HomeSample Page

Sample Page Title


Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Safety

Cisco Confirms Energetic Exploitation of Two Catalyst SD-WAN Supervisor Vulnerabilities

Cisco has disclosed that two extra vulnerabilities affecting Catalyst SD-WAN Supervisor (previously SD-WAN vManage) have come below energetic exploitation within the wild.

The vulnerabilities in query are listed beneath –

  • CVE-2026-20122 (CVSS rating: 7.1) – An arbitrary file overwrite vulnerability that would permit an authenticated, distant attacker to overwrite arbitrary information on the native file system. Profitable exploitation requires the attacker to have legitimate read-only credentials with API entry on the affected system.
  • CVE-2026-20128 (CVSS rating: 5.5) – An data disclosure vulnerability that would permit an authenticated, native attacker to achieve Information Assortment Agent (DCA) person privileges on an affected system. Profitable exploitation requires the attacker to have legitimate vManage credentials on the affected system.

Patches for the safety defects, together with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, had been launched by Cisco late final month within the following variations –

  • Sooner than Model 20.91 – Migrate to a hard and fast launch.
  • Model 20.9 – Mounted in 20.9.8.2
  • Model 20.11 – Mounted in 20.12.6.1
  • Model 20.12 – Mounted in 20.12.5.3 and 20.12.6.1
  • Model 20.13 – Mounted in 20.15.4.2
  • Model 20.14 – Mounted in 20.15.4.2
  • Model 20.15 – Mounted in 20.15.4.2
  • Model 20.16 – Mounted in 20.18.2.1
  • Model 20.18 – Mounted in 20.18.2.1

“In March 2026, the Cisco PSIRT turned conscious of energetic exploitation of the vulnerabilities which might be described in CVE-2026-20128 and CVE-2026-20122 solely,” the networking tools main stated. The corporate didn’t elaborate on the size of the exercise and who could also be behind it.

In mild of energetic exploitation, customers are advisable to replace to a hard and fast software program launch as quickly as potential, and take steps to restrict entry from unsecured networks, safe the home equipment behind a firewall, disable HTTP for the Catalyst SD-WAN Supervisor net UI administrator portal, flip off community companies like HTTP and FTP if not required, change the default administrator password, and monitor log visitors for any sudden visitors to and from techniques.

The disclosure comes every week after the corporate stated a crucial safety flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Supervisor (CVE-2026-20127, CVSS rating: 10.0) has been exploited by a extremely subtle cyber menace actor tracked as UAT-8616 to determine persistent footholds into high-value organizations.

This week, Cisco additionally launched updates to handle two maximum-severity safety vulnerabilities in Safe Firewall Administration Heart (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that would permit an unauthenticated, distant attacker to bypass authentication and execute arbitrary Java code as root on an affected machine.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles