Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA flags new SD-WAN flaw as actively exploited in attacks
    Cybersecurity

    CISA flags new SD-WAN flaw as actively exploited in attacks

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has given government agencies four days to secure their systems against another Catalyst SD-WAN Manager vulnerability it flagged as actively exploited in attacks.

    Catalyst SD-WAN Manager (formerly known as vManage) is a network management software that helps admins monitor and manage up to 6,000 Catalyst SD-WAN devices from a single dashboard.

    Cisco patched this information disclosure vulnerability (CVE-2026-20133) in late February, saying that it allows unauthenticated remote attackers to access sensitive information on unpatched devices.

    image

    “This vulnerability is due to insufficient file system access restrictions. An attacker could exploit this vulnerability by accessing the API of an affected system,” Cisco said at the time. “A successful exploit could allow the attacker to read sensitive information on the underlying operating system.”

    One week later, the company revealed that two other security flaws it had patched the same day (CVE-2026-20128 and CVE-2026-20122)were being exploited in the wild.

    Federal agencies ordered to patch until Friday

    On Monday, CISA added CVE-2026-20133 to its Known Exploited Vulnerabilities (KEV) Catalog, “based on evidence of active exploitation,” and ordered Federal Civilian Executive Branch (FCEB) agencies to secure their networks until Friday, April 24.

    “Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlined in CISA’s Emergency Directive 26-03 and CISA’s Hunt & Hardening Guidance for Cisco SD-WAN Devices,” CISA said. “Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.”

    Cisco has yet to confirm the U.S. cybersecurity agency’s report that the flaw is being exploited in attacks, with its security advisory still saying that its Product Security Incident Response Team (PSIRT) is “not aware of any public announcements or malicious use of the vulnerabilities that are described in CVE-2026-20133.”

    In February, Cisco also tagged a critical authentication bypass vulnerability (CVE-2026-20127) as exploited in zero-day attacks that were enabling threat actors to add malicious rogue peers to targeted networks since at least 2023.

    More recently, in early March, the company released security updates to address two maximum-severity vulnerabilities in its Secure Firewall Management Center (FMC) software that can allow attackers to gain root access to the underlying operating system and execute arbitrary Java code with root privileges.

    Over the last several years, CISA has tagged 91 Cisco vulnerabilities as exploited in the wild, six of which have been used by various ransomware operations.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    Actively attacks CISA Exploited flags Flaw SDWAN
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAmazon’s $5B Anthropic bet is really about compute, not just cash
    Next Article Explaining AMD gear modes and why they’re important for intensive workloads
    admin
    • Website

    Related Posts

    Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities

    April 21, 2026

    CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines

    April 21, 2026

    Researchers build an encrypted routing layer for private AI inference

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    A perfect ten: Galaxy S25 users get a One UI 8.5 Beta 10 that’s hopefully its last

    April 21, 2026

    What’s The Biggest Technical SEO Blind Spot From Over-Relying On Tools?

    April 21, 2026

    Explaining AMD gear modes and why they’re important for intensive workloads

    April 21, 2026

    CISA flags new SD-WAN flaw as actively exploited in attacks

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,426)
    • Privacy & Online Earning (175)
    • SEO & Digital Marketing (866)
    • Tech Tools & Mobile / Apps (1,714)
    • WiFi / Internet & Networking (235)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    A perfect ten: Galaxy S25 users get a One UI 8.5 Beta 10 that’s hopefully its last

    April 21, 2026

    What’s The Biggest Technical SEO Blind Spot From Over-Relying On Tools?

    April 21, 2026

    Explaining AMD gear modes and why they’re important for intensive workloads

    April 21, 2026
    Most Popular
    • A perfect ten: Galaxy S25 users get a One UI 8.5 Beta 10 that’s hopefully its last
    • What’s The Biggest Technical SEO Blind Spot From Over-Relying On Tools?
    • Explaining AMD gear modes and why they’re important for intensive workloads
    • CISA flags new SD-WAN flaw as actively exploited in attacks
    • Amazon’s $5B Anthropic bet is really about compute, not just cash
    • Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities
    • Yelp launches AI-powered Assistant to streamline local search and bookings
    • NotebookLM just launched a major update that is everything I wanted from the app
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.