By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Computing

Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

News Room
Last updated: 2026/03/05 at 11:40 AM
News Room Published 5 March 2026
Share
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
SHARE

Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Security

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild.

The vulnerabilities in question are listed below –

  • CVE-2026-20122 (CVSS score: 7.1) – An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. Successful exploitation requires the attacker to have valid read-only credentials with API access on the affected system.
  • CVE-2026-20128 (CVSS score: 5.5) – An information disclosure vulnerability that could allow an authenticated, local attacker to gain Data Collection Agent (DCA) user privileges on an affected system. Successful exploitation requires the attacker to have valid vManage credentials on the affected system.

Patches for the security defects, along with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, were released by Cisco late last month in the following versions –

  • Earlier than Version 20.91 – Migrate to a fixed release.
  • Version 20.9 – Fixed in 20.9.8.2
  • Version 20.11 – Fixed in 20.12.6.1
  • Version 20.12 – Fixed in 20.12.5.3 and 20.12.6.1
  • Version 20.13 – Fixed in 20.15.4.2
  • Version 20.14 – Fixed in 20.15.4.2
  • Version 20.15 – Fixed in 20.15.4.2
  • Version 20.16 – Fixed in 20.18.2.1
  • Version 20.18 – Fixed in 20.18.2.1

“In March 2026, the Cisco PSIRT became aware of active exploitation of the vulnerabilities that are described in CVE-2026-20128 and CVE-2026-20122 only,” the networking equipment major said. The company did not elaborate on the scale of the activity and who may be behind it.

In light of active exploitation, users are recommended to update to a fixed software release as soon as possible, and take steps to limit access from unsecured networks, secure the appliances behind a firewall, disable HTTP for the Catalyst SD-WAN Manager web UI administrator portal, turn off network services like HTTP and FTP if not required, change the default administrator password, and monitor log traffic for any unexpected traffic to and from systems.

The disclosure comes a week after the company said a critical security flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Manager (CVE-2026-20127, CVSS score: 10.0) has been exploited by a highly sophisticated cyber threat actor tracked as UAT-8616 to establish persistent footholds into high-value organizations.

This week, Cisco also released updates to address two maximum-severity security vulnerabilities in Secure Firewall Management Center (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary Java code as root on an affected device.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The MacBook Neo sets a new standard for recycled content The MacBook Neo sets a new standard for recycled content
Next Article Netflix buys Ben Affleck’s AI filmmaking company InterPositive |  News Netflix buys Ben Affleck’s AI filmmaking company InterPositive | News
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Really, you made this without AI? Prove it
Really, you made this without AI? Prove it
News
Lenovo’s Legion Go 2 Is the Latest Console to Raise Prices
Lenovo’s Legion Go 2 Is the Latest Console to Raise Prices
News
Shanghai launches traffic safety code for delivery riders · TechNode
Shanghai launches traffic safety code for delivery riders · TechNode
Computing
Oracle’s massive layoffs affected 158 employees in the Bay Area
Oracle’s massive layoffs affected 158 employees in the Bay Area
News

You Might also Like

Shanghai launches traffic safety code for delivery riders · TechNode
Computing

Shanghai launches traffic safety code for delivery riders · TechNode

1 Min Read

8 social media management tools for 2026 workflows

4 Min Read
OpenAI Raises 2 Billion in Record-Breaking Funding Round: What It Means for ChatGPT, Codex, and the Future of AI – Chat GPT AI Hub
Computing

OpenAI Raises $122 Billion in Record-Breaking Funding Round: What It Means for ChatGPT, Codex, and the Future of AI – Chat GPT AI Hub

17 Min Read
The 10 Best Skins in Mortal Kombat 1 | HackerNoon
Computing

The 10 Best Skins in Mortal Kombat 1 | HackerNoon

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?