Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    InfoSec News Nuggets 04/08/2026

    April 8, 2026

    Yearly Breach Reports Summary 2023

    April 8, 2026

    Top Cybersecurity Certifications in Canada: Essential Credentials, Costs & Career ROI

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities | Blog
    News

    Herding Cats: Recent Cisco SD-WAN Manager Vulnerabilities | Blog

    adminBy adminMarch 19, 2026No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    • Over the past two weeks, Cisco has disclosed half a dozen new vulnerabilities in Catalyst SD-WAN Manager, half of which are now known to be exploited in the wild.
    • Community interest has centered on CVE-2026-20127, a zero-day authentication bypass exploited by UAT-8616; initial public proof-of-concept code for CVE-2026-20127 was misattributed and will lead to incomplete detections.
    • The VulnCheck research team assesses that CVE-2026-20133 is a higher risk than defenders may realize, and is likely to be exploited — if exploitation isn’t already ongoing under the radar.

    In response to customer requests, the VulnCheck Initial Access Intelligence team has been analyzing a slew of different Cisco vulnerabilities over the past week and change. As is typical for emerging threat vulnerabilities, our team has seen a variety of incorrectly attributed or fake public PoCs for several of these flaws; this blog details research team observations across more than half a dozen different CVEs in Cisco Catalyst SD-WAN Manager.

    Our team’s ASM queries for Cisco Catalyst SD-WAN show a range of results, depending on the engine: ZoomEye finds roughly 275 internet-exposed instances, Shodan and Censys discover between 450 and 550, and FOFA shows upwards of a thousand.

    On February 25, 2026, Cisco’s Talos team published a blog disclosing in-the-wild exploitation of two vulnerabilities in Catalyst SD-WAN Manager: CVE-2026-20127, a CVSS-10 zero-day flaw in Catalyst SD-WAN Controller’s peering authentication that allowed unauthenticated adversaries to bypass authentication and gain initial (administrative) access; and CVE-2022-20775, an older, previously unexploited vulnerability in the SD-WAN CLI that delivered post-auth privilege escalation and remote command execution as root. Threat activity targeting the two vulnerabilities was traced back to 2023 and attributed to UAT-8616, which the Talos team deemed “a highly sophisticated cyber threat actor.” In addition to Cisco’s blog, which contains investigative guidance, the Australian Signals Directorate released a 41-page tradecraft and threat hunting report on the zero-day exploit in conjunction with Five Eyes intelligence partners.

    While the majority of the community’s interest has (understandably) focused on CVE-2026-20127, the zero-day initial access vulnerability, Cisco also published an aggregate advisory for five other flaws in Catalyst SD-WAN Manager:

    • CVE-2026-20122, an authenticated file overwrite issue in the SD-WAN Manager API that the VulnCheck team exploited to upload a webshell to a vulnerable target system;
    • CVE-2026-20126, a post-authentication privilege escalation to root via the REST API;
    • CVE-2026-20128, an authenticated file read vulnerability that allows for Data Collection Agent (DCA) user takeover, provided the attacker has valid vmanage credentials;
    • CVE-2026-20129, an authentication bypass that gives remote, unauthenticated adversaries access to the netadmin user; and
    • CVE-2026-20133, an unauthenticated information disclosure issue in the SD-WAN Manager API

    CVE Description CVSS Exploited? EPSS
    CVE-2026-20127 Cisco Catalyst SD-WAN Controller Authentication Bypass 10 (Critical) Yes, zero-day 0.02604
    CVE-2022-20775 Cisco SD-WAN CLI Privilege Escalation 7.8 (High) Yes 0.00499
    CVE-2026-20122 Cisco Catalyst SD-WAN Manager API File Overwrite 5.4 (Medium) Yes 0.00042
    CVE-2026-20126 Cisco Catalyst SD-WAN Manager Privilege 7.8 (High) No 0.00042
    CVE-2026-20128 Cisco Catalyst SD-WAN Manager DCA User Takeover 7.5 (High) Yes 0.00019
    CVE-2026-20129 Cisco Catalyst SD-WAN Manager API Improper Authentication 9.8 (Critical) No 0.00148
    CVE-2026-20133 Cisco Catalyst SD-WAN Manager API Information Disclosure 7.5 (High) No 0.00047

    None of the additional CVEs above was listed as exploited in the wild at time of disclosure, but on March 5, Cisco updated their advisory to reflect that both CVE-2026-20128 and CVE-2026-20122 were seeing active exploitation. Both issues were immediately added to VulnCheck’s KEV; as of March 11, neither is on CISA KEV.

    Since public disclosure of CVE-2026-20127, several firms have observed in-the-wild exploitation using a public proof of concept released March 3 — except, as it turns out, that public PoC doesn’t actually exploit CVE-2026-20127 at all, but rather several other completely different vulnerabilities. CVE-2026-20127 exploitation detections based on the March 3 zerozenxlabs PoC, in other words, is incorrectly attributed.

    As is typical with emerging threat vulnerabilities, several public proof-of-concept exploits that claimed to target CVE-2026-20127 hit code-sharing platforms not long after the vulnerability was published. Since VulnCheck’s research team validates and curates public exploits, we reviewed and discarded several fake or otherwise non-functional exploits. On March 3, GitHub user zerozenxlabs posted PoC code that purportedly exploited CVE-2026-20127.

    Our team tested the exploit against a live SD-WAN target, and determined that while it is a valid exploit, it does not exploit CVE-2026-202127 at all, but rather three of the other vulnerabilities Cisco disclosed in SD-WAN Manager: CVE-2026-20133 and CVE-2026-20128 are used to leak and read the DCA credential file, after which the exploit leverages CVE-2026-20122 in the API to upload a webshell. CVE-2026-20127, by contrast, affects peering authentication between vManagers and vControllers, which is a completely different area of the code base that the zerozenxlabs PoC never touches. Rapid7’s Stephen Fewer published an exploit that does actually target CVE-2026-20127 on March 11, which means in-the-wild exploit attempts against the real vulnerability are likely to pick up.

    Cisco still has not indicated any known exploitation of CVE-2026-20133, which is somewhat surprising, considering that the file system access the vulnerability provides allowed our research team to extract the vmanage-admin user’s private key and compromise the Network Configuration Protocol (NETCONF) used to configure and manage SD-WAN devices. The VulnCheck team also used CVE-2026-20133 to leak confd_ipc_secret, allowing any local user to escalate to an unconstrained root shell. Notably, this is the same technique documented by Orange group’s Cyrille CHATRAS, who discovered and reported SD-WAN Manager CVE-2022-20775 back in 2021.

    Defenders who are using the zerozenxlabs PoC to inform signatures have a good start on detecting any potential CVE-2026-20133 exploitation, but should note that CVE-2026-20133 can leak any file on the filesystem and is not limited to leaking the DCA user secret specifically.

    Early exploits and industry attention on emerging threats can be useful for understanding likely exploitation paths and vulnerability nuances, but they can also lead organizations astray when they rely on untested research artifacts or overly narrow focus on specific attack paths. VulnCheck’s Initial Access Intelligence team applies an exploit-first lens to broad swaths of vulnerabilities, validating and improving upon public research artifacts while developing original capabilities and insights.

    VulnCheck’s Initial Access Intelligence team is always on the hunt for new exploits and fresh shells. By delivering machine-consumable, evidence-driven intelligence on new vulnerabilities and how attackers can actually use them, VulnCheck helps organizations prepare earlier, respond decisively, and verify exploitation without relying on scores or delayed consensus. For more research like this, see Tales from the Exploit Mines: Gladinet Triofox CVE-2025-12480 RCE, Metro4Shell: Exploitation of React Native’s Metro Server in the Wild, and Street Smarts: SmarterMail ConnectToHub Unauthenticated RCE (CVE-2026-24423).

    Sign up for the VulnCheck community today to get free access to our VulnCheck KEV, enjoy our comprehensive vulnerability data, and request a trial of our Initial Access Intelligence, IP Intelligence, and Exploit & Vulnerability Intelligence products.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleBlack Hat USA 2025 | No Hoodies Here: Organized Crime in AdTech
    Next Article Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
    admin
    • Website

    Related Posts

    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    News

    Microsoft rolls out fix for broken Windows Start Menu search

    April 8, 2026
    News

    How Secure by Design Helps Developers Build Secure Software

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    InfoSec News Nuggets 04/08/2026

    April 8, 2026

    Yearly Breach Reports Summary 2023

    April 8, 2026

    Top Cybersecurity Certifications in Canada: Essential Credentials, Costs & Career ROI

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.