What is Cisco Catalyst SD-WAN Manager?
Cisco Catalyst SD-WAN Manager (formerly known as vManage) is the centralized network management and orchestration platform for Cisco's Software-Defined WAN (SD-WAN) solution. It provides a single-pane-of-glass dashboard through which administrators configure, monitor, and manage up to 6,000 SD-WAN routers, branch devices, and edge nodes from one console.
As the management plane for an organization's entire WAN infrastructure, SD-WAN Manager is an exceptionally high-value target. Compromising it grants control over routing policies, VPN configurations, network segmentation, and traffic flows across the organization. An attacker with vManage administrator access can effectively reroute, intercept, or disrupt all traffic on the managed WAN.
CVE-2026-20122 is one of three Cisco SD-WAN Manager vulnerabilities added to CISA's KEV catalog on April 20, 2026 (alongside CVE-2026-20128 and CVE-2026-20133). All three are part of the same Cisco security advisory and have been exploited as part of a chained attack campaign against SD-WAN infrastructure.
Overview
CVE-2026-20122 is an incorrect use of privileged APIs vulnerability in the API interface of Cisco Catalyst SD-WAN Manager. An authenticated attacker with read-only credentials and API access can upload a malicious file via the API, which is then used to overwrite arbitrary files on the local file system, ultimately allowing the attacker to escalate privileges to vManage user level.
While a CVSS score of 5.4 might suggest moderate severity, this CVE is a critical link in the SD-WAN attack chain being actively exploited in the wild. Attackers chain it with CVE-2026-20133 (unauthenticated information disclosure) and CVE-2026-20128 (credential exposure) to achieve full management plane takeover.
Affected Versions
| Status | Cisco Catalyst SD-WAN Manager Version | Fixed In |
|---|---|---|
| Vulnerable | 20.9.x prior to 20.9.8.2 | 20.9.8.2 |
| Vulnerable | 20.10–20.12.x prior to 20.12.5.3 | 20.12.5.3 or 20.12.6.1 |
| Vulnerable | 20.13–20.15.x prior to 20.15.4.2 | 20.15.4.2 |
| Vulnerable | 20.16–20.18.x prior to 20.18.2.1 | 20.18.2.1 |
There are no workarounds for this vulnerability — upgrade is the only remediation.
Technical Details
The vulnerability is in the API interface of Cisco Catalyst SD-WAN Manager. The API is designed to allow authenticated users to perform management operations, including uploading configuration files and templates. However, the API's file handling logic does not properly restrict which files can be overwritten on the local filesystem.
An attacker with valid read-only API credentials (a lower-privilege level than full administrator) can:
- Upload a malicious file via a crafted API request
- Direct the file to overwrite an arbitrary file on the SD-WAN Manager filesystem
- Leverage the overwritten file to escalate privileges to vManage user level — a higher-privilege role
The CWE-648 classification ("Incorrect Use of Privileged APIs") reflects that the file handling API operates with elevated system privileges but does not enforce adequate access controls on what can be overwritten.
Attack characteristics:
- Authentication required: Yes — valid read-only API credentials
- Attack complexity: Low
- Network-accessible: Yes
- User interaction: None
The Three-CVE Attack Chain
Security researchers at Suzu Labs described the chained exploitation scenario involving all three Cisco SD-WAN CVEs added to KEV on April 20, 2026:
- CVE-2026-20133 (unauthenticated info disclosure): Enumerate sensitive files and configuration through the API without credentials
- CVE-2026-20128 (DCA credential exposure): Harvest the stored Data Collection Agent (DCA) user credentials from the accessible credential file
- CVE-2026-20122 (this CVE): Use the harvested DCA credentials as the "read-only API access" needed to upload and overwrite files, escalating to full vManage administrator
The full chain requires no initial credentials and results in complete SD-WAN management plane compromise — controlling the routing and configuration of the entire enterprise WAN.
Exploitation Context
Cisco confirmed active exploitation of CVE-2026-20122 and CVE-2026-20128 in early March 2026. This exploitation followed the earlier CISA Emergency Directive ED 26-03 (February 25, 2026), which was triggered by exploitation of the related CVE-2026-20127 (CVSS 10.0 — full authentication bypass). The SD-WAN Manager attack campaign represents a sustained, multi-CVE effort by threat actors to compromise enterprise WAN management infrastructure.
The three CVEs added to KEV on April 20, 2026 (CVE-2026-20122, CVE-2026-20128, CVE-2026-20133) were discovered by Arthur Vidineyev of Cisco's Advanced Security Initiatives Group (ASIG) during internal security testing.
Remediation
- Upgrade Cisco Catalyst SD-WAN Manager to the fixed version for your release train: 20.9.8.2, 20.12.5.3 (or 20.12.6.1), 20.15.4.2, or 20.18.2.1. Consult the Cisco Catalyst SD-WAN Upgrade Matrix for compatibility guidance.
- Follow CISA Emergency Directive ED 26-03 — the directive includes specific threat hunting procedures and hardening steps beyond just patching. See CISA ED 26-03.
- Implement network isolation — restrict access to the SD-WAN Manager web interface (typically port 443/8443) to only authorized administrator IP ranges via firewall ACLs. It should never be exposed to the public internet.
- Review API access logs for unusual file upload operations, unexpected API calls from read-only accounts, and privilege escalation indicators.
- Rotate all SD-WAN Manager credentials, including read-only API accounts, after patching — treat existing credentials as potentially compromised.
- If compromise is suspected: follow CISA's guidance to deploy new vManage/vSmart/vBond instances from clean patched images and migrate edge devices to the rebuilt infrastructure.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2026-20122 |
| Vendor / Product | Cisco — Catalyst SD-WAN Manager |
| NVD Published | 2026-02-25 |
| NVD Last Modified | 2026-04-21 |
| CVSS 3.1 Score | 5.4 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
| Severity | MEDIUM |
| CWE | CWE-648 — Incorrect Use of Privileged APIs |
| CISA KEV Added | 2026-04-20 |
| CISA KEV Deadline | 2026-04-23 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2026-02-25 | Cisco discloses CVE-2026-20122 alongside CVE-2026-20128 and CVE-2026-20133 in security advisory cisco-sa-sdwan-authbp-qwCX8D4v; CISA issues Emergency Directive ED 26-03 the same day |
| 2026-03-01 | Cisco confirms active exploitation of CVE-2026-20122 and CVE-2026-20128 in the wild |
| 2026-03-18 | Cisco updates security advisory (v1.2) with exploitation confirmation |
| 2026-04-20 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2026-04-23 | CISA BOD 22-01 remediation deadline (3-day window) |
References
| Resource | Type |
|---|---|
| NVD — CVE-2026-20122 | Vulnerability Database |
| Cisco Security Advisory — cisco-sa-sdwan-authbp-qwCX8D4v | Vendor Advisory / Patch |
| CISA Emergency Directive ED 26-03 — Mitigate Vulnerabilities in Cisco SD-WAN Systems | US Government |
| CISA Supplemental Direction ED 26-03 — Hunt & Hardening Guidance | US Government |
| Help Net Security — CISA Flags Cisco Catalyst SD-WAN Manager Bugs as Exploited | Press/Media Coverage |
| Hive Pro — Cisco Warns of Actively Exploited Flaws in Catalyst SD-WAN Manager | Security Research |
| SC Magazine — Cisco Catalyst SD-WAN Vulnerabilities and Attack Chaining | Press/Media Coverage |
| CISA KEV Catalog Entry | US Government |
| CISA BOD 22-01 | Remediation Directive |
| CWE-648 — Incorrect Use of Privileged APIs | Weakness Classification |