Emerges
A critical unauthenticated remote-code execution bug (CVE-2026-1731) in BeyondTrust Remote Support and Privileged Remote Access was probed and targeted within 24 hours of a public proof-of-concept, exposing thousands of internet-facing instances. Organizations should treat exposed BeyondTrust deployments as emergency patching and containment priorities, applying access restrictions, WAF/ACL rules, and focused threat-hunting while verifying remediation.