Skip to main content
Mallory
Mallory

Actively Exploited Critical Vulnerabilities in Cisco Secure Firewall and Catalyst SD-WAN Manager

catalyst sd-wan managercisco secure firewallsd-wanciscoactive exploitationvulnerabilityinternet-exposedremote code executionauthentication bypassfirepowerpatchingmanagement planesql injectionbuffer overflowftd
Updated March 6, 2026 at 09:04 AM2 sources
Actively Exploited Critical Vulnerabilities in Cisco Secure Firewall and Catalyst SD-WAN Manager

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Belgium’s CCB (Safeonweb) warned of multiple critical vulnerabilities across several Cisco products—specifically calling out Cisco Secure Firewall (including Adaptive Security Appliance (ASA), Firepower Management Center (FMC), and Firepower Threat Defense (FTD)) and Cisco Catalyst SD-WAN Manager—and stated that some vulnerabilities are being actively exploited, urging immediate patching. The advisory lists a broad set of weakness classes including authentication bypass (CWE-288/CWE-287), deserialization of untrusted data (CWE-502), buffer overflow (CWE-120), SQL injection (CWE-89), and sensitive information exposure (CWE-200), and highlights multiple CVEs including CVE-2026-20079 and CVE-2026-20131 with CVSS 10.0.

A separate advisory from the Center for Internet Security (CIS) also reported multiple vulnerabilities in Cisco products that could enable remote code execution, enumerating a large set of related CVEs (including CVE-2026-20001, CVE-2026-20002, CVE-2026-20003, and CVE-2026-20039). Taken together, the advisories indicate a high-risk patching priority for organizations running affected Cisco network/security management and firewall platforms, particularly where internet exposure or untrusted management-plane access could make exploitation more likely.

