TLDRs;
-
Cisco confirms hackers exploited a high-severity SD-WAN bug since 2023 across major networks
-
US UK and allies warn organizations globally to patch vulnerable Cisco systems immediately
-
Hackers may target vital infrastructure sectors including power grids and transportation networks
-
CSCO stock dips slightly as investors weigh risks from prolonged security vulnerabilities
Cisco (NASDAQ: CSCO) shares edged lower this week as the tech giant confirmed that hackers have been exploiting a critical flaw in its networking products for at least three years.
The vulnerability, found in Cisco’s Catalyst SD-WAN solutions, allows attackers to gain complete control of affected systems, prompting global cybersecurity warnings and urgent patching directives.
Investors reacted cautiously, with the stock seeing modest declines amid concerns over the ongoing threat and its potential impact on enterprise clients.
Persistent Threat Discovered Since 2023
Cisco’s security team traced evidence of active exploitation back to 2023, indicating that attackers have been silently infiltrating networks for years. The bug carries a maximum severity score of 10.0, meaning it poses a critical risk to organizations that rely on the affected systems. Catalyst SD-WAN products, widely used by corporations and government agencies to link multiple offices, have been the primary target.
By leveraging this flaw, hackers can obtain administrator-level access and remain hidden inside networks for extended periods, potentially spying on or stealing sensitive data. The long-running nature of the exploit has raised alarm among security experts and federal agencies.
Governments Urge Immediate Action
Following Cisco’s disclosure, multiple governments, including the United States, United Kingdom, Australia, Canada, and New Zealand, issued alerts emphasizing that the threat is active worldwide. In the U.S., the Cybersecurity and Infrastructure Security Agency (CISA) ordered all civilian federal agencies to patch their systems by end-of-day Friday, citing an unacceptable risk to federal operations.
Although the attacks have not been linked to any specific nation-state or threat group, one cluster of activity has been labeled UAT-8616 by investigators. Authorities stressed that both private and public organizations need to implement security updates immediately to prevent further intrusion.
Critical Infrastructure at Risk
Cisco indicated that some of the compromised organizations operate in critical infrastructure sectors, though the company did not specify which ones. These sectors could include energy, water supply, transportation, or communications. Experts warn that unpatched networks in such industries could allow attackers to disrupt essential services or exfiltrate sensitive operational data.
The revelation has amplified concerns about cybersecurity preparedness, highlighting that high-profile enterprise systems can remain vulnerable for years without detection.
Stock Impact and Market Reactions
Market analysts noted that the ongoing vulnerability could have reputational and financial implications for Cisco, although the company’s proactive disclosure and patching efforts may help mitigate investor worries. The stock’s minor decline reflects caution but also confidence that timely remediation will prevent major operational fallout.
This incident follows a similar situation in December when Cisco warned of a separate 10.0-rated vulnerability affecting its Async software. That flaw was also actively exploited, underscoring a broader challenge for the company in safeguarding enterprise networks.
Investors and IT teams alike are now watching closely to see how swiftly patches are implemented and whether any additional exploits surface in the coming weeks.


