Summarize with:

Share
CVE-2026-20122 and CVE-2026-20128 have turned Cisco's SD-WAN exposure story into a broader management-plane security problem. Cisco says both vulnerabilities in Catalyst SD-WAN Manager are now being actively exploited, extending the urgency created by the earlier zero-day around CVE-2026-20127.
For defenders, the key takeaway is that this is no longer just a single bug or a routine maintenance issue. Organizations running internet-exposed SD-WAN management systems should assume attackers are probing for any weakness that can help them move from initial access into privilege abuse, credential exposure, or deeper lateral movement inside the network.
CVE-2026-20122 is a high-severity arbitrary file overwrite flaw in the API of Cisco Catalyst SD-WAN Manager. According to Cisco, an attacker with valid read-only credentials and API access can upload a malicious file, overwrite local files, and gain vmanage user privileges.
CVE-2026-20128 is a medium-severity information disclosure issue in the Data Collection Agent feature. A low-privileged local user with valid vmanage credentials can retrieve a stored DCA password and use it to gain DCA user privileges on another affected system.
Cisco's March advisory update says that CVE-2026-20122 and CVE-2026-20128 are the two issues from this advisory that are known to be under active exploitation. That matters because it shows attackers are not just chasing headline-grabbing unauthenticated bugs. They are also exploiting post-auth and credential-adjacent weaknesses when those paths help preserve access.
A compromised SD-WAN management layer gives attackers visibility into network topology, policy, and device relationships. In practical terms, that makes these platforms strategic infrastructure rather than ordinary admin panels.
Cisco Talos linked earlier SD-WAN exploitation to a sophisticated actor tracked as UAT-8616, which targeted Cisco SD-WAN environments as far back as 2023. The new exploitation status for CVE-2026-20122 and CVE-2026-20128 suggests defenders should broaden hunting and remediation beyond the original zero-day focus on CVE-2026-20127.
The risk here is not just disclosure in the abstract. Exposed service credentials, overwritten files, and abuse of internal trust relationships can become stepping stones to persistence, policy manipulation, or expanded access across the SD-WAN environment.
Cisco describes CVE-2026-20122 as an improper file handling issue in the API of Catalyst SD-WAN Manager. An attacker needs valid read-only credentials with API access, but once inside that boundary they may be able to overwrite arbitrary files and elevate to vmanage privileges.
That makes this flaw especially dangerous in environments where credential hygiene is weak or where operational accounts are shared across teams and systems.
CVE-2026-20128 stems from the presence of a DCA credential file on affected systems. A low-privileged user who can access the file system may extract the stored password and pivot into DCA access on another affected system.
In other words, this is the kind of information disclosure bug that can still have meaningful operational impact when paired with real access and weak internal segmentation.
| Date | Event | Status |
|---|---|---|
| 2026-02-25 | Cisco publishes advisory covering multiple Catalyst SD-WAN Manager flaws | π’ Public disclosure |
| 2026-02-25 | Cisco Talos discloses active exploitation tied to CVE-2026-20127 and UAT-8616 activity dating back to 2023 | π΄ Active exploitation |
| 2026-02-28 | CISA issues Emergency Directive 26-03 for Cisco SD-WAN systems after exploitation concerns | β οΈ Emergency action |
| 2026-03-05 | Cisco update says CVE-2026-20122 and CVE-2026-20128 are also under active exploitation | π΄ Active exploitation |
| 2026-03-16 | Defenders continue patching and validating exposure across SD-WAN estates | π Ongoing response |
vmanage accounts for unnecessary access, stale credentials, and shared usage.Cisco Talos recommends focusing first on unexpected control-connection peering events in SD-WAN logs, particularly those involving unusual public IPs, unexpected peer types, or timings that do not match maintenance windows. Defenders should also review:
splindex=network OR index=syslog ("VDAEMON_0" OR "control-connection-state-change") (peer-type=vmanage OR peer-type=vsmart OR peer-type=vbond OR peer-type=vedge) | stats count min(_time) as firstSeen max(_time) as lastSeen by host, public_ip, peer_system_ip, peer_type | sort - lastSeen
This is not a signature for a single exploit chain. It is a practical hunt for suspicious SD-WAN peering activity that deserves validation by network and security teams.
Cisco's SD-WAN incident is widening from a single exploited bug into a cluster of management-plane weaknesses that attackers can abuse in sequence.
β Patch now β Cisco says CVE-2026-20122 and CVE-2026-20128 are already being exploited.
β Scope wider than one CVE β environments checked only for CVE-2026-20127 may still miss active risk.
β Hunt for trust abuse β credential exposure, file overwrite, and suspicious peering events are all meaningful signals.
If your organization runs Cisco Catalyst SD-WAN Manager, treat this as an active compromise-risk event and verify exposure, patch status, and post-exploitation artifacts immediately.
Not exactly. Cisco says CVE-2026-20122 requires valid read-only credentials with API access, and CVE-2026-20128 requires valid low-privileged local access with vmanage credentials. Even so, both are being actively exploited.
Because real environments often have over-privileged service accounts, reused credentials, and exposed management interfaces. Once attackers get a foothold, these flaws can help them deepen access.
No. CVE-2026-20127 was the earlier critical authentication bypass tied to zero-day exploitation. Cisco now says CVE-2026-20122 and CVE-2026-20128 are also under active attack.
Published: 2026-03-16 Author: Invaders Cybersecurity Classification: Public / TLP:CLEAR Reading Time: 5 minutes
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether Iβm building tools, tracking threat actors, or experimenting with AI workflows, Iβm always exploring new ways to stay one step ahead in todayβs fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
vulnerabilityCVE-2026-20182 makes Cisco SD-WAN controllers an urgent KEV priority CVE-2026-20182 is not landing as a routine patch bulletin. Cisco says the flaw is already b...
vulnerabilityExim BDAT flaw makes mail servers urgent RCE patch targets CVE-2026-45185 is the kind of bug that forces defenders to remember an old lesson: email infrastructu...
vulnerabilityDirty Frag Linux kernel zero-day gives local users a fast path to root Dirty Frag is the kind of Linux bug defenders worry about because it turns a limited foot...