Related Entities

Vulnerabilities

Arbitrary File Overwrite in Cisco Catalyst SD-WAN Manager API (CVE-2026-20122)Cisco Catalyst SD-WAN Manager DCA Credential File Exposure Privilege Escalation (CVE-2026-20128)DoS via crafted HTTP to Remote Access SSL VPN Lua interpreter in Cisco ASA/FTD (CVE-2026-20100)DoS in Cisco Secure Firewall ASA embryonic connection limit handling (TCP SYN flood) (CVE-2026-20082)Authentication bypass to root command/script execution in Cisco Secure Firewall Management Center (FMC) web interface (CVE-2026-20079)Authenticated SQL injection in Cisco Secure Firewall Management Center (FMC) REST API (CVE-2026-20001)DoS via crafted SAML messages in Cisco Secure Firewall ASA/FTD SAML SSO (CVE-2026-20101)Unauthenticated Remote DoS via memory exhaustion in Cisco ASA/FTD Remote Access SSL VPN (CVE-2026-20106)Authenticated SQL injection in Cisco Secure FMC web-based management interface (CVE-2026-20002)Unauthenticated Java Deserialization RCE in Cisco Secure Firewall Management Center (FMC) Web UI (CVE-2026-20131)DoS in Cisco Secure Firewall ASA/FTD VPN web server via crafted HTTP request flood (CVE-2026-20039)DoS via memory exhaustion in Cisco Secure Firewall ASA/FTD Remote Access SSL VPN (CVE-2026-20103)DoS via memory exhaustion in Cisco ASA/FTD Remote Access SSL VPN (CVE-2026-20105)Authenticated SQL injection in Cisco Secure FMC REST API (CVE-2026-20003)DoS via Snort 3 SSL packet inspection memory management logic error in Cisco Secure Firewall FTD (CVE-2026-20052)DoS in Snort 3 VBA decompression error handling (infinite loop) (CVE-2026-20054)Authenticated IKEv2 DoS in Cisco Secure Firewall ASA/FTD (CVE-2026-20014)DoS via OSPF packet parsing in Cisco Secure Firewall ASA/FTD (CVE-2026-20021)DoS in Cisco Snort 3 VBA decompression error handling (CVE-2026-20058)SSH key-based authentication bypass in Cisco Secure Firewall ASA proprietary SSH stack (CVE-2026-20009)DoS in Cisco Snort 3 Detection Engine via crafted HTTP mDNS header parsing (CVE-2026-20067)Arbitrary file write as root via path traversal in Cisco Secure Firewall FMC/FTD sftunnel file synchronization (CVE-2026-20018)DoS via OSPF LSU out-of-bounds write in Cisco Secure Firewall ASA/FTD (OSPF canonicalization debug) (CVE-2026-20022)DoS in Cisco ASA/FTD IPsec IKEv2 GCM traffic processing (insufficient memory allocation) (CVE-2026-20049)DoS via heap overflow in Snort 3 VBA decompression (Cisco products) (CVE-2026-20053)Lua code injection leading to root RCE in Cisco Secure Firewall ASA/FTD CLI commands (CVE-2026-20008)DoS in Cisco Secure Firewall FTD SSL Decryption Do Not Decrypt exclusion (TLS 1.2) (CVE-2026-20050)OSPF heap corruption DoS in Cisco Secure Firewall ASA/FTD (CVE-2026-20024)DoS in Cisco Snort 3 Detection Engine via crafted SSL handshake parsing (CVE-2026-20005)DoS in Snort 3 Detection Engine via crafted VBA decompression data (CVE-2026-20057)Snort deep packet inspection rule bypass in Cisco Secure Firewall Threat Defense (FTD) (CVE-2026-20007)DoS via crafted OSPF LSU packets in Cisco Secure Firewall ASA/FTD (heap corruption) (CVE-2026-20025)Cisco Secure Firewall ASA multiple context mode SCP cross-context file access (CVE-2026-20062)ACL bypass in Cisco Secure Firewall ASA/FTD clustering rule replication (CVE-2026-20073)DoS via crafted RPC parsing in Snort 3 detection engine (Cisco products) (CVE-2026-20068)Authenticated command injection in Cisco FXOS CLI for Cisco Secure Firewall ASA/FTD (CVE-2026-20016)DoS via Snort 3 Detection Engine binder module initialization logic (Cisco products) (CVE-2026-20065)Cisco Secure Firewall ASA/FTD IKEv2 Memory Exhaustion DoS (CVE-2026-20013)Client-side request smuggling in Cisco Secure Firewall ASA/FTD VPN web services (CVE-2026-20069)OSPF update packet processing buffer overflow DoS in Cisco Secure Firewall ASA/FTD (CVE-2026-20020)DoS via OSPF packet parsing memory corruption in Cisco Secure Firewall ASA/FTD (CVE-2026-20023)DoS via IKEv2 packet parsing memory leak in Cisco Secure Firewall ASA/FTD (CVE-2026-20015)Authenticated CLI command injection in Cisco Secure FTD Software (root OS command execution) (CVE-2026-20017)XSS in Cisco Secure Firewall ASA/FTD VPN web services (CVE-2026-20070)DoS in Snort 3 Detection Engine via JSTokenizer HTTP JavaScript normalization (CVE-2026-20066)Authenticated command injection in Cisco Secure Firewall Management Center (FMC) lockdown remediation modules (CVE-2026-20044)DoS via crafted TLS packet in Snort 3 Detection Engine (Cisco Secure Firewall FTD) (CVE-2026-20006)Reflected XSS in Cisco Secure Firewall ASA/FTD SAML 2.0 SSO (CVE-2026-20102)Authenticated CLI input validation DoS in Cisco Secure Firewall Threat Defense (FTD) (CVE-2026-20064)Authenticated CLI command injection in Cisco Secure FTD (root OS command execution) (CVE-2026-20063)Authentication Bypass in Cisco Catalyst SD-WAN Manager API (CVE-2026-20129)Unauthenticated Information Disclosure in Cisco Catalyst SD-WAN Manager API (CVE-2026-20133)Privilege Escalation to Root in Cisco Catalyst SD-WAN Manager REST API (CVE-2026-20126)

