Cisco Warns of New SD-WAN Manager Flaws Under Active Attack

Cisco Warns of New SD-WAN Manager Flaws Under Active Attack

The vulnerability of centralized network orchestration platforms has become a primary concern for cybersecurity professionals as sophisticated adversaries continue to target the very infrastructure designed to provide visibility and control. Cisco recently issued an urgent security disclosure regarding the active exploitation of two new flaws within its Catalyst SD-WAN Manager software, formerly recognized in the industry as vManage. These newly identified vulnerabilities, tracked as CVE-2026-20122 and CVE-2026-20128, pose a significant risk to the integrity of enterprise networks. The first flaw, which carries a CVSS severity score of 7.1, permits an authenticated remote attacker to overwrite arbitrary files on the local filesystem, potentially leading to a complete system compromise. Meanwhile, the second vulnerability involves an information disclosure issue that allows a local attacker to escalate privileges to the Data Collection Agent level, facilitating unauthorized access to sensitive operational telemetry within the ecosystem.

Strategic Persistence in SD-WAN Ecosystems

The broader implications of these attacks suggest a calculated and persistent effort by state-sponsored actors to undermine the security of critical software-defined networking components. Intelligence alliances, including the Five Eyes and the National Cyber Security Centre, have highlighted that these activities are part of a global campaign targeting Cisco’s SD-WAN architecture. Previous warnings have focused on maximum-severity flaws such as CVE-2026-20127, an authentication bypass bug, alongside long-standing privilege escalation issues like CVE-2022-20775. A specific threat group, currently monitored under the designation UAT-8616, has demonstrated a high degree of sophistication by successfully compromising deployments to insert rogue peers into the network fabric. By maintaining long-term root access through these vulnerabilities, adversaries can effectively monitor, intercept, or redirect traffic without triggering traditional perimeter-based security alarms or detections.

Targeting the SD-WAN Manager is particularly effective because this centralized controller serves as the primary intelligence hub for the entire wide area network. When an attacker gains control over this management plane, the consequences extend far beyond a single server, potentially impacting every connected branch office and data center in the organization. The ability to manipulate the configuration of edge devices remotely allows threat actors to establish persistent backdoors that survive standard reboots and updates. Industry analysts have observed that the window of opportunity for these malicious actors has expanded as they leverage flaws that may have been present in the codebase since as early as 2023. This strategic focus on the management layer reflects a shift in modern warfare where the goal is no longer just immediate disruption but deep, undetectable integration into the victim’s infrastructure for the purpose of long-term intelligence gathering and data theft.

Moving Toward Resilient Infrastructure Management

Cisco’s Product Security Incident Response Team confirmed that the exploitation of these two most recent vulnerabilities was first detected in March 2026, prompting an immediate call for remediation. While the company has provided the necessary technical details to identify the flaws, it has remained somewhat opaque regarding the specific identity of the attackers or the precise geography of the targets. This lack of attribution is common in high-stakes cybersecurity incidents, yet the timing of the discovery suggests a clear overlap with the ongoing activities of sophisticated groups like UAT-8616. For federal agencies and private enterprises alike, the shortened patch window necessitated an aggressive response to prevent further unauthorized access. The ongoing arms race between network defenders and exploit developers highlights the inherent risks of centralized management platforms, where a single oversight in authentication or file handling can provide a skeleton key to an entire global enterprise network.

The resolution of these security challenges required administrators to implement comprehensive software updates while simultaneously auditing their environments for signs of prior compromise. Organizations successfully mitigated the immediate threat by applying the recommended patches and strictly enforcing multi-factor authentication for all administrative accounts interacting with the SD-WAN Manager. Moving forward, security teams prioritized the implementation of zero-trust architecture and identity-based access controls to limit the lateral movement capabilities of any future intruders. The incident served as a reminder that passive defense was no longer sufficient, leading to the adoption of continuous monitoring solutions that focused on management plane telemetry. By integrating deeper logging and behavioral analytics, defenders enhanced their ability to detect the subtle anomalies associated with rogue peer insertion. These proactive measures established a more resilient security posture, ensuring that critical infrastructure remained protected.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later