Cyber: Cisco flags more SD-WAN flaws as actively exploited in attacks

Cyber: Cisco flags more SD-WAN flaws as actively exploited in attacks

​Cisco has flagged two Catalyst SD-WAN Manager security flaws as actively exploited in the wild, urging administrators to upgrade vulnerable devices.

Catalyst SD-WAN Manager (formerly vManage) is network management software that enables admins to monitor and manage up to 6,000 Catalyst SD-WAN devices from a single centralized dashboard.

"In March 2026, the Cisco PSIRT became aware of active exploitation of the vulnerabilities that are described in CVE-2026-20128 and CVE-2026-20122 only," the company warned in an update to a February 25 advisory.

"The vulnerabilities that are described in the other CVEs in this advisory are not known to have been compromised. Cisco strongly recommends that customers upgrade to a fixed software release to remediate these vulnerabilities."

The high-severity arbitrary file overwrite vulnerability (CVE-2026-20122) can only be exploited by remote attackers with valid read-only credentials with API access, while the medium-severity information disclosure flaw (CVE-2026-20128) requires local attackers to have valid vmanage credentials on the targeted systems.

Cisco added that these vulnerabilities affect Catalyst SD-WAN Manager software, regardless of device configuration.

Last week, the company also tagged a critical authentication bypass vulnerability (CVE-2026-20127) as exploited in zero-day attacks, enabling highly sophisticated threat actors to compromise controllers and add malicious rogue peers to targeted networks since at least 2023.

These rogue peers allow attackers to insert legitimate-looking malicious devices, enabling them to move deeper into compromised networks.

BleepingComputer