Cisco SD-WAN Vulnerabilities Exploited in Active Attacks

0
8

Key Takeaways

  • CISA has added three Cisco Catalyst SD-WAN Manager vulnerabilities (CVE‑2026‑20128, CVE‑2026‑20133, CVE‑2026‑20122) to its Known Exploited Vulnerabilities (KEV) catalog and ordered federal agencies to patch them by Thursday.
  • Two of the flaws (CVE‑2026‑20128 and CVE‑2026‑20122) are already being actively exploited; the third (CVE‑2026‑20133) is an information‑disclosure bug not yet seen in the wild but still poses a significant risk.
  • Successful exploitation can give unauthenticated attackers privileged access to the SD‑WAN manager, allowing them to view sensitive data, overwrite files, and potentially take full control of the management platform.
  • Cisco released patches for all three CVEs in late February and warned of active abuse in March; agencies must apply the updates immediately and review any anomalous activity.
  • Organizations beyond the federal sector should treat these KEV entries as a priority, enforce least‑privilege API credentials, segment management networks, and monitor for unauthorized file changes or authentication attempts.

Overview of CISA Alert and Deadline
On Monday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) posted three newly identified Cisco Catalyst SD‑WAN Manager vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. By placing the flaws on the KEV list, CISA signals that they are being actively exploited in the wild and therefore require urgent remediation. The agency set a hard deadline of Thursday for all federal agencies to apply the necessary patches, reflecting the heightened risk these bugs pose to government networks that rely on SD‑WAN for secure, high‑performance connectivity. Failure to meet the deadline could result in non‑compliance with binding operational directives and increase the likelihood of successful cyber‑intrusions.


Description of CVE‑2026‑20128
CVE‑2026‑20128 is an information‑disclosure vulnerability residing in the data collection agent (DCA) component of Cisco Catalyst SD‑WAN Manager. The flaw allows an unauthenticated, remote attacker to interact with the DCA interface and acquire DCA user privileges without needing any credentials. Once the attacker assumes these privileges, they can query internal telemetry data, configuration details, and potentially leverage the gained foothold to move laterally within the management plane. Because the DCA service is exposed to facilitate telemetry collection from edge devices, the vulnerability is particularly attractive to adversaries seeking stealthy reconnaissance on large SD‑WAN deployments.


Description of CVE‑2026‑20133
CVE‑2026‑20133 is another information‑disclosure bug, this time affecting a different subsystem of the SD‑WAN Manager. Like CVE‑2026‑20128, it can be triggered by an unauthenticated, remote attacker, but instead of granting DCA privileges it exposes sensitive information directly stored on the affected system. The disclosed data may include authentication tokens, configuration scripts, logging data, or other internal artifacts that could aid an attacker in crafting more precise follow‑on exploits. Although Cisco’s advisory has not yet observed active exploitation of this specific CVE in the wild, its presence in the KEV catalog underscores that adversaries are likely probing for it, and mitigation remains essential.


Description of CVE‑2026‑20122
CVE‑2026‑20122 represents a more severe arbitrary file overwrite vulnerability. An authenticated remote attacker who possesses valid read‑only API credentials can upload a malicious file to the SD‑WAN Manager, overwrite arbitrary local files, and subsequently escalate to vManage user privileges. This chain of actions effectively transforms a low‑privilege API token into full administrative control over the management platform. Successful exploitation could allow an adversary to alter firmware images, inject backdoors, disable security controls, or disrupt network operations across thousands of edge devices managed by a single SD‑WAN Manager instance.


Cisco’s Patch Timeline and Advisory
Cisco addressed all three vulnerabilities in a security update released in late February 2026. The patches correct the DCA authentication bypass, tighten file‑upload validation, and restrict information exposure in the affected components. In March, Cisco’s Product Security Incident Response Team (PSIRT) issued a follow‑on notice confirming that attackers were actively exploiting CVE‑2026‑20128 and CVE‑2026‑20122 in the wild. As of the latest advisory, CVE‑2026‑20133 had not been observed in active exploitation, but Cisco still recommends applying the patch to eliminate the underlying information‑disclosure risk. The vendor urged customers to verify patch applicability, test in staging environments where feasible, and deploy the updates promptly to production systems.


Implications for Federal Agencies and Broader Recommendations
The four‑day patch window imposed by CISA reflects the strategic importance of protecting federal SD‑WAN infrastructures, which often interconnect numerous agency locations, data centers, and cloud services. Exploitation of these vulnerabilities could jeopardize the confidentiality of classified or sensitive unclassified information, disrupt mission‑critical communications, and provide a foothold for further intrusion into deeper network layers. Agencies should not only apply the Cisco patches but also audit API credential usage, enforce multi‑factor authentication for management interfaces, segment the SD‑WAN management network from user traffic, and enable detailed logging to detect anomalous file modifications or authentication attempts. Continuous monitoring for indicators of compromise—such as unexpected DCA privilege escalation or unauthorized file writes—is essential.


Best Practices for Organizations Beyond the Federal Sector
While the KEV directive binds federal entities, private‑sector organizations that rely on Cisco Catalyst SD‑WAN Manager should treat these flaws with equal urgency. Recommended actions include: (1) immediately applying the February 2026 patches; (2) reviewing and tightening API token scopes to the minimum required permissions; (3) disabling unnecessary remote management interfaces or restricting them to trusted IP ranges; (4) implementing file‑integrity monitoring to catch unauthorized overwrites; and (5) conducting regular vulnerability scans and penetration tests focused on the SD‑WAN management plane. By aligning with CISA’s guidance and Cisco’s remediation steps, organizations can reduce the attack surface, mitigate the risk of privilege escalation, and maintain the resilience of their SD‑WAN deployments.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here