• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisco confirms active exploitation of two catalyst sd wan manager vulnerabilities

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

You are here: Home / General Cyber Security News / Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
March 5, 2026

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild.

The vulnerabilities in question are listed below –

  • CVE-2026-20122 (CVSS score: 7.1) – An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. Successful exploitation requires the attacker to have valid read-only credentials with API access on the affected system.
  • CVE-2026-20128 (CVSS score: 5.5) – An information disclosure vulnerability that could allow an authenticated, local attacker to gain Data Collection Agent (DCA) user privileges on an affected system. Successful exploitation requires the attacker to have valid vManage credentials on the affected system.

Patches for the security defects, along with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, were released by Cisco late last month in the following versions –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • Earlier than Version 20.91 – Migrate to a fixed release.
  • Version 20.9 – Fixed in 20.9.8.2
  • Version 20.11 – Fixed in 20.12.6.1
  • Version 20.12 – Fixed in 20.12.5.3 and 20.12.6.1
  • Version 20.13 – Fixed in 20.15.4.2
  • Version 20.14 – Fixed in 20.15.4.2
  • Version 20.15 – Fixed in 20.15.4.2
  • Version 20.16 – Fixed in 20.18.2.1
  • Version 20.18 – Fixed in 20.18.2.1

Cybersecurity

“In March 2026, the Cisco PSIRT became aware of active exploitation of the vulnerabilities that are described in CVE-2026-20128 and CVE-2026-20122 only,” the networking equipment major said. The company did not elaborate on the scale of the activity and who may be behind it.

In light of active exploitation, users are recommended to update to a fixed software release as soon as possible, and take steps to limit access from unsecured networks, secure the appliances behind a firewall, disable HTTP for the Catalyst SD-WAN Manager web UI administrator portal, turn off network services like HTTP and FTP if not required, change the default administrator password, and monitor log traffic for any unexpected traffic to and from systems.

The disclosure comes a week after the company said a critical security flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Manager (CVE-2026-20127, CVSS score: 10.0) has been exploited by a highly sophisticated cyber threat actor tracked as UAT-8616 to establish persistent footholds into high-value organizations.

This week, Cisco also released updates to address two maximum-severity security vulnerabilities in Secure Firewall Management Center (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary Java code as root on an affected device.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «threatsday bulletin: ddr5 bot scalping, samsung tv tracking, reddit privacy ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
  • ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
  • Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
  • Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
  • Where Multi-Factor Authentication Stops and Credential Abuse Starts
  • APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
  • Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
  • FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
  • 149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
  • Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Copyright © TheCyberSecurity.News, All Rights Reserved.