<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-20128 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-20128/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-20128/feed.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Catalyst SD-WAN Manager Password Disclosure Vulnerability (CVE-2026-20128)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cisco-sdwan-password-disclosure/</link><pubDate>Tue, 21 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cisco-sdwan-password-disclosure/</guid><description>Cisco Catalyst SD-WAN Manager stores passwords in a recoverable format, allowing an authenticated local attacker to gain DCA user privileges by accessing a credential file.</description><content:encoded><![CDATA[<p>Cisco Catalyst SD-WAN Manager is affected by a vulnerability (CVE-2026-20128) that allows for the disclosure of stored passwords. An authenticated, local attacker with low privileges can exploit this vulnerability by accessing a credential file on the filesystem. Successful exploitation grants the attacker DCA user privileges, potentially leading to unauthorized access and control over the SD-WAN environment. CISA has issued Emergency Directive 26-03 and associated guidance to mitigate risks associated with Cisco SD-WAN devices. This vulnerability highlights the importance of proper credential management and access controls in network management systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains low-privileged access to the Cisco Catalyst SD-WAN Manager system through legitimate credentials or other vulnerabilities.</li>
<li>The attacker navigates the filesystem to locate the DCA user&rsquo;s credential file.</li>
<li>The attacker reads the credential file, which contains the DCA user&rsquo;s password in a recoverable format.</li>
<li>The attacker decodes or decrypts the password using readily available tools or techniques.</li>
<li>The attacker uses the recovered DCA user credentials to authenticate to the SD-WAN Manager with elevated privileges.</li>
<li>The attacker leverages the DCA user privileges to perform unauthorized configuration changes or access sensitive data.</li>
<li>The attacker potentially pivots to other systems or network segments accessible through the SD-WAN infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to gain complete control over the Cisco Catalyst SD-WAN Manager. This could lead to significant disruption of network services, data breaches, and potential compromise of connected systems. The impact is magnified by the widespread use of SD-WAN in enterprise environments, making this a critical vulnerability for organizations utilizing Cisco Catalyst SD-WAN Manager.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review and apply the mitigations outlined in CISA&rsquo;s Emergency Directive 26-03 and associated guidance for Cisco SD-WAN devices, as referenced in the overview.</li>
<li>Monitor file access events on the Cisco Catalyst SD-WAN Manager system for suspicious access patterns to credential files using the <code>Detect Suspicious SD-WAN Credential File Access</code> Sigma rule.</li>
<li>Implement stricter access controls and password policies on the Cisco Catalyst SD-WAN Manager to prevent unauthorized access.</li>
<li>Apply the security updates provided by Cisco to patch CVE-2026-20128 as they become available.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-20128</category><category>credential-access</category><category>sd-wan</category><category>cisco</category></item></channel></rss>