Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
    Cybersecurity

    Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

    adminBy adminMarch 5, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco vulnerability patches
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco is warning customers that two recently patched Catalyst SD-WAN vulnerabilities are being exploited in the wild. 

    The networking giant informed customers on February 25 about the availability of patches for five Catalyst SD-WAN flaws, including critical and high-severity issues that can be exploited to access vulnerable systems and elevate privileges to root. 

    Cisco updated its advisory on March 5 to warn that it has become aware of active exploitation for two of the five vulnerabilities: CVE-2026-20128 and CVE-2026-20122.

    CVE-2026-20128 is an information disclosure issue affecting the Data Collection Agent (DCA) feature of Catalyst SD-WAN Manager, allowing an authenticated, local attacker to gain DCA user privileges on the targeted system.

    CVE-2026-20122 is an arbitrary file overwrite bug affecting the API of the Catalyst SD-WAN Manager. It allows a remote, authenticated attacker to overwrite arbitrary files on the system and gain elevated privileges.

    Cisco has not shared any details on the attacks exploiting these vulnerabilities, but its description indicates they have been chained with other flaws.

    Advertisement. Scroll to continue reading.

    The company’s announcement comes roughly a week after it warned customers that a critical zero-day vulnerability affecting Catalyst SD-WAN has been exploited in the wild. 

    Tracked as CVE-2026-20127, that security hole can be exploited remotely to bypass authentication and obtain admin privileges on a vulnerable device.

    CISA and other cybersecurity agencies reported that CVE-2026-20127 has been chained with an older Catalyst vulnerability, CVE-2022-20775, to bypass authentication, escalate privileges, and establish persistence on the targeted system.

    Cisco Talos linked those attacks to UAT-8616, a highly sophisticated threat actor that has been active since at least 2023. 

    It’s unclear if all of these Catalyst SD-WAN vulnerabilities have been exploited in the same or different campaigns. 

    Cisco also warned recently about zero-day attacks conducted by a China-linked APT tracked as UAT-9686.

    Related: Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

    Related: Cisco, F5 Patch High-Severity Vulnerabilities

    Related: Hackers Targeting Cisco Unified CM Zero-Day

    Catalyst Cisco Exploited Flaws SDWAN warns Wild
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWalmart Has a Preorder Deal on the New M4 iPad Air
    Next Article The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool
    admin
    • Website

    Related Posts

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]

    March 5, 2026

    The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool

    March 5, 2026

    Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (614)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (388)
    • Tech Tools & Mobile / Apps (752)
    • WiFi / Internet & Networking (109)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Police dismantles online gambling ring exploiting Ukrainian women

    March 5, 2026

    If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]

    March 5, 2026

    The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool

    March 5, 2026
    Most Popular
    • Police dismantles online gambling ring exploiting Ukrainian women
    • If AI Can’t Read Your CMS, It Can’t Recommend Your Brand [Webinar]
    • The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool
    • Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
    • Walmart Has a Preorder Deal on the New M4 iPad Air
    • Google removes accessibility section from JavaScript SEO section
    • Home Assistant 2026.3 has arrived: Here’s what’s new
    • Digital sovereignty options for on-prem deployments
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.