Jump to the main content block

【Vulnerability Alert】 Cisco Catalyst SD-WAN contains three critical security vulnerabilities.

publish date : 2026-03-05 update date : 2026-03-05

Source: Ministry of education information & communication security contingency platform

"" "" ""

Publication Number TACERT-ANA-2026030209035959 Publication Time 2026/03/02 09:35
Incident Type ANA-Vulnerability Alert Discovery Time 2026/03/02 09:35
Impact Level Low  
[Subject]
【Vulnerability Alert】 Cisco Catalyst SD-WAN contains three critical security vulnerabilities.

[Content]
Forwarded from TWCERTCC-200-202602-00000014

Cisco Catalyst SD-WAN is Cisco’s cloud-centric Software-Defined Wide Area Network (SD-WAN) architecture that provides centralized management, secure encryption, and application performance optimization to ensure reliable connectivity across multi-cloud environments. Recently, Cisco released a critical security advisory.

【CVE-2026-20127, CVSS: 10.0】 This vulnerability exists in Cisco Catalyst SD-WAN Controller (formerly vSmart). An unauthenticated remote attacker may exploit this vulnerability to bypass authentication mechanisms and obtain administrative privileges on the affected system.

【CVE-2026-20126, CVSS: 8.8】 This vulnerability exists in Cisco Catalyst SD-WAN Manager (formerly vManage). It may allow an authenticated attacker with local low privileges to send crafted requests through the REST API and gain root privileges on the underlying operating system.

【CVE-2026-20129, CVSS: 9.8】 This vulnerability exists in the API user authentication of Cisco Catalyst SD-WAN Manager. It allows an unauthenticated remote attacker to use specially crafted API requests to access the affected system with the privileges of a user assigned the netadmin role. Note: Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage) have been observed being actively exploited in attack activities. Please take mitigation measures as soon as possible.

(Information Sharing Level: WHITE (Information content can be publicly disclosed)

[Affected Platform]
【CVE-2026-20127】 Cisco Catalyst SD-WAN version 20.9, Cisco Catalyst SD-WAN version 20.11, Cisco Catalyst SD-WAN version 20.12.5, Cisco Catalyst SD-WAN version 20.12.6, Cisco Catalyst SD-WAN version 20.13, Cisco Catalyst SD-WAN version 20.14, Cisco Catalyst SD-WAN version 20.15, Cisco Catalyst SD-WAN version 20.16, Cisco Catalyst SD-WAN version 20.18

【CVE-2026-20126、CVE-2026-20129】 Cisco Catalyst SD-WAN Manager version 20.9, Cisco Catalyst SD-WAN Manager version 20.11, Cisco Catalyst SD-WAN Manager version 20.12.5, Cisco Catalyst SD-WAN Manager version 20.126, Cisco Catalyst SD-WAN Manager version 20.13, Cisco Catalyst SD-WAN Manager version 20.14, Cisco Catalyst SD-WAN Manager version 20.15, Cisco Catalyst SD-WAN Manager version 20.16, Cisco Catalyst SD-WAN Manager version 20.18

[Recommended Actions]
Please update to the following versions:

【CVE-2026-20127】 Cisco Catalyst SD-WAN version 20.9.8.2 and later versions Cisco Catalyst SD-WAN version 20.12.6.1 and later versions Cisco Catalyst SD-WAN version 20.12.5.3 and later versions Cisco Catalyst SD-WAN version 20.12.6.1 and later versions Cisco Catalyst SD-WAN version 20.15.4.2 and later versions Cisco Catalyst SD-WAN version 20.18.2.1 and later versions

【CVE-2026-20126、CVE-2026-20129】 Cisco Catalyst SD-WAN Manager version 20.9.8.2 and later versions Cisco Catalyst SD-WAN Manager version 20.12.6.1 and later versions Cisco Catalyst SD-WAN Manager version 20.12.5.3 and later versions Cisco Catalyst SD-WAN Manager version 20.12.6.1 and later versions Cisco Catalyst SD-WAN Manager version 20.15.4.2 and later versions Cisco Catalyst SD-WAN Manager version 20.15.4.2 and later versions Cisco Catalyst SD-WAN Manager version 20.18.2.1 and later versions

[Reference]
https://www.twcert.org.tw/tw/cp-169-10737-2a2d2-1.html
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: