ESB-2026.1817
PUBLISHED
CVSS 9.800000190734863 CRITICAL
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2026.1817.2
Cisco Catalyst SD-WAN Vulnerabilities
23 April 2026
===========================================================================
AUSCERT Security Bulletin Summary
---------------------------------
Product: Cisco Catalyst SD-WAN
Publisher: Cisco Systems
Operating System: Cisco
Resolution: Patch/Upgrade
CVE Names: CVE-2026-20122 CVE-2026-20128 CVE-2026-20129
CVE-2026-20126 CVE-2026-20133
Original Bulletin:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Comment: CVSS (Max): 9.8 CVE-2026-20129 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS Source: NIST, [Cisco Systems]
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
The following are listed in the CISA Known Exploited Vulnerabilities (KEV) Catalog:
CISA KEV CVE(s): CVE-2026-20133 CVE-2026-20128 CVE-2026-20122
CISA KEV URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
EPSS (Max): 1.4% (80th) CVE-2026-20133 2026-04-22
Revision History: April 23 2026: Cisco confirm active exploitations Mar/Apr - refer 'Exploitation and Public Announcements'
February 26 2026: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Catalyst SD-WAN Vulnerabilities
Priority: Critical
Advisory ID: cisco-sa-sdwan-authbp-qwCX8D4v
First Published: 2026 February 25 16:00 GMT
Last Updated: 2026 April 22 15:10 GMT
Version 1.3: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCws33583 CSCws33584 CSCws33585 CSCws33586 CSCws33587
CSCws93470
CWEs: CWE-200 CWE-257 CWE-287 More...
Summary
o Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager, formerly SD-WAN
vManage, could allow an attacker to access an affected system, elevate
privileges to root, gain access to sensitive information, and overwrite
arbitrary files.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Cisco strongly recommends that customers upgrade to the fixed software
indicated in this advisory.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Affected Products
o Vulnerable Products
These vulnerabilities affect Cisco Catalyst SD-WAN Manager, regardless of
device configuration.
For information about which Cisco software releases are vulnerable, see the
Fixed Software section of this advisory.
Cisco strongly recommends that customers upgrade to the fixed software
indicated in this advisory.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Cisco has confirmed that Cisco Catalyst SD-WAN Manager releases 20.18 and
later are not affected by the vulnerabilities that are described in
CVE-2026-20128 and CVE-2026-20129.
Cisco strongly recommends that customers upgrade to the fixed software
indicated in this advisory.
Details
o These vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit another vulnerability.
Cisco strongly recommends that customers upgrade to the fixed software
indicated in this advisory.
Details about the vulnerabilities are as follows:
CVE-2026-20129: Cisco Catalyst SD-WAN Manager Authentication Bypass
Vulnerability
A vulnerability in the API user authentication of Cisco Catalyst SD-WAN
Manager could allow an unauthenticated, remote attacker to gain access to
an affected system as a user who has the netadmin role.
The vulnerability is due to improper authentication for requests that are
sent to the API. An attacker could exploit this vulnerability by sending a
crafted request to the API of an affected system. A successful exploit
could allow the attacker to execute commands with the privileges of the
netadmin role.
Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not
affected by this vulnerability.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCws33587
CVE ID: CVE-2026-20129
Security Impact Rating (SIR): Critical
CVSS Base Score: 9.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2026-20126: Cisco Catalyst SD-WAN Manager Privilege Escalation
Vulnerability
A vulnerability in Cisco Catalyst SD-WAN Manager could allow an
authenticated, local attacker with low privileges to gain root privileges
on the underlying operating system.
This vulnerability is due to an insufficient user authentication mechanism
in the REST API. An attacker could exploit this vulnerability by sending a
request to the REST API of the affected system. A successful exploit could
allow the attacker to gain root privileges on the underlying operating
system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCws93470
CVE ID: CVE-2026-20126
Security Impact Rating (SIR): High
CVSS Base Score: 7.8
CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2026-20133: Cisco Catalyst SD-WAN Manager Information Disclosure
Vulnerability
A vulnerability in Cisco Catalyst SD-WAN Manager could allow an
unauthenticated, remote attacker to view sensitive information on an
affected system.
This vulnerability is due to insufficient file system access restrictions.
An attacker could exploit this vulnerability by accessing the API of an
affected system. A successful exploit could allow the attacker to read
sensitive information on the underlying operating system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCws33583
CVE ID: CVE-2026-20133
Security Impact Rating (SIR): High
CVSS Base Score: 7.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2026-20122: Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite
Vulnerability
A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an
authenticated, remote attacker to overwrite arbitrary files on the local
file system. To exploit this vulnerability, the attacker must have valid
read-only credentials with API access on the affected system.
