Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
    Cybersecurity

    Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities

    adminBy adminMarch 5, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ransomware attackers are exploiting critical SmarterMail vulnerability (CVE-2026-24423)
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco has confirmed that two Catalyst SD-WAN Manager vulnerabilities (CVE-2026-20128 and CVE-2026-20122) patched in late February 2025 are being exploited by attackers.

    The exploited vulnerabilities (CVE-2026-20128, CVE-2026-20122)

    CVE-2026-20128 is a bug in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager, which could allow an authenticated, local attacker to gain DCA user privileges on an affected system.

    “To exploit this vulnerability, the attacker must have valid vmanage credentials on the affected system,” Cisco explained.

    “This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges.”

    CVE-2026-20122 affects the solution’s API. If successfully exploited by authenticated, remote attackers, it allows them to overwrite arbitrary files on the affected system and gain vmanage user privileges.

    Arthur Vidineyev of the Cisco Advanced Security Initiatives Group has been credited with uncovering these flaws, as well as three additional ones covered by the same advisory.

    “Cisco strongly recommends that customers upgrade to a fixed software release to remediate these vulnerabilities,” the company added in the updated advisory.

    The company did not share specific details about in-the-wild CVE-2026-20128 and CVE-2026-20122 exploitation, or whether these flaws are being leveraged by the “highly sophisticated” cyber threat actor whose activities were disclosed a week ago.

    That threat actor exploited CVE-2026-20127 – a zero-day authentication bypass vulnerability – to “log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account,” and that use that access to “manipulate network configuration for the SD-WAN fabric.”

    More fixes for Cisco security solutions

    Also today, Cisco fixed 48 vulnerabilities in Cisco Secure Firewall ASA, Secure FMC, and Secure FTD Software.

    While most of these are medium-severity, two have received a maximum severity score:

    • CVE-2026-20079, an authentication bypass flaw in Cisco Secure Firewall Management Center Software, and
    • CVE-2026-20131, a remote code execution vulnerability in the same software

    The first one can be exploited by sending crafted HTTP requests to an affected device, and the latter by sending a crafted serialized Java object to the web-based management interface of an affected device.

    The Dutch National Cyber Security Center said that it expects a public PoC for and large-scale attempts at abuse of these flaws in the short term, and urged admins to upgrade to a fixed version of the software as soon as possible.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Cisco exploitation firewall fixes manager SDWAN Vulnerabilities warns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThe Government Uses Targeted Advertising to Track Your Location. Here’s What We Need to Do.
    Next Article Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
    admin
    • Website

    Related Posts

    Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises

    March 5, 2026

    DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

    March 5, 2026

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises

    March 5, 2026

    What AI means for the future of SEO [Expert Tips & Interview]

    March 5, 2026

    200+ AI audits reveal why some industries struggle in AI search

    March 5, 2026

    DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (617)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (392)
    • Tech Tools & Mobile / Apps (754)
    • WiFi / Internet & Networking (110)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises

    March 5, 2026

    What AI means for the future of SEO [Expert Tips & Interview]

    March 5, 2026

    200+ AI audits reveal why some industries struggle in AI search

    March 5, 2026
    Most Popular
    • Google: Half of 2025’s 90 Exploited Zero-Days Aimed at Enterprises
    • What AI means for the future of SEO [Expert Tips & Interview]
    • 200+ AI audits reveal why some industries struggle in AI search
    • DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
    • A Survey of 1,000+ US Consumers
    • I finally upgraded to a mesh Wi-Fi system and it made me realize Wi-Fi extenders are a scam
    • Lack of regulatory action on hyperscaler dominance prompts inquiry chair to quit
    • Cisco warns of SD-WAN Manager exploitation, fixes 48 firewall vulnerabilities
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.