Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild
    Cybersecurity

    Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild

    adminBy adminMarch 5, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco vulnerability patches
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco is warning customers that two recently patched Catalyst SD-WAN vulnerabilities are being exploited in the wild. 

    The networking giant informed customers on February 25 about the availability of patches for five Catalyst SD-WAN flaws, including critical and high-severity issues that can be exploited to access vulnerable systems and elevate privileges to root. 

    Cisco updated its advisory on March 5 to warn that it has become aware of active exploitation for two of the five vulnerabilities: CVE-2026-20128 and CVE-2026-20122.

    CVE-2026-20128 is an information disclosure issue affecting the Data Collection Agent (DCA) feature of Catalyst SD-WAN Manager, allowing an authenticated, local attacker to gain DCA user privileges on the targeted system.

    CVE-2026-20122 is an arbitrary file overwrite bug affecting the API of the Catalyst SD-WAN Manager. It allows a remote, authenticated attacker to overwrite arbitrary files on the system and gain elevated privileges.

    Cisco has not shared any details on the attacks exploiting these vulnerabilities, but its description indicates they have been chained with other flaws.

    Advertisement. Scroll to continue reading.

    The company’s announcement comes roughly a week after it warned customers that a critical zero-day vulnerability affecting Catalyst SD-WAN has been exploited in the wild. 

    Tracked as CVE-2026-20127, that security hole can be exploited remotely to bypass authentication and obtain admin privileges on a vulnerable device.

    CISA and other cybersecurity agencies reported that CVE-2026-20127 has been chained with an older Catalyst vulnerability, CVE-2022-20775, to bypass authentication, escalate privileges, and establish persistence on the targeted system.

    Cisco Talos linked those attacks to UAT-8616, a highly sophisticated threat actor that has been active since at least 2023. 

    It’s unclear if all of these Catalyst SD-WAN vulnerabilities have been exploited in the same or different campaigns. 

    Cisco also warned recently about zero-day attacks conducted by a China-linked APT tracked as UAT-9686.

    Related: Cisco Patches Critical Vulnerabilities in Enterprise Networking Products

    Related: Cisco, F5 Patch High-Severity Vulnerabilities

    Related: Hackers Targeting Cisco Unified CM Zero-Day

    Catalyst Cisco Exploited Flaws SDWAN warns Wild
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWalmart Has a Preorder Deal on the New M4 iPad Air
    Next Article The Aiper Experts Duo with Cognitive AI is the closest thing to a self-cleaning pool
    admin
    • Website

    Related Posts

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,400)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,675)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026
    Most Popular
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.