<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Catalyst SD-WAN Manager — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/catalyst-sd-wan-manager/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/catalyst-sd-wan-manager/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-sdwan-password-disclosure/</link><pubDate>Tue, 21 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-sdwan-password-disclosure/</guid><description>Cisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.</description><content:encoded><![CDATA[<p>Cisco Catalyst SD-WAN Manager is affected by a vulnerability (CVE-2026-20128) that allows for the disclosure of stored passwords. An authenticated, local attacker with low privileges can exploit this vulnerability by accessing a credential file on the filesystem. Successful exploitation grants the attacker DCA user privileges, potentially leading to unauthorized access and control over the SD-WAN environment. CISA has issued Emergency Directive 26-03 and associated guidance to mitigate risks associated with Cisco SD-WAN devices. This vulnerability highlights the importance of proper credential management and access controls in network management systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains low-privileged access to the Cisco Catalyst SD-WAN Manager system through legitimate credentials or other vulnerabilities.</li>
<li>The attacker navigates the filesystem to locate the DCA user&rsquo;s credential file.</li>
<li>The attacker reads the credential file, which contains the DCA user&rsquo;s password in a recoverable format.</li>
<li>The attacker decodes or decrypts the password using readily available tools or techniques.</li>
<li>The attacker uses the recovered DCA user credentials to authenticate to the SD-WAN Manager with elevated privileges.</li>
<li>The attacker leverages the DCA user privileges to perform unauthorized configuration changes or access sensitive data.</li>
<li>The attacker potentially pivots to other systems or network segments accessible through the SD-WAN infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over the Cisco Catalyst SD-WAN Manager. This could lead to significant disruption of network services, data breaches, and potential compromise of connected systems. The impact is magnified by the widespread use of SD-WAN in enterprise environments, making this a critical vulnerability for organizations utilizing Cisco Catalyst SD-WAN Manager.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and apply the mitigations outlined in CISA&rsquo;s Emergency Directive 26-03 and associated guidance for Cisco SD-WAN devices, as referenced in the overview.</li>
<li>Monitor file access events on the Cisco Catalyst SD-WAN Manager system for suspicious access patterns to credential files using the <code>Detect Suspicious SD-WAN Credential File Access</code> Sigma rule.</li>
<li>Implement stricter access controls and password policies on the Cisco Catalyst SD-WAN Manager to prevent unauthorized access.</li>
<li>Apply the security updates provided by Cisco to patch CVE-2026-20128 as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-20128</category><category>credential-access</category><category>sd-wan</category><category>cisco</category></item><item><title>Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-sdwan-info-disclosure/</link><pubDate>Fri, 19 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-sdwan-info-disclosure/</guid><description>Cisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.</description><content:encoded><![CDATA[<p>Cisco Catalyst SD-WAN Manager is susceptible to an information disclosure vulnerability, identified as CVE-2026-20133. The vulnerability allows unauthorized remote attackers to potentially gain access to sensitive information residing on affected systems. While the exact nature of the disclosed information isn&rsquo;t specified in the advisory, it could encompass configuration details, user credentials, or other sensitive data critical for the secure operation of the SD-WAN environment. CISA has issued Emergency Directive 26-03 and associated guidance, highlighting the severity and urging immediate action. The directive impacts organizations utilizing Cisco SD-WAN devices and emphasizes the need for thorough risk assessment and implementation of provided mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Vulnerability Discovery:</strong> An attacker identifies a publicly accessible endpoint or API within the Cisco Catalyst SD-WAN Manager that is vulnerable to CVE-2026-20133.</li>
<li><strong>Unauthorized Request:</strong> The attacker crafts a malicious HTTP request targeting the vulnerable endpoint, exploiting the lack of proper authorization checks or input validation.</li>
<li><strong>Information Exposure:</strong> The SD-WAN Manager processes the request and, due to the vulnerability, inadvertently discloses sensitive information. This could be in the form of a file, database content, or API response.</li>
<li><strong>Data Extraction:</strong> The attacker captures the exposed data from the response, potentially including configuration files, usernames, passwords, or other sensitive credentials.</li>
<li><strong>Credential Compromise:</strong> The attacker uses the extracted credentials to gain unauthorized access to other systems within the SD-WAN environment or the broader network.</li>
<li><strong>Lateral Movement:</strong> Leveraging compromised credentials, the attacker moves laterally across the network, targeting critical systems and data.</li>
<li><strong>Data Exfiltration / System Compromise:</strong> The attacker exfiltrates sensitive data or achieves complete system compromise, depending on the attacker&rsquo;s objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-20133 can lead to significant consequences, including the compromise of sensitive data, unauthorized access to critical systems, and potential disruption of network operations. Given the central role of SD-WAN managers in controlling network traffic and security policies, a successful attack can have a wide-ranging impact. The number of potentially affected organizations is substantial due to the widespread adoption of Cisco SD-WAN solutions. The impact can include data breaches, financial loss, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately assess your exposure to CVE-2026-20133 by following CISA’s Emergency Directive 26-03 mitigation instructions.</li>
<li>Apply the necessary patches or workarounds provided by Cisco to remediate the vulnerability as outlined in Cisco&rsquo;s security advisory.</li>
<li>If patches are unavailable or cannot be immediately applied, implement the hardening guidance provided in CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices”.</li>
<li>For cloud-based deployments, adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.</li>
<li>Deploy the following Sigma rule to detect suspicious HTTP requests targeting potential vulnerable endpoints of the Cisco Catalyst SD-WAN Manager.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>cisco</category><category>sd-wan</category></item></channel></rss>