Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
Cybersecurity: Threats and Defences
30APR

CISA gives Cisco SD-WAN three days to patch

3 min read
08:16UTC

On 20 April, CISA added three Cisco Catalyst SD-WAN Manager CVEs to the KEV catalogue with a three-day federal remediation deadline of 23 April.

TechnologyDeveloping
Key takeaway

Three days for SD-WAN patches against the same vendor whose perimeter line is below the patch layer.

CISA added three Cisco Catalyst SD-WAN Manager vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalogue on Monday 20 April with a three-day federal remediation deadline, the shortest of the window 1. CVE-2026-20122 is an API privilege escalation; CVE-2026-20133 is sensitive information exposure; CVE-2026-20128 is a password storage flaw. All three sit in Cisco's software-defined wide-area network management plane, the orchestrator that pushes policy to branch-office routers across an enterprise estate.

KEV catalogue size has now reached 1,585 entries with 16 additions in the thirteen-day window, running at roughly 1.2 per day. The same emergency cadence applied to CitrixBleed 3 on 23 March and to the F5 BIG-IP APM reclassification on 14 April . The pace has not slowed despite the proposed FY27 CISA budget cut ; the operational tempo is being held against a workforce reduction.

The contrast with the FIRESTARTER cluster is what changes the CISO's procurement maths. The same vendor whose ASA and Firepower line hosts a nation-state-tier implant below the patch layer also has an SD-WAN trio caught by fast patching against opportunistic-tier actors. CISA's SD-WAN deadline shows the patching tier still functioning against opportunistic actors, while AA26-113A shows the eviction tier failing against the FIRESTARTER actor. For any organisation buying Cisco for both perimeter security and SD-WAN, the two stories converge on the same change-control queue: SD-WAN devices need to be patched on a stopwatch, and ASA devices need to be unplugged and audited from cold start. The single-vendor stack conversation gets harder in that week.

Deep Analysis

In plain English

Cisco's SD-WAN Manager is the control system that tells a company's branch-office routers what to do. Three security flaws in that control system were added to a US government emergency list, and federal agencies were given just three days to fix them. Three days is unusually short: it signals the government had evidence that hackers were already actively exploiting these flaws against real targets, not running exploratory probes.

Deep Analysis
Root Causes

Cisco Catalyst SD-WAN Manager is the centralised policy orchestrator for software-defined wide-area networks. Its API privilege escalation, information exposure, and password storage vulnerabilities sit at the intersection of two structural problems: the management plane is accessible from enterprise network segments that also carry user traffic, and the SD-WAN Manager's elevated privilege means a single compromised credential produces network-wide policy control.

The SD-WAN Manager also sits inside the same change-control queue as the perimeter firewalls whose patch cycle FIRESTARTER exploited. The shortest KEV deadline of the window signals that exploitation of these CVEs produces immediate enterprise-wide impact rather than limited device-specific impact.

What could happen next?
  • Consequence

    Any enterprise running Cisco Catalyst SD-WAN Manager needs emergency change control for three CVEs simultaneously, adding to the existing ASA/Firepower cold-start audit burden from the FIRESTARTER cluster.

  • Risk

    Organisations that process Cisco SD-WAN patches on the standard 30-day enterprise change-control cycle will remain exposed to confirmed active exploitation for weeks after the KEV deadline.

First Reported In

Update #2 · FIRESTARTER puts Cisco below the patch line

CISA· 30 Apr 2026
Read original
Different Perspectives
Norwegian Security and Service Organisation
Norwegian Security and Service Organisation
NSSO was a prior victim of Ivanti EPMM zero-days and now faces CVE-2026-6973 in the same product line. Ivanti's position that on-premises EPMM is the only affected tier provides limited reassurance to a government body that has already been compromised twice via the same vendor's MDM infrastructure.
ENISA and EU CNA Ecosystem
ENISA and EU CNA Ecosystem
ENISA onboarded four new CVE Numbering Authorities under ENISA Root on 6 May, expanding EU-sovereign vulnerability disclosure infrastructure in the same week three critical CVEs entered the CISA KEV catalogue. Greater CNA coverage inside the EU reduces dependence on US-anchored MITRE for European-sourced vulnerability identifiers.
German Federal Office for Information Security (BSI)
German Federal Office for Information Security (BSI)
BSI rated CVE-2026-41940 in cPanel 'very high', reflecting Germany's exposure across shared-hosting infrastructure for Mittelstand businesses. The 65-day zero-day window and the amplification effect of cPanel's multi-tenancy model mean the BSI rating applies to thousands of German SME websites hosted on affected servers.
Republic of Korea National Intelligence Service
Republic of Korea National Intelligence Service
South Korea's NIS tracks UNC1069's tooling evolution; the CSIS paper argues the ROK's intelligence on DPRK cyber operations should feed joint US-ROK situational awareness rather than bilateral channels that move too slowly for real-time supply-chain response.
Democratic People's Republic of Korea
Democratic People's Republic of Korea
UNC1069's Axios operation scales North Korea's supply-chain access from niche Python packages to the most downloaded HTTP client in the JavaScript ecosystem. WAVESHAPER.V2 provides persistent access to development environments where cryptocurrency wallets and API keys are stored, serving the sanctions-evasion funding logic behind earlier DPRK toolchain operations.
WatchTowr Labