Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Interpol Nets 94 Arrests in Major Cybercrime Sweep

March 13, 2026

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

March 13, 2026

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026
Facebook X (Twitter) Instagram
Friday, March 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
News

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

Team-CWDBy Team-CWDMarch 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild.

The vulnerabilities in question are listed below –

  • CVE-2026-20122 (CVSS score: 7.1) – An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. Successful exploitation requires the attacker to have valid read-only credentials with API access on the affected system.
  • CVE-2026-20128 (CVSS score: 5.5) – An information disclosure vulnerability that could allow an authenticated, local attacker to gain Data Collection Agent (DCA) user privileges on an affected system. Successful exploitation requires the attacker to have valid vManage credentials on the affected system.

Patches for the security defects, along with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, were released by Cisco late last month in the following versions –

  • Earlier than Version 20.91 – Migrate to a fixed release.
  • Version 20.9 – Fixed in 20.9.8.2
  • Version 20.11 – Fixed in 20.12.6.1
  • Version 20.12 – Fixed in 20.12.5.3 and 20.12.6.1
  • Version 20.13 – Fixed in 20.15.4.2
  • Version 20.14 – Fixed in 20.15.4.2
  • Version 20.15 – Fixed in 20.15.4.2
  • Version 20.16 – Fixed in 20.18.2.1
  • Version 20.18 – Fixed in 20.18.2.1

“In March 2026, the Cisco PSIRT became aware of active exploitation of the vulnerabilities that are described in CVE-2026-20128 and CVE-2026-20122 only,” the networking equipment major said. The company did not elaborate on the scale of the activity and who may be behind it.

In light of active exploitation, users are recommended to update to a fixed software release as soon as possible, and take steps to limit access from unsecured networks, secure the appliances behind a firewall, disable HTTP for the Catalyst SD-WAN Manager web UI administrator portal, turn off network services like HTTP and FTP if not required, change the default administrator password, and monitor log traffic for any unexpected traffic to and from systems.

The disclosure comes a week after the company said a critical security flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Manager (CVE-2026-20127, CVSS score: 10.0) has been exploited by a highly sophisticated cyber threat actor tracked as UAT-8616 to establish persistent footholds into high-value organizations.

The pace of the exploitation efforts have since escalated quickly. Ryan Dewhurst, watchTowr’s head of proactive threat intelligence Ryan Dewhurst, told The Hacker News that the preemptive exposure management platform has witnessed attack attempts from numerous unique IP addresses and observed threat actors deploying web shells.

“The largest spike in activity occurred on March 4, with attacks widely spread across various regions worldwide, and U.S.-based areas saw slightly higher activity than others,” Dewhurst added. “We expect activity to continue as part of the typical long tail of exploitation, as more threat actors become involved. With mass and opportunistic exploitation at play, any exposed system should be considered compromised until proven otherwise.”

This week, Cisco also released updates to address two maximum-severity security vulnerabilities in Secure Firewall Management Center (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary Java code as root on an affected device.

(The story was updated after publication on March 9, 2026, to clarify that the exploitation activity detected by watchTowr targeted CVE-2026-20127, and not CVE-2026-20122 and CVE-2026-20128 as previously stated.)



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhat CISOs Should Know (And Do) About OpenClaw
Next Article Interpol Nets 94 Arrests in Major Cybercrime Sweep
Team-CWD
  • Website

Related Posts

News

Interpol Nets 94 Arrests in Major Cybercrime Sweep

March 13, 2026
News

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

March 13, 2026
News

Law Enforcement Dismantles SocksEscort Proxy Network

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.