Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Alerts on Exploitation of SD-WAN Vulnerabilities

Cisco Alerts on Exploitation of SD-WAN Vulnerabilities

Posted on March 5, 2026 By CWS

Cisco has issued a warning to its customers regarding two vulnerabilities in its Catalyst SD-WAN products that are currently being exploited. These vulnerabilities, which were recently patched, pose significant security risks if left unaddressed.

Exploitation of Recent Vulnerabilities

On February 25, Cisco released patches for several vulnerabilities affecting Catalyst SD-WAN, including critical and high-severity issues. These flaws could potentially allow unauthorized access to systems and privilege escalation to root level. A subsequent update on March 5 highlighted active exploitation of two specific vulnerabilities: CVE-2026-20128 and CVE-2026-20122.

The vulnerability CVE-2026-20128 concerns an information disclosure issue within the Data Collection Agent (DCA) feature of the Catalyst SD-WAN Manager. It enables a local attacker with authentication to gain DCA user privileges. Meanwhile, CVE-2026-20122 involves an arbitrary file overwrite vulnerability in the API of the Catalyst SD-WAN Manager, allowing remote, authenticated attackers to overwrite files and gain elevated system privileges.

Details of the Exploited Vulnerabilities

While Cisco has not disclosed specific details about the attacks exploiting these vulnerabilities, they are believed to be part of a series of chained exploits. This announcement follows a prior warning regarding a critical zero-day vulnerability, CVE-2026-20127, which can be exploited to bypass authentication and obtain administrative privileges remotely.

Authorities such as CISA have noted that CVE-2026-20127 has been used in combination with an older vulnerability, CVE-2022-20775, to bypass security measures and establish a foothold on the targeted systems. These vulnerabilities are associated with sophisticated threat actor UAT-8616, known for its activity since 2023.

Ongoing Security Challenges

The precise nature of the campaigns exploiting these vulnerabilities remains unclear. However, Cisco’s recent advisories underscore the ongoing threat landscape, including zero-day attacks linked to a China-based advanced persistent threat group identified as UAT-9686.

In light of these developments, Cisco continues to urge its customers to apply the available patches promptly. Ensuring systems are up-to-date remains crucial to mitigating the risks posed by these exploits. Staying informed and vigilant is essential as new vulnerabilities and attacks emerge.

For further details, users are encouraged to review Cisco’s security advisories and related updates from cybersecurity agencies.

Security Week News Tags:APT, CISA, Cisco, Cisco Talos, critical flaws, CVE, Cybersecurity, Exploit, network security, Patch, SD-WAN, security patch, Vulnerabilities, zero-day

Post navigation

Previous Post: Enhancing Windows Security: Tackling MFA and Credential Risks
Next Post: Drone Strikes Disrupt AWS Services in UAE Region

Related Posts

Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles Security Week News
Prime Security Raises  Million to Build Agentic Security Architect Prime Security Raises $20 Million to Build Agentic Security Architect Security Week News
Ray Security Emerges From Stealth With M to Bring Real-Time, AI-Driven Data Protection Ray Security Emerges From Stealth With $11M to Bring Real-Time, AI-Driven Data Protection Security Week News
Cyera Raises 0 Million to Expand AI-Powered Data Security Platform Cyera Raises $540 Million to Expand AI-Powered Data Security Platform Security Week News
BlinkOps Raises  Million for Agentic Security Automation Platform BlinkOps Raises $50 Million for Agentic Security Automation Platform Security Week News
PwC and Google Cloud Ink 0 Million Deal to Scale AI-Powered Defense PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark