• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Cisco Confirms Lively Exploitation of Two Catalyst SD-WAN Supervisor Vulnerabilities

Admin by Admin
March 6, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Safety

SD-WAN Manager Vulnerabilities

Cisco has disclosed that two extra vulnerabilities affecting Catalyst SD-WAN Supervisor (previously SD-WAN vManage) have come below energetic exploitation within the wild.

The vulnerabilities in query are listed under –

  • CVE-2026-20122 (CVSS rating: 7.1) – An arbitrary file overwrite vulnerability that might enable an authenticated, distant attacker to overwrite arbitrary information on the native file system. Profitable exploitation requires the attacker to have legitimate read-only credentials with API entry on the affected system.
  • CVE-2026-20128 (CVSS rating: 5.5) – An info disclosure vulnerability that might enable an authenticated, native attacker to achieve Information Assortment Agent (DCA) consumer privileges on an affected system. Profitable exploitation requires the attacker to have legitimate vManage credentials on the affected system.

Patches for the safety defects, together with CVE-2026-20126, CVE-2026-20129, and CVE-2026-20133, had been launched by Cisco late final month within the following variations –

  • Sooner than Model 20.91 – Migrate to a hard and fast launch.
  • Model 20.9 – Mounted in 20.9.8.2
  • Model 20.11 – Mounted in 20.12.6.1
  • Model 20.12 – Mounted in 20.12.5.3 and 20.12.6.1
  • Model 20.13 – Mounted in 20.15.4.2
  • Model 20.14 – Mounted in 20.15.4.2
  • Model 20.15 – Mounted in 20.15.4.2
  • Model 20.16 – Mounted in 20.18.2.1
  • Model 20.18 – Mounted in 20.18.2.1

“In March 2026, the Cisco PSIRT grew to become conscious of energetic exploitation of the vulnerabilities which are described in CVE-2026-20128 and CVE-2026-20122 solely,” the networking tools main stated. The corporate didn’t elaborate on the size of the exercise and who could also be behind it.

In gentle of energetic exploitation, customers are advisable to replace to a hard and fast software program launch as quickly as attainable, and take steps to restrict entry from unsecured networks, safe the home equipment behind a firewall, disable HTTP for the Catalyst SD-WAN Supervisor internet UI administrator portal, flip off community companies like HTTP and FTP if not required, change the default administrator password, and monitor log visitors for any surprising visitors to and from methods.

The disclosure comes per week after the corporate stated a crucial safety flaw in Cisco Catalyst SD-WAN Controller and Catalyst SD-WAN Supervisor (CVE-2026-20127, CVSS rating: 10.0) has been exploited by a extremely refined cyber risk actor tracked as UAT-8616 to determine persistent footholds into high-value organizations.

This week, Cisco additionally launched updates to handle two maximum-severity safety vulnerabilities in Safe Firewall Administration Middle (CVE-2026-20079 and CVE-2026-20131, CVSS scores: 10.0) that might enable an unauthenticated, distant attacker to bypass authentication and execute arbitrary Java code as root on an affected machine.

Tags: ActiveCatalystCiscoConfirmsExploitationManagerSDWANVulnerabilities
Admin

Admin

Next Post
7 Issues You Completely Should not Do In Marathon

7 Issues You Completely Should not Do In Marathon

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Digicam Champions Face Off: iPhone 16 Professional vs. Galaxy S25 Extremely

Digicam Champions Face Off: iPhone 16 Professional vs. Galaxy S25 Extremely

April 26, 2025
Pretend TikTok and WhatsApp Apps Infect Android Gadgets with ClayRat Spyware and adware

Pretend TikTok and WhatsApp Apps Infect Android Gadgets with ClayRat Spyware and adware

October 9, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

Mistral AI Releases Voxtral TTS: A 4B Open-Weight Streaming Speech Mannequin for Low-Latency Multilingual Voice Era

March 29, 2026
Gemini 3.1 Flash TTS: New text-to-speech AI mannequin

Gemini 3.1 Flash TTS: New text-to-speech AI mannequin

April 17, 2026
Gemini 2.5 Professional Preview: even higher coding efficiency

Gemini 2.5 Professional Preview: even higher coding efficiency

April 12, 2026
OpenAI Launches GPT-5.4-Cyber to Enhance Defensive Cybersecurity

OpenAI Launches GPT-5.4-Cyber to Enhance Defensive Cybersecurity

April 17, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Markdown + Astro = ❤️

Markdown + Astro = ❤️

April 20, 2026
OpenAI Scales Trusted Entry for Cyber Protection With GPT-5.4-Cyber: a High quality-Tuned Mannequin Constructed for Verified Safety Defenders

OpenAI Scales Trusted Entry for Cyber Protection With GPT-5.4-Cyber: a High quality-Tuned Mannequin Constructed for Verified Safety Defenders

April 20, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved