Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
好的,用户让我总结一篇文章的内容,控制在100字以内,并且不要用特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章主要讲的是Cisco披露了两个被积极利用的漏洞,影响Catalyst SD-WAN Manager。这两个漏洞分别是CVE-2026-20122和CVE-2026-20128,评分分别是7.1和5.5。前者允许远程攻击者覆盖文件,后者可能导致信息泄露和权限提升。Cisco已经发布了补丁,并建议用户尽快升级软件,采取一些安全措施。 接下来,我需要把这些信息浓缩到100字以内。要包括漏洞名称、影响、评分、攻击方式以及Cisco的应对措施。同时,确保语言简洁明了,不使用复杂的术语。 最后,检查字数是否符合要求,并确保没有遗漏关键点。这样就能提供一个准确且简洁的总结了。 </think> Cisco披露两个被积极利用的漏洞影响Catalyst SD-WAN Manager:CVE-2026-20122(CVSS 7.1)允许远程攻击者覆盖文件;CVE-2026-20128(CVSS 5.5)可能导致信息泄露和权限提升。 Cisco已发布补丁并建议用户尽快升级软件以应对威胁。 2026-3-5 15:22:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

Vulnerability / Enterprise Security

SD-WAN Manager Vulnerabilities

Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN vManage) have come under active exploitation in the wild.

The vulnerabilities in question are listed below -

  • CVE-2026-20122 (CVSS score: 7.1) - An arbitrary file overwrite vulnerability that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. Successful exploitation requires the attacker to have valid read-only credentials with API access on the affected system.
  • CVE-2026-20128 (CVSS score: 5.5) - An information disclosure vulnerability that could allow an authenticated, local attacker to gain Data Collection Agent (DCA) user privileges on an affected system. Successful exploitation requires the attacker to have valid vManage credentials on the affected system.

Patches for the security defects, along with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, were released by Cisco late last month in the following versions -

  • Earlier than Version 20.91 - Migrate to a fixed release.
  • Version 20.9 - Fixed in 20.9.8.2
  • Version 20.11 - Fixed in 20.12.6.1
  • Version 20.12 - Fixed in 20.12.5.3 and 20.12.6.1
  • Version 20.13 - Fixed in 20.15.4.2
  • Version 20.14 - Fixed in 20.15.4.2
  • Version 20.15 - Fixed in 20.15.4.2
  • Version 20.16 - Fixed in 20.18.2.1
  • Version 20.18 - Fixed in 20.18.2.1

"In March 2026, the Cisco PSIRT became aware of active exploitation of the vulnerabilities that are described in CVE-2026-20128 and CVE-2026-20122 only," the networking equipment major said. The company did not elaborate on the scale of the activity and who may be behind it.

In light of active exploitation, users are recommended to update to a fixed software release as soon as possible, and take steps to limit access from unsecured networks, secure the appliances behind a firewall, disable HTTP for the Catalyst SD-WAN Manager web UI administrator portal, turn off network services like HTTP and FTP if not required, change the default administrator password, and monitor log traffic for any unexpected traffic to and from systems.

The disclosure comes a week after the company said a critical security flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Manager (CVE-2026-20127, CVSS score: 10.0) has been exploited by a highly sophisticated cyber threat actor tracked as UAT-8616 to establish persistent footholds into high-value organizations.

This week, Cisco also released updates to address two maximum-severity security vulnerabilities in Secure Firewall Management Center (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary Java code as root on an affected device.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/cisco-confirms-active-exploitation-of.html
如有侵权请联系:admin#unsafe.sh