HomeVulnerabilityCisco Confirms Energetic Exploitation of Two Catalyst SD-WAN Supervisor Vulnerabilities

Cisco Confirms Energetic Exploitation of Two Catalyst SD-WAN Supervisor Vulnerabilities

Cisco has disclosed that two extra vulnerabilities affecting Catalyst SD-WAN Supervisor (previously SD-WAN vManage) have come below energetic exploitation within the wild.

The vulnerabilities in query are listed under –

  • CVE-2026-20122 (CVSS rating: 7.1) – An arbitrary file overwrite vulnerability that would enable an authenticated, distant attacker to overwrite arbitrary recordsdata on the native file system. Profitable exploitation requires the attacker to have legitimate read-only credentials with API entry on the affected system.
  • CVE-2026-20128 (CVSS rating: 5.5) – An info disclosure vulnerability that would enable an authenticated, native attacker to achieve Data Assortment Agent (DCA) consumer privileges on an affected system. Profitable exploitation requires the attacker to have legitimate vManage credentials on the affected system.

Patches for the security defects, together with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, have been launched by Cisco late final month within the following variations –

  • Sooner than Model 20.91 – Migrate to a set launch.
  • Model 20.9 – Mounted in 20.9.8.2
  • Model 20.11 – Mounted in 20.12.6.1
  • Model 20.12 – Mounted in 20.12.5.3 and 20.12.6.1
  • Model 20.13 – Mounted in 20.15.4.2
  • Model 20.14 – Mounted in 20.15.4.2
  • Model 20.15 – Mounted in 20.15.4.2
  • Model 20.16 – Mounted in 20.18.2.1
  • Model 20.18 – Mounted in 20.18.2.1
See also  Over 100 Malicious AI/ML Fashions Discovered on Hugging Face Platform

“In March 2026, the Cisco PSIRT grew to become conscious of energetic exploitation of the vulnerabilities which can be described in CVE-2026-20128 and CVE-2026-20122 solely,” the networking gear main mentioned. The corporate didn’t elaborate on the size of the exercise and who could also be behind it.

In mild of energetic exploitation, customers are beneficial to replace to a set software program launch as quickly as attainable, and take steps to restrict entry from unsecured networks, safe the home equipment behind a firewall, disable HTTP for the Catalyst SD-WAN Supervisor internet UI administrator portal, flip off community providers like HTTP and FTP if not required, change the default administrator password, and monitor log site visitors for any sudden site visitors to and from programs.

The disclosure comes per week after the corporate mentioned a essential security flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Supervisor (CVE-2026-20127, CVSS rating: 10.0) has been exploited by a extremely refined cyber menace actor tracked as UAT-8616 to ascertain persistent footholds into high-value organizations.

See also  Google fixes actively exploited sandbox escape zero day in Chrome

This week, Cisco additionally launched updates to deal with two maximum-severity security vulnerabilities in Safe Firewall Administration Middle (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that would enable an unauthenticated, distant attacker to bypass authentication and execute arbitrary Java code as root on an affected gadget.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular