Introduction
This document describes steps to identify and fix critical security vulnerabilities in SD-WAN based on PSIRT advisories dated Feb 25, 2026.
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
- Cisco Catalyst SD-WAN architecture and control components (vManage, vSmart, vBond)
- Cisco Catalyst SD-WAN upgrade procedure
- Cisco TAC case management and admin-tech collection procedures
Components Used
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Background Information
For detailed background information and the latest updates, refer to the official PSIRT advisory page.
These advisories are available at these links:
These defects are addressed by these PSIRT advisories:
Remediation Workflow Overview
Note: All SD-WAN deployments are vulnerable and require immediate action. However, not all systems show evidence of compromise.
Required Action: Open a Cisco TAC case to address this security advisory.
TAC is available to:
- Assess your environment for indicators of compromise
- Guide you through the appropriate remediation path based on the assessment
- Work with the PSIRT team if indicators of compromise are identified
- Provide upgrade guidance and support if no indicators of compromise are detected
- Collect Admin-Techs - Run admin-tech on all control components (vSmart, vManage, vBond). vSmart admin-techs must not be run simultaneously — run them one at a time. All others can be collected in any order. Select Log and Tech options. Core is not required.
- Open TAC Case - Contact Cisco TAC and provide all Control Component Admin-tech log bundles
- TAC Assessment - TAC assesses your environment for indicators of compromise
- Execute Remediation - Complete the specific process provided by TAC
Step 1: Collect Admin-Tech Files from All Control Components
Required: Collect admin-tech files from all control components before opening your TAC case. This is essential for TAC to assess your environment.
Collection:
Note: For admin-tech generation, select Log and Tech options. Core is not required.
- Run admin-tech on ALL Controllers (vSmarts) - do not run these simultaneously; collect one at a time
- Run admin-tech on ALL Managers (vManages)
- Run admin-tech on ALL Validators (vBonds)
Note: vSmart admin-techs must not be run simultaneously — collect them one at a time. Admin-techs for Managers and Validators can be collected in any order.
Collect an Admin-Tech in SD-WAN Environment and Upload to TAC Case
Note: TAC analyzes these files to assess your environment for indicators of compromise and guide the appropriate remediation path.
Alternative: Manual Verification (Only if Admin-Tech Cannot Be Collected)
For those who cannot share admin-tech files, manual verification steps are available. These steps provide preliminary indicators that must be documented and shared with TAC.
See the "Manual Verification Steps" section at the end of this document for detailed procedures. Document all findings and provide them to TAC in your support case.
Step 2: Open a TAC Case and Upload Admin-Tech Files
After collecting all admin-tech files from Step 1, open a Cisco TAC support case.
Required Actions:
- Open a TAC case with severity level appropriate to your business impact
- Upload ALL admin-tech log bundles collected in Step 1 (Controllers, Managers, and Validators)
- Reference the PSIRT advisories
- Wait for TAC assessment and guidance
Caution: TAC determines the status of your system and recommends appropriate next steps.
Do not attempt further steps without TAC guidance
Step 3: TAC Assessment
TAC analyzes the uploaded admin-tech files and determines the status of your system.
During this time:
- Wait for an official assessment from TAC before taking any action
- TAC contacts you with their findings and next steps
Step 4: Execute Remediation (TAC-Guided)
TAC guides you through the appropriate remediation process based on their assessment. Complete all instructions provided by TAC.
Path A: No Indicators of Compromise Found — Upgrade
If TAC confirms there is no evidence of compromise, upgrade to the fixed software version. Select the appropriate version from the Fixed Software Versions table in this document and reference the upgrade guide linked in this section.
Warning: Upgrade must remain within your current major release. Do not upgrade to a higher major release without explicit TAC guidance.
Upgrade SD-WAN Controllers with the Use of vManage GUI or CLI
Path B: Indicators of Compromise Identified — PSIRT-Guided
If TAC confirms indicators of compromise are present, they engage the PSIRT team to develop a customized remediation strategy specific to your environment. Complete all guidance provided by TAC and PSIRT.
Fixed Software Versions
These software releases contain fixes for the identified vulnerabilities:
| Applies to Current Versions |
Fixed Version |
Available Software |
| 20.3, 20.6, 20.9 |
20.9.8.2 * |
20.9.8.2 upgrade images for vManage, vSmart, and vBond |
| 20.10, 20.11, 20.12.5 and earlier in 20.12 |
20.12.5.3 |
20.12.5.3 upgrade images for vManage, vSmart, and vBond |
| 20.12.6 |
20.12.6.1 |
20.12.6.1 upgrade images for vManage, vSmart, and vBond |
| 20.13, 20.14, 20.15.x |
20.15.4.2 |
20.15.4.2 upgrade images for vManage, vSmart, and vBond |
| 20.16, 20.17, 20.18.x |
20.18.2.1 |
20.18.2.1 upgrade images for vManage, vSmart, and vBond |
Note: For customers on CDCS (Cisco-Hosted Cluster), 20.15.405 is also a fixed release. This applies specifically to the Cisco-hosted cluster deployment and is handled separately from the standard upgrade path.
* If you are on release 20.9 or earlier: The fixed software for your release (20.9.8.2) is available on 2/27. Cisco recommends remaining within your current major release and waiting for the 20.9.8.2 release rather than upgrading to a higher major release (20.12, 20.15, 20.18). If you are currently in a version lower than 20.9, wait for 20.9.8.2 to upgrade there. Continue to work with TAC and check back on 2/27 for the available software link.
Important References:
Appendix: Manual Verification Steps (Only if Admin-Tech Collection is Not Possible)
Note: Admin-tech collection is the preferred and recommended method. Only use manual verification if you absolutely cannot collect and share admin-tech files. If you cannot collect admin-tech files, use these manual steps to gather preliminary indicators for TAC.
Note:
- These steps provide preliminary data only
- Admin-tech collection is strongly preferred for accurate assessment
- Document your findings and share them with TAC in your support case
- TAC makes the official assessment determination
Requirements: These steps must be performed on all control components.
Verification 1: Check for Unauthorized SSH Logins in Auth Logs
Step 1: Identify Valid vManage System IPs
Access each vSmart controller and execute:
west-vsmart# show control connections | inc "vmanage|PEER|IP"
Example output:
PEER PEER
PEER PEER PEER SITE DOMAIN PRIV PEER PUB PEER
INDEX TYPE PROT SYSTEM IP ID ID PRIVATE IP PORT PUBLIC IP PORT ORGANIZATION REMOTE COLOR STATE UPTIME
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
0 vmanage dtls 10.1.0.18 101018 0 10.1.10.18 12346 10.1.10.18 12346 calo-auto-lab default up 5:17:27:22
Step 2: Build Regular Expression String (vBond and vSmart only)
Combine all system IPs from Step 1 into an OR regex pattern:
system-ip1|system-ip2|...|system-ipn
Step 2b: Additional Step for vManage Systems
If running these commands on vManage itself, append the localhost IP (127.0.0.1), local system IP, all cluster IPs, and the VPN 0 transport interface IP to the regex:
system-ip1|system-ip2|...|system-ipn|127.0.0.1|<local-system-ip>
To find the local vManage system IP, use:
show control local-properties
To find the VPN 0 transport interface IP and cluster IP, use:
show interface | tab
Step 3: Execute Verification Command
Run this command, replacing REGEX with your regex string from Step 2:
west-vsmart# vs
west-vsmart:~$ zgrep "Accepted publickey for vmanage-admin from " /var/log/auth.log* | grep -vE "\s(REGEX)\s"
Note: This command filters authentication logs to show only vmanage-admin logins from unexpected sources. Legitimate logins must only originate from vManage related IPs.
Step 4: Interpret Results and Document for TAC
If NO output is displayed:
- No indicators of compromise detected on this device
- Document this result for your TAC case
- Continue assessment on remaining controllers
If log lines are printed:
- Carefully examine each IP address shown
- Verify the IP is not related to vManage infrastructure (cluster IP, old system IP, or similar)
- If you cannot identify the source IP as legitimate, this can indicate potential indicators of compromise
- The log entry shows a timestamp and source IP address
- Document all findings and open a TAC case immediately
- Include the log entries, timestamps, and source IPs in your case
- TAC performs the official assessment determination
Verification 2: Check for Unauthorized Peer Connections in Controller Syslogs
This command extracts all peer-type and peer-system-ip pairs from controller syslog files and outputs them as a list for you to review. It does not automatically flag suspicious entries — you must inspect the output and determine whether each peer system IP is a known, legitimate part of your SD-WAN infrastructure. Run this on all control components (Controllers, Managers, and Validators).
Step 1: Run the command on each control component:
First, access vshell and navigate to the log directory:
vs
cd /var/log
Then run the this command:
awk '{
match($0, /peer-type:([a-zA-Z0-9]+)[^ ]* peer-system-ip:([0-9.:]+)/, arr);
if(arr[1] && arr[2]) print "(" arr[1] ", " arr[2] ")";
}' vsyslog* | sort | uniq
Step 2: Interpret Results and Document for TAC
If output only shows known vManage/vSmart/vBond system IPs:
- No indicators of compromise detected from this check
- Document this result for your TAC case
- Continue assessment on remaining control components
If output contains unrecognized peer system IPs:
- Carefully examine each IP address and peer-type shown
- Verify the IP is not related to your known SD-WAN control plane infrastructure
- If you cannot identify the source IP as legitimate, this can indicate potential indicators of compromise
- Document all findings and open a TAC case immediately
- Include the full command output with peer-type and peer-system-ip pairs in your case
- TAC performs the official assessment determination
Frequently Asked Questions
Q: What is the first step to address this security advisory? A: Collect admin-tech files from all control components and open a TAC case to upload the files. TAC assesses your environment and provides guidance on next steps.
Q. What version should I upgrade to? A. Please upgrade to the nearest fixed version at the earliest.
Q: Do I need to collect admin-techs from all control components? A: Yes, TAC requires admin-tech files from all Controllers (vSmart, collected one at a time), all Managers (vManage), and all Validators (vBond) to properly assess your environment.
Q: How does TAC determine if my system has been compromised? A: TAC analyzes the admin-tech files using specialized tools to assess your environment for indicators of compromise.
Q: What happens if indicators of compromise are identified?
A: TAC engages the PSIRT team and contacts you to discuss next steps and guidance specific to your environment. Cisco does not perform the remediation on your behalf — TAC provides the guidance needed for you to proceed.
Q: How do I know which fixed software version to use?
A: Refer to the Fixed Software Versions table in this document. TAC confirms the appropriate version for your specific environment.
Q: Can I start the upgrade before TAC analyzes my admin-techs?
A: No, wait for TAC to complete their assessment and provide guidance before attempting any remediation actions.
Q: Is downtime expected during remediation?
A: The impact depends on your deployment architecture and the remediation path. TAC provides guidance on minimizing service impact during the process.
Q: Are the PSIRT fixes included in the upcoming 20.15.5 release and other upcoming releases?
A: Yes, fixes are included in 20.15.5 and other upcoming releases. However, the upgrade to mitigate the vulnerabilities outlined in this document must be prioritized IMMEDIATELY. (Do not wait!)
Q: Do all controllers need to be upgraded in case no indicators of compromise are found?
A: Yes, all SD-WAN control components (vManage, vSmart, and vBond) must be upgraded to a fixed software version. Upgrading only a subset of controllers is not sufficient.
Q: I have a cloud-hosted SD-WAN overlay. What are my options for upgrading?
A: For cloud-hosted overlays, customers have two options:
- Check if your environment is scheduled for an automated upgrade by navigating to SSP > Overlay Details > Change Windows.
- If you do not want to wait for the scheduled upgrade, you have two options:
Q: Do we need to upgrade the edge routers as well?
A: Cisco IOS XE devices are not affected by this advisory.
Q: We are a Cisco hosted overlay. Do we need to fix any ACLs or take action on SSP?
A: All Cisco-hosted customers are advised to review their own Allowed Inbound Rules seen on SSP and ensure only the necessary prefixes from your side are allowed. These rules are for management access only and that these rules do not apply for edge routers. Please review them in SSP > Overlay Details > Allow Inbound rules. Please note that port 22, 830 were always blocked by default on Day 0 provisioning by Cisco from outside to the cloud hosted controllers.
Q:We are on CDCS / Shared tenant. What version are we going to be upgraded to?
A: Based on the current version, the Shared Tenant or CDCS clusters are currently on schedule to be upgraded OR already upgraded to the fixed versions. Here are the shared tenant and CDCS fixed releases:
1. Early Adopter clusters => 20.18.2.1 (this is actually same as the standard release)
2. Recommend release clusters => 20.15.405 (CDCS specific version with PSIRT fixes)
CDCS customers dont need to take any action effectively to address this PSIRT.
Q: What are the general best practices or ways to reduce vulnerabilities for my SD-WAN overlay?
A: Refer to the Cisco Catalyst SD-WAN Hardening Guide for best practices and recommendations to reduce vulnerabilities in your SD-WAN overlay.