This vulnerability is due to improper file handling on the API interface of
an affected system. An attacker could exploit this vulnerability by
uploading a malicious file on the local file system. A successful exploit
could allow the attacker to overwrite arbitrary files on the affected
system and gain vmanage user privileges.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCws33584 , CSCws33586
CVE ID: CVE-2026-20122
Security Impact Rating (SIR): High
CVSS Base Score: 7.1
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CVE-2026-20128: Cisco Catalyst SD-WAN Manager Information Disclosure
Vulnerability
A vulnerability in the Data Collection Agent (DCA) feature of Cisco
Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to
gain DCA user privileges on an affected system.
This vulnerability is due to the presence of a credential file for the DCA
user on an affected system. An attacker could exploit this vulnerability by
sending a crafted HTTP request and reading the file that contains the DCA
password from that affected system. A successful exploit could allow the
attacker to access another affected system and gain DCA user privileges.
Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not
affected by this vulnerability.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCws33585
CVE ID: CVE-2026-20128
Security Impact Rating (SIR): High
CVSS Base Score: 7.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Indicators of Compromise
o Indicators of compromise for the exploitation of CVE-2026-20128 and
CVE-2026-20122 are as follows.
CVE-2026-20128: Cisco Catalyst SD-WAN Manager Information Disclosure
Vulnerability
Customers are encouraged to examine log entries in the file /var/log/nms/
containers/service-proxy/serviceproxy-access.log on a Cisco Catalyst SD-WAN
Manager for references to /reports/data/opt/data/containers/config/
data-collection-agent/.dca . Legitimate use of this API occurs when
administering the DCA and would coincide with this activity. In such a
case, the corresponding IP address would be that of the laptop of the
administrator.
To identify indicators of compromise and remove false positives, search the
file /var/log/nms/containers/service-proxy/serviceproxy-access.log for log
entries such as the following:
[2026-03-04T18:14:16.057Z] "GET /reports/data/opt/data/containers/config/data-collection-agent/.dca HTTP/1.1" 200 - 0 32 4 - "172.16.1.1" "python-requests/2.31.0" "7e77bfbc-7224-43e0-9115-cadf13d2fefa" "172.16.0.1" "127.0.0.1:8080"
Compare the log time and source IP (in this example, 172.16.1.1) against
known administrator activity to exclude false positives.
CVE-2026-20122: Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite
Vulnerability
Examine log entries in the file /var/log/nms/containers/service-proxy/
serviceproxy-access.log on a Cisco Catalyst SD-WAN Manager for references
to /dataservice/smartLicensing/uploadAck . Legitimate use of this API
occurs when updating licensing information and would coincide with this
activity. In such a case, the corresponding IP address would be that of the
laptop of the administrator.
To identify indicators of compromise and remove false positives, search the
file /var/log/nms/containers/service-proxy/serviceproxy-access.log for log
entries such as the following:
[2026-03-05T14:28:05.106Z] "POST /dataservice/smartLicensing/uploadAck HTTP/1.1" 0 DC 1036 0 10010 - "10.10.10.23"
Compare the log time and source IP (in this example, 10.10.10.23) against
known administrator activity to exclude false positives.
If customers see the following POST log example, they should also check the
vmanage-server.log file for specific filenames being downloaded:
[2026-03-05T14:28:05.106Z] "POST /dataservice/smartLicensing/uploadAck HTTP/1.1" 0 DC 1036 0 10010 - "10.10.10.23"
The following list includes example logs for filenames. Flag them if the
file is suspicious.
/var/log/nms/vmanage-server.log-03-06-2026-1.gz:06-Mar-2026 02:16:34,029 UTC INFO [285fcdc0-30fa-4ca0-8e06-6953a095a59a] [LAB-TEST-1] [SmartLicensingManager] (default task-11229) |57501bad-32a7-4f52-8f54-8547dcd7403e| Time taken to write file ../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war = 2 ms to directory /opt/data/app-server/software/package/license/ack
/var/log/nms/vmanage-server.log-03-06-2026-1.gz:06-Mar-2026 02:16:34,029 UTC INFO [285fcdc0-30fa-4ca0-8e06-6953a095a59a] [LAB-TEST-1] [SmartLicensingManager] (default task-11229) |57501bad-32a7-4f52-8f54-8547dcd7403e| ../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war is processing in rpc call
/var/log/nms/vmanage-server.log-03-06-2026-1.gz:06-Mar-2026 02:16:34,094 UTC INFO [] [sd-wan-manager-0] [SmartLicensingManager] (pool-187-thread-1) || stringUrl https://10.0.6.144:8443/software/package/license/ack/../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war filePath ../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war
/var/log/nms/vmanage-server.log-03-06-2026-1.gz:06-Mar-2026 02:16:34,106 UTC ERROR [] [sd-wan-manager-0] [SmartLicensingManager] (pool-187-thread-1) || Failed to download the file ../../../../../../../../../../../var/lib/wildfly/standalone/deployments/cmd.gz.war
Note: The filename shown here is an example. The actual log entry may
contain a different filename.
Customers are also encouraged to check for the presence of file /cmd.gz/
cmd.jsp . Examine log entries in the file /var/log/nms/containers/
service-proxy/serviceproxy-access.log on a Cisco Catalyst SD-WAN Manager
for references to /cmd.gz/cmd.jsp . This is an endpoint that does not exist
on a clean Cisco Catalyst SD-WAN Manager but is added by the published
proof of concept. Any use of this endpoint is an indicator of compromise,
as shown in the following example log:
[2026-03-05T14:54:01.541Z] "POST /cmd.gz/cmd.jsp HTTP/1.1" 200 - 6 63 7 - "172.16.1.1" "python-requests/2.31.0" "7221a300-088a-4a44-84a1-b8388a8ee19e" "172.16.0.1" "127.0.0.1:8080"
Note: The filename shown here is an example. The actual log entry may
contain a different filename.
Workarounds
o There are no workarounds that address these vulnerabilities. Cisco strongly
recommends that customers upgrade to the fixed software indicated in this
advisory.
Fixed Software
o Cisco considers any workarounds and mitigations (if applicable) to be
temporary solutions until an upgrade to a fixed software release is
available. To fully remediate these vulnerabilities and avoid future
exposure as described in this advisory, Cisco strongly recommends that
customers upgrade to the fixed software indicated in this advisory.
Fixed Releases
In the following tables, the left column lists Cisco software releases. The
right column indicates whether a release is affected by the vulnerabilities
that are described in this advisory and the first release that includes the
fix for these vulnerabilities. Customers are advised to upgrade to an
appropriate fixed software release as indicated in this section.
Cisco Catalyst SD-WAN Manager Release First Fixed Release
Earlier than 20.9 ^1 Migrate to a fixed release.
20.9 20.9.8.2
20.10 20.12.6.1
20.11 ^1 20.12.6.1
20.12 20.12.5.3
20.12.6.1
20.13 ^1 20.15.4.2
20.14 ^1 20.15.4.2
20.15 20.15.4.2
20.16 ^1 20.18.2.1
20.18 20.18.2.1
1. These releases have reached End of Software Maintenance . Cisco strongly
encourages customers to upgrade to a supported release .
The Cisco Product Security Incident Response Team (PSIRT) validates only
the affected and fixed release information that is documented in this
advisory.
Additional Information
To check component and software release compatibility, see the SD-WAN
Controller Component Compatibility Matrix .
For help planning an upgrade, see the Cisco Catalyst SD-WAN Upgrade
Matrix .
For additional remediation assistance, see Remediate Catalyst SD-WAN
Security Advisory - February 2026 .
For additional assistance with requesting the admin-tech bundle for TAC
support, see Collect an Admin-Tech in SD-WAN Environment and Upload to
TAC Case .
For additional remediation assistance, see Rebuild Your Catalyst SD-WAN
Fabric .
Recommendations
o Cisco recommends upgrading the affected systems to a fixed software
release.
General Recommendations for Hardening
Prevent access from unsecured networks, such as the internet, to the
system. If internet access to the system is required, restrict system
access to only known, trusted hosts on ports/protocols that are
included in the user guides.
Protect Cisco Catalyst SD-WAN Control Components behind a filtering
device such as a firewall, and filter traffic to and from the systems
while allowing only known, trusted hosts to send traffic to the
systems. Using a two-layer firewall can provide flexibility in network
planning so that end users do not connect directly to the outer DMZ.
See the Deployment sections of the User Guides for Cisco Catalyst
SD-WAN software .
Regularly monitor log traffic for any unexpected traffic to and from
systems. Logging should be sent to an external server, if possible, and
kept for a long enough duration so that post-event investigations can
be performed with sufficient log data.
Disable HTTP for the Cisco Catalyst SD-WAN Manager web UI administrator
portal.
Disable any network services that are not required, including HTTP and
FTP. For more information about specific service functionality, see the
Cisco Catalyst SD-WAN user guides.
Upgrade the system to the latest version of Cisco Catalyst SD-WAN
Software.
Change the default administrator password to a more secure variant.
Restrict access to the administrator account by creating user accounts
based on necessary access requirements. In addition, create operator
accounts for all administrators.
Use SSL/TLS, obtain an SSL certificate from a certificate authority
(CA), or create a self-signed certificate.
For more information, review the Cisco Catalyst SD-WAN Hardening Guide .
Exploitation and Public Announcements
o The Cisco PSIRT is not aware of any public announcements or malicious use
of the vulnerabilities that are described in CVE-2026-20126 and
CVE-2026-20129.
In March 2026, the Cisco PSIRT became aware of active exploitation of the
vulnerabilities that are described in CVE-2026-20128 and CVE-2026-20122
only. The vulnerabilities that are described in the other CVEs in this
advisory are not known to have been compromised. Cisco strongly recommends
that customers upgrade to a fixed software release to remediate these
vulnerabilities.
In April 2026, the Cisco PSIRT became aware of active exploitation of the
vulnerability that is described in CVE-2026-20133. Cisco strongly
recommends that customers upgrade to a fixed software release to remediate
these vulnerabilities.
Source
o These vulnerabilities were found during internal security testing by Arthur
Vidineyev of the Cisco Advanced Security Initiatives Group (ASIG).
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
Subscribe to Cisco Security Notifications
o Subscribe
Related to This Advisory
o
URL
o https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Revision History
o +---------+-----------------------+----------------+--------+-------------+
| Version | Description | Section | Status | Date |
+---------+-----------------------+----------------+--------+-------------+
| | Added information | Exploitation | | |
| 1.3 | about active | and Public | Final | 2026-APR-22 |
| | exploitation of | Announcements | | |
| | CVE-2026-20133. | | | |
+---------+-----------------------+----------------+--------+-------------+
| | Updated the Details | | | |
| | section for | | | |
| | CVE-2026-20128. Added | Details, | | |
| | indicators of | Indicators of | | |
| 1.2 | compromise for | Compromise, | Final | 2026-MAR-18 |
| | CVE-2026-20128 and | Fixed Releases | | |
| | CVE-2026-20122. Added | | | |
| | Release 20.10 to | | | |
| | fixed release table. | | | |
+---------+-----------------------+----------------+--------+-------------+
| | Updated Exploitation | | | |
| | and Public | | | |
| | Announcements section | | | |
| | to include active | Summary, | | |
| | exploitation of | Vulnerable | | |
| | CVE-2026-20128 and | Products, | | |
| | CVE-2026-20122. Added | Products | | |
| | links with | Confirmed Not | | |
| | instructions for | Vulnerable, | | |
| 1.1 | uploading admin-tech | Details, | Final | 2026-MAR-05 |
| | files into a Cisco | Workarounds, | | |
| | TAC case and | Fixed | | |
| | rebuilding an SD-WAN | Releases, | | |
| | fabric. Added | Exploitation | | |
| | additional language | and Public | | |
| | strongly recommending | Announcements | | |
| | that customers | | | |
| | upgrade to the fixed | | | |
| | software indicated in | | | |
| | this advisory. | | | |
+---------+-----------------------+----------------+--------+-------------+
| 1.0 | Initial public | - | Final | 2026-FEB-25 |
| | release. | | | |
+---------+-----------------------+----------------+--------+-------------+
Legal Disclaimer
o SOFTWARE DOWNLOADS AND TECHNICAL SUPPORT
The Cisco Support and Downloads page on Cisco.com provides information
about licensing and downloads. This page can also display customer device
support coverage for customers who use the My Devices tool. Please note
that customers may download only software that was procured from Cisco
directly or through a Cisco authorized reseller or partner and for which
the license is still valid.
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco Technical Assistance Center
(TAC) . Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement to
a free upgrade.
When considering software upgrades , customers are advised to regularly
consult the advisories for the relevant Cisco products to determine
exposure and a complete upgrade solution. In all cases, customers should
ensure that the devices to be upgraded contain sufficient memory and
confirm that current hardware and software configurations will continue to
be supported properly by the new release. If the information is not clear,
customers are advised to contact the Cisco Technical Assistance Center
(TAC) or their contracted maintenance providers.
LEGAL DISCLAIMER DETAILS
CISCO DOES NOT MAKE ANY EXPRESS OR IMPLIED GUARANTEES OR WARRANTIES OF ANY
KIND, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR USE. WITHOUT LIMITING THE GENERALITY OF THE FOREGOING, CISCO
DOES NOT GUARANTEE THE ACCURACY OR COMPLETENESS OF THIS INFORMATION. THIS
DOCUMENT IS PROVIDED ON AN "AS IS" BASIS. YOUR USE OF THE INFORMATION ON
THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK.
CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Copies or summaries of the information contained in this Security Advisory
may lack important information or contain factual errors. Customers are
advised to visit the Cisco Security Advisories page for the most recent
version of this Security Advisory. The Cisco Product Security Incident
Response Team (PSIRT) assesses only the affected and fixed release
information that is documented in this advisory. See the Cisco Security
Vulnerability Policy for more information.
- --------------------------END INCLUDED TEXT----------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AUSCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AUSCERT's members. As
AUSCERT did not write the document quoted above, AUSCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AUSCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://portal.auscert.org.au/bulletins/
===========================================================================
AUSCERT
The University of Queensland, Brisbane QLD 4072 Australia
e: auscert@auscert.org.au
t: +61 (0)7 3365 4417
Allies in Cyber Security
===========================================================================