Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20128: Storing Passwords in a Recoverable Format in Cisco Cisco Catalyst SD-WAN Manager

0
High
VulnerabilityCVE-2026-20128cvecve-2026-20128
Published: Wed Feb 25 2026 (02/25/2026, 16:14:12 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Catalyst SD-WAN Manager

Description

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain DCA user privileges on an affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/22/2026, 00:08:45 UTC

Technical Analysis

CVE-2026-20128 is a vulnerability identified in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager. The root cause is the presence of a credential file on affected systems that stores the DCA user's password in a recoverable format. An unauthenticated remote attacker can exploit this by sending a specially crafted HTTP request to the vulnerable system, which allows reading the credential file and extracting the DCA password. With these credentials, the attacker can gain DCA user privileges, enabling access to other systems managed by the SD-WAN Manager. This vulnerability affects a wide range of Cisco Catalyst SD-WAN Manager versions prior to 20.18, which has addressed the issue. The vulnerability is notable because it does not require prior authentication or user interaction, making it easier to exploit if the system is reachable over the network. The CVSS v3.1 score is 7.5 (high), reflecting the significant impact on confidentiality, integrity, and availability, as well as the complexity and privileges required for exploitation. The vulnerability enables attackers to perform lateral movement within the network, potentially leading to broader compromise of SD-WAN infrastructure and connected networks. No known exploits in the wild have been reported yet, but the extensive list of affected versions and the critical nature of the SD-WAN Manager in network operations make this a serious threat. Cisco recommends upgrading to version 20.18 or later to mitigate this issue.

Potential Impact

The vulnerability poses a significant risk to organizations using affected versions of Cisco Catalyst SD-WAN Manager. By gaining DCA user privileges, attackers can compromise the confidentiality of sensitive network management credentials, potentially leading to unauthorized access to network infrastructure. This can result in integrity violations, such as unauthorized configuration changes, and availability impacts if attackers disrupt SD-WAN services. The ability to move laterally across systems increases the attack surface and risk of widespread network compromise. Organizations relying on SD-WAN for critical connectivity and network segmentation may face operational disruptions, data breaches, and increased exposure to further attacks. The broad range of affected versions means many deployments worldwide could be vulnerable, especially in enterprises, service providers, and government networks that use Cisco SD-WAN solutions. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the urgency for remediation.

Mitigation Recommendations

1. Upgrade Cisco Catalyst SD-WAN Manager to version 20.18 or later, which addresses this vulnerability. 2. If immediate upgrade is not feasible, restrict network access to the SD-WAN Manager's management interfaces using firewalls or access control lists to limit exposure to trusted hosts only. 3. Monitor network traffic for unusual HTTP requests targeting the DCA feature and implement intrusion detection/prevention systems with signatures for this vulnerability. 4. Audit and rotate credentials associated with the DCA user to reduce the risk of compromised passwords being reused. 5. Employ network segmentation to isolate management systems from general user and internet-facing networks. 6. Regularly review and harden configurations of SD-WAN Manager to minimize unnecessary services and exposure. 7. Implement logging and alerting on access to credential files or unusual file read operations on the SD-WAN Manager. 8. Conduct penetration testing and vulnerability scanning focused on SD-WAN infrastructure to detect potential exploitation attempts. These steps go beyond generic advice by focusing on immediate containment, credential hygiene, and proactive detection tailored to the vulnerability's exploitation method.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.379Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6fb7ef31ef0b5556a4

Added to database: 2/25/2026, 9:36:47 PM

Last enriched: 3/22/2026, 12:08:45 AM

Last updated: 4/11/2026, 6:23:32 PM

Views: 181

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses