
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has given executive businesses 4 days to protected their programs in opposition to every other Catalyst SD-WAN Supervisor vulnerability it flagged as actively exploited in assaults.
Catalyst SD-WAN Supervisor (previously referred to as vManage) is a community control tool that is helping admins track and set up as much as 6,000 Catalyst SD-WAN gadgets from a unmarried dashboard.
Cisco patched this data disclosure vulnerability (CVE-2026-20133) in overdue February, announcing that it lets in unauthenticated faraway attackers to get right of entry to delicate knowledge on unpatched gadgets.
“This vulnerability is because of inadequate record device get right of entry to restrictions. An attacker may exploit this vulnerability through having access to the API of an affected device,” Cisco mentioned on the time. “A a hit exploit may permit the attacker to learn delicate knowledge at the underlying running device.”
One week later, the corporate published that two different safety flaws it had patched the similar day (CVE-2026-20128 and CVE-2026-20122)have been being exploited within the wild.
Federal businesses ordered to patch till Friday
On Monday, CISA added CVE-2026-20133 to its Identified Exploited Vulnerabilities (KEV) Catalog, “in line with proof of lively exploitation,” and ordered Federal Civilian Government Department (FCEB) businesses to protected their networks till Friday, April 24.
“Please adhere to CISA’s tips to evaluate publicity and mitigate dangers related to Cisco SD-WAN gadgets as defined in CISA’s Emergency Directive 26-03 and CISA’s Hunt & Hardening Steerage for Cisco SD-WAN Units,” CISA mentioned. “Adhere to the appropriate BOD 22-01 steering for cloud products and services or discontinue use of the product if mitigations don’t seem to be to be had.”
Cisco has but to substantiate the U.S. cybersecurity company’s record that the flaw is being exploited in assaults, with its safety advisory nonetheless announcing that its Product Safety Incident Reaction Staff (PSIRT) is “now not acutely aware of any public bulletins or malicious use of the vulnerabilities which might be described in CVE-2026-20133.”
In February, Cisco additionally tagged a essential authentication bypass vulnerability (CVE-2026-20127) as exploited in zero-day assaults that have been enabling danger actors so as to add malicious rogue friends to centered networks since no less than 2023.
Extra not too long ago, in early March, the corporate launched safety updates to handle two maximum-severity vulnerabilities in its Safe Firewall Control Middle (FMC) tool that may permit attackers to realize root get right of entry to to the underlying running device and execute arbitrary Java code with root privileges.
During the last a number of years, CISA has tagged 91 Cisco vulnerabilities as exploited within the wild, six of that have been utilized by more than a few ransomware operations.

AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of recent exploits is coming.
On the Self sustaining Validation Summit (Might 12 & 14), see how self sufficient, context-rich validation unearths what is exploitable, proves controls hang, and closes the remediation loop.
Declare Your Spot



