Date Posted: 2026/03/03
[Vulnerability Alert] 3 Critical Security Vulnerabilities Found in Cisco Catalyst SD-WAN
- Subject Explanation: [Vulnerability Alert] 3 Critical Security Vulnerabilities Found in Cisco Catalyst SD-WAN
- Content Description:
- Forwarding Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) Security Alert TWCERTCC-200-202602-00000014
- Cisco Catalyst SD-WAN is a cloud-centric software-defined wide area network architecture by Cisco that provides centralized management, secure encryption, and application performance optimization to ensure reliable connections in multi-cloud environments. Recently, Cisco released a critical security advisory.
- [CVE-2026-20127, CVSS: 10.0] This vulnerability exists in the Cisco Catalyst SD-WAN Controller (formerly vSmart) and may be exploited by an unauthenticated remote attacker to bypass the authentication mechanism and gain administrative privileges on the affected system.
- [CVE-2026-20126, CVSS: 8.8] This vulnerability exists in the Cisco Catalyst SD-WAN Manager (formerly vManage) and may allow an authenticated attacker with low local privileges to send a request via the REST API to obtain root privileges on the underlying operating system.
- [CVE-2026-20129, CVSS: 9.8] This vulnerability exists in the API user authentication of the Cisco Catalyst SD-WAN Manager. It allows an unauthenticated remote attacker to use a carefully crafted API request to access the affected system as a user with the netadmin role. Note: The Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage) have been found to be actively exploited in attack campaigns; please take responsive measures immediately.
- Impacted Platforms:
- [CVE-2026-20127]
- Cisco Catalyst SD-WAN 20.9 version, Cisco Catalyst SD-WAN 20.11 version, Cisco Catalyst SD-WAN 20.12.5 version, Cisco Catalyst SD-WAN 20.12.6 version, Cisco Catalyst SD-WAN 20.13 version, Cisco Catalyst SD-WAN 20.14 version, Cisco Catalyst SD-WAN 20.15 version, Cisco Catalyst SD-WAN 20.16 version, Cisco Catalyst SD-WAN 20.18 version
- [CVE-2026-20126, CVE-2026-20129]
- Cisco Catalyst SD-WAN Manager 20.9 version, Cisco Catalyst SD-WAN Manager 20.11 version, Cisco Catalyst SD-WAN Manager 20.12.5 version, Cisco Catalyst SD-WAN Manager 20.126 version, Cisco Catalyst SD-WAN Manager 20.13 version, Cisco Catalyst SD-WAN Manager 20.14 version, Cisco Catalyst SD-WAN Manager 20.15 version, Cisco Catalyst SD-WAN Manager 20.16 version, Cisco Catalyst SD-WAN Manager 20.18 version
- Suggested Measures:
- Please update to the following versions:
- [CVE-2026-20127]
- Cisco Catalyst SD-WAN 20.9.8.2 and later versions
- Cisco Catalyst SD-WAN 20.12.6.1 and later versions
- Cisco Catalyst SD-WAN 20.12.5.3 and later versions
- Cisco Catalyst SD-WAN 20.12.6.1 and later versions
- Cisco Catalyst SD-WAN 20.15.4.2 and later versions
- Cisco Catalyst SD-WAN 20.18.2.1 and later versions
- [CVE-2026-20126, CVE-2026-20129]
- Cisco Catalyst SD-WAN Manager 20.9.8.2 and later versions
- Cisco Catalyst SD-WAN Manager 20.12.6.1 and later versions
- Cisco Catalyst SD-WAN Manager 20.12.5.3 and later versions
- Cisco Catalyst SD-WAN Manager 20.12.6.1 and later versions
- Cisco Catalyst SD-WAN Manager 20.15.4.2 and later versions
- Cisco Catalyst SD-WAN Manager 20.18.2.1 and later versions
- References:
Computer and Communication Center
Network Systems Division