Cisco Catalyst SD-WAN vulnerabilities let attackers gain high privileges and, in some cases, root


Cisco warned that multiple flaws in Cisco Catalyst SD-WAN Manager (formerly vManage) can let attackers bypass authentication, read sensitive data, overwrite files, and escalate privileges up to root depending on the bug and the attacker’s access level. The most severe issue, CVE-2026-20129, lets a remote unauthenticated attacker reach the API and gain netadmin privileges through improper authentication.

Cisco also said threat actors are already exploiting CVE-2026-20122 and CVE-2026-20128 in the wild. That raises the urgency for teams that run SD-WAN Manager on internet-reachable networks or on networks where low-privilege users can reach the appliance filesystem.

If you run Catalyst SD-WAN Manager, patching matters more than tuning detections. CIS also lists fixed trains and warns that older, end-of-life branches need upgrades or migration.

What is vulnerable

CVESeverityWhat it enablesAccess needed
CVE-2026-20129Critical (9.8)Auth bypass to netadmin command executionUnauthenticated, remote
CVE-2026-20133Medium to High (varies by score source)Unauthenticated read of sensitive information via APIUnauthenticated, remote
CVE-2026-20122Medium (5.4)Overwrite arbitrary files; gain vmanage privilegesAuthenticated, remote (read-only API creds)
CVE-2026-20128High (7.5 CNA)Read stored DCA password, pivot to DCA access on other systemsAuthenticated, local with vmanage creds
CVE-2026-20126High (8.8 CNA)Local privilege escalation to root via REST APIAuthenticated, local low-privilege

Why CVE-2026-20129 drives the “patch now” message

CVE-2026-20129 sits in the API authentication flow. NVD’s description says an unauthenticated attacker can send crafted API requests and gain access as a user with the netadmin role, then execute commands with that role’s privileges.

That makes exposed management interfaces a real risk, especially on devices that share management reachability with broader enterprise networks.

Active exploitation: what Cisco acknowledged publicly

Cisco said it became aware of active exploitation for CVE-2026-20122 and CVE-2026-20128. Cisco did not publish full exploit details in public summaries, which is common during active exploitation windows.

Fixed releases you should target

CIS lists these fixed trains for Catalyst SD-WAN Manager and notes that some branches are end-of-life:

  • 20.9.x: update to 20.9.8.2
  • 20.12.5.x: update to 20.12.5.3
  • 20.12.6.x: update to 20.12.6.1
  • 20.15.x: update to 20.15.4.2
  • 20.18.x: update to 20.18.2.1
  • 20.11, 20.13, 20.14, 20.16: EOL, plan a supported upgrade path
  • Patch SD-WAN Manager to the fixed train that matches your branch, or move off EOL releases.
  • Restrict access to the SD-WAN Manager portal and API from untrusted networks, and put the system behind a firewall.
  • Disable unused services like HTTP or FTP if your deployment does not require them.
  • Hunt for signs of abuse:
    • Unexpected API calls to SD-WAN Manager endpoints
    • New privilege changes for vmanage or netadmin roles
    • Low-privilege local access followed by lateral access attempts that match DCA pivot behavior

FAQ

What is the most dangerous Cisco Catalyst SD-WAN Manager vulnerability here?

CVE-2026-20129, because it lets an unauthenticated remote attacker gain netadmin privileges through the API.

Which bugs are under active exploitation?

Cisco said it saw active exploitation for CVE-2026-20122 and CVE-2026-20128.

Does Cisco provide workarounds?

Public reporting around the advisory says Cisco emphasized upgrading to fixed releases and tightening exposure of management access.

Why does CVE-2026-20128 matter if it needs local access?

It can expose a stored DCA password on the filesystem and help attackers pivot into DCA access on other affected systems.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages