CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 21, 2026

CISA Warns of Cisco Catalyst SD-WAN Manager Vulnerabilities Exploited in Attacks

Cybersecurity News Archived Apr 21, 2026 ✓ Full text saved

CISA has added three critical Cisco Catalyst SD-WAN Manager vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies and organizations to act immediately. All three flaws were added on April 20, 2026, with a tight remediation deadline of April 23, 2026. The three vulnerabilities affect Cisco Catalyst SD-WAN Manager, a widely used platform […] The post CISA Warns of Cisco Catalyst SD-WAN Manager Vulnerabilities Exploited in Attacks appeared first on Cyber Secu

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cisco CISA Warns of Cisco Catalyst SD-WAN Manager Vulnerabilities Exploited in Attacks CISA has added three critical Cisco Catalyst SD-WAN Manager vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies and organizations to act immediately. All three flaws were added on April 20, 2026, with a tight remediation deadline of April 23, 2026. The three vulnerabilities affect Cisco Catalyst SD-WAN Manager, a widely used platform for managing enterprise SD-WAN infrastructure. Here’s a breakdown: CVE-2026-20133 (CWE-200 – Sensitive Information Exposure): This flaw allows remote, unauthenticated attackers to view sensitive information on affected systems. No login is required to exploit this vulnerability, making it particularly dangerous for internet-exposed deployments. CVE-2026-20122 (CWE-648 – Incorrect Use of Privileged APIs): Caused by improper handling of files on the API interface, this vulnerability allows an attacker to upload a malicious file to the local file system. A successful exploit grants the attacker vmanage user privileges, enabling deep access and control over the SD-WAN environment. CVE-2026-20128 (CWE-257 – Passwords Stored in Recoverable Format): An authenticated local attacker can exploit this flaw by accessing a credential file stored in a recoverable format on the filesystem. This allows privilege escalation to the DCA user level, even from a low-privileged account. SD-WAN managers sit at the heart of enterprise network infrastructure, controlling routing, policies, and device configurations across distributed locations. Compromising this platform can give attackers broad lateral movement capabilities, enabling them to pivot across the entire network. While ransomware involvement is currently listed as “unknown,” the exploitation of SD-WAN management platforms has historically preceded large-scale network intrusions. CISA has issued Emergency Directive 26-03, along with dedicated Hunt & Hardening Guidance for Cisco SD-WAN Devices, underscoring the threat’s severity. Organizations that cannot apply mitigations are directed to discontinue use of the product per BOD 22-01 guidance for cloud services. Recommended Actions Apply all available patches and security updates from Cisco immediately. Review CISA’s Emergency Directive 26-03 for specific exposure assessment steps. Follow CISA’s Hunt & Hardening Guidance to detect signs of compromise. Restrict API access and audit local file system permissions on affected systems. Monitor for unusual privilege escalation or unauthorized file uploads. With the due date set for April 23, 2026, Federal Civilian Executive Branch (FCEB) agencies have virtually no time to delay. Private sector organizations managing Cisco SD-WAN deployments should treat this advisory with equal urgency, as active exploitation in the wild makes these vulnerabilities an immediate risk to network integrity. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News Hackers Abuse GitHub Issue Notifications to Phish Developers Through Malicious OAuth Apps Apache 6000+ Apache ActiveMQ Instances Vulnerable to CVE-2026-34197 Exposed Online Cyber Attack News Hackers Use Nightmare-Eclipse Tools After Compromising FortiGate SSL VPN Access Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 21, 2026
    Archived
    Apr 21, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