Related Stories

Cisco Patches Critical Firewall Management RCE Vulnerabilities

Cisco Patches Critical Firewall Management RCE Vulnerabilities

Cisco released emergency fixes for two **critical (CVSS 10.0)** vulnerabilities in its firewall management software that could allow **remote, unauthenticated attackers** to execute code and gain **root-level** access to the underlying operating system. The issues are tracked as `CVE-2026-20079` and `CVE-2026-20131`, and reporting emphasized the risk profile given Cisco’s widespread deployment in large enterprises and the historical interest of sophisticated actors in rapidly weaponizing Cisco bugs. Available reporting stated there were **no confirmed in-the-wild exploitation** reports at the time of publication, but urged rapid patching due to the combination of unauthenticated reachability and full compromise potential. Separate coverage packaged the Cisco flaws alongside other weekly security items (e.g., Tycoon2FA infrastructure takedown and other incidents), but the Cisco item consistently described the same two maximum-severity firewall management vulnerabilities and their impact (RCE leading to root access).

1 weeks ago
Active Exploitation of Cisco Catalyst SD-WAN Manager Vulnerabilities

Active Exploitation of Cisco Catalyst SD-WAN Manager Vulnerabilities

Cisco and U.S./U.K./Five Eyes cyber agencies warned of an ongoing campaign targeting **Cisco Catalyst SD-WAN** deployments, with exploitation confirmed dating back to at least 2023 and attributed by Cisco to a highly sophisticated actor tracked as **UAT-8616**. The activity has been described as posing an “unacceptable” risk to federal networks and broader global environments because compromise of SD-WAN/edge infrastructure can enable deep network access, traffic interception, and operational disruption. Cisco updated its advisories to state that **CVE-2026-20127** (critical auth bypass) has been exploited as a zero-day, enabling attackers to compromise SD-WAN controllers and add **rogue peers** that appear legitimate to facilitate further intrusion. Cisco also flagged additional *Catalyst SD-WAN Manager (vManage)* issues as actively exploited: **CVE-2026-20122** (high-severity arbitrary file overwrite requiring valid read-only/API credentials) and **CVE-2026-20128** (information disclosure requiring local access with valid vManage credentials). Agencies and Cisco urged urgent mitigation including inventorying affected devices, applying fixed releases/patches, retaining and reviewing logs, and hunting for indicators of compromise; CISA also issued **Emergency Directive `26-03`** for federal agencies.

1 weeks ago
Active exploitation of Cisco Catalyst SD-WAN authentication bypass (CVE-2026-20127)

Active exploitation of Cisco Catalyst SD-WAN authentication bypass (CVE-2026-20127)

Government and vendor advisories warned of **active, in-the-wild exploitation** of a critical **improper authentication / authentication bypass** vulnerability in **Cisco Catalyst SD-WAN** (tracked as `CVE-2026-20127`) affecting the **Catalyst SD-WAN Controller** (formerly *vSmart*) and related SD-WAN components. The flaw is in the **peering authentication process** and can allow an **unauthenticated remote attacker** to send crafted requests that result in access as an internal, high-privileged (non-root) administrative account, enabling actions such as **NETCONF access** and manipulation of SD-WAN fabric configuration; multiple national CERT/CSIRT bodies (including Canada’s Cyber Centre and France’s CERT-FR) urged immediate patching or migration off end-of-maintenance releases, noting some affected trains will not receive fixes. Cisco Talos attributed observed exploitation and post-compromise activity to a sophisticated actor tracked as **UAT-8616**, with evidence suggesting activity dating back to **2023**. Partner reporting and CISA guidance described a broader intrusion chain in which actors use `CVE-2026-20127` for initial access, then escalate privileges and persistence—reportedly including **software version downgrade** tactics and subsequent exploitation of `CVE-2022-20775`—leading to **root access** and long-term footholds in SD-WAN environments. CISA added both `CVE-2026-20127` and `CVE-2022-20775` to the **Known Exploited Vulnerabilities (KEV)** catalog and, via **Emergency Directive ED 26-03**, required U.S. FCEB agencies to inventory in-scope Cisco SD-WAN systems, collect forensic artifacts (e.g., snapshots/logs), patch, and assess for compromise; international partners echoed similar hunt-and-mitigate actions.

2 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.