- Description
- A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain DCA user privileges on an affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.
- Source
- psirt@cisco.com
- NVD status
- Analyzed
- Products
- catalyst_sd-wan_manager
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 6
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
- psirt@cisco.com
- CWE-257
- Hype score
- Not currently trending
PoC is now public for CVE-2026-20127 in Cisco Catalyst SD-WAN. UAT-8616 has been exploiting it since 2023, now anyone can try. Two more SD-WAN flaws also active: CVE-2026-20122 and CVE-2026-20128. Patch window is effectively closed. https://t.co/gZOpZQntR2
@CybrPulse
7 Mar 2026
80 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨Cisco Catalyst SD-WANの脆弱性、さらに2件の悪用が明らかに:CVE-2026-20128、CVE-2026-20122 ⚠️米CISA、Apple製品の古い脆弱性3件をKEVカタログに追加(CVE-2023-43000、CVE-2021-30952、CVE-2023-41974) 〜サイバーアラート3月6日
@MachinaRecord
6 Mar 2026
189 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
3 Cisco SD-WAN CVEs actively exploited in 8 days. Here's the scorecard: CVE-2026-20127 — CVSS 10.0 — Auth bypass zero-day — Exploited since 2023 CVE-2026-20128 — CVSS 5.5 — DCA credential leak — Exploited (confirmed March 5) CVE-2026-20122 — CVSS 7.1 — File overw
@FirstPassLab
5 Mar 2026
101 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0388BD67-C1AD-4E47-8B1A-22EE1634190E",
"versionEndExcluding": "20.9.8.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADAB32B5-239D-4DC0-BF30-A6D72ACB3710",
"versionEndExcluding": "20.12.5.3",
"versionStartIncluding": "20.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D284EA84-6C27-4A9C-BDA2-D1C5BF1F2356",
"versionEndExcluding": "20.15.4.2",
"versionStartIncluding": "20.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79B0897E-0FF3-44CA-901F-A10A6921672D",
"versionEndExcluding": "20.18",
"versionStartIncluding": "20.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B6E170-73B8-4838-93B4-AD258F3BCA7C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]