Cisco Warns of Active Cyberattacks Targeting Two SD-WAN Manager Vulnerabilities

Networking giant Cisco has confirmed that two security vulnerabilities affecting its Catalyst SD-WAN Manager platform are currently being actively exploited by attackers in real-world cyberattacks. The company issued an advisory urging organisations using the software to apply security updates immediately to reduce the risk of compromise.

The vulnerabilities, tracked as CVE-2026-20122 and CVE-2026-20128, impact the Cisco Catalyst SD-WAN Manager, previously known as SD-WAN vManage, a system widely used by enterprises to manage and control distributed networks. Cisco revealed that its Product Security Incident Response Team became aware in March 2026 that both flaws were being actively exploited in the wild.

Details of the Vulnerabilities

The first vulnerability, CVE-2026-20122, carries a CVSS severity score of 7.1 and is described as an arbitrary file overwrite vulnerability. This flaw could allow an authenticated remote attacker to overwrite files on the local file system of the affected device. However, exploitation requires the attacker to already possess valid read-only credentials with API access on the system.

The second flaw, CVE-2026-20128, has a CVSS score of 5.5 and is categorized as an information disclosure vulnerability. If exploited, it could enable an authenticated local attacker to gain Data Collection Agent (DCA) user privileges within the system. In this case, the attacker must already have legitimate vManage credentials on the affected device.

Although Cisco confirmed the active exploitation of these vulnerabilities, the company has not disclosed the scale of the attacks or the identity of the threat actors behind them.

Security Updates and Fixed Versions

Cisco released patches for these vulnerabilities along with several related flaws, including CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, in software updates published late last month.

Organisations running vulnerable versions are advised to upgrade to the following fixed releases:

  • Versions earlier than 20.9.1 – migrate to a supported fixed release
  • Version 20.9 – fixed in 20.9.8.2
  • Version 20.11 – fixed in 20.12.6.1
  • Version 20.12 – fixed in 20.12.5.3 and 20.12.6.1
  • Versions 20.13, 20.14, 20.15 – fixed in 20.15.4.2
  • Version 20.16 – fixed in 20.18.2.1
  • Version 20.18 – fixed in 20.18.2.1

Applying these updates is considered essential for organisations operating SD-WAN environments, as the platform typically sits at the centre of enterprise network management systems.

Broader Security Concerns

The disclosure comes shortly after Cisco warned about another critical security flaw in Catalyst SD-WAN Controller and Manager, identified as CVE-2026-20127, which carries the maximum CVSS score of 10.0. That vulnerability has reportedly been exploited by a sophisticated threat actor known as UAT-8616 to gain persistent access to networks belonging to high-value organisations.

In addition, Cisco recently released patches for two maximum-severity vulnerabilities in Secure Firewall Management Centre—CVE-2026-20079 and CVE-2026-20131—that could allow attackers to bypass authentication and execute arbitrary Java code with root-level privileges on affected devices.

Recommended Security Measures

To reduce exposure to these threats, Cisco has advised organisations to implement several security measures alongside installing patches. These include restricting access to management interfaces from unsecured networks, placing affected appliances behind firewalls, disabling the HTTP interface for the SD-WAN Manager web portal, and turning off unnecessary services such as HTTP or FTP if they are not required.

The company also recommends changing default administrator passwords and closely monitoring system logs for suspicious activity or unexpected traffic patterns.

As cyberattacks targeting network infrastructure continue to grow more sophisticated, security experts warn that timely patching and strict access controls remain critical for protecting enterprise networks from potential breaches.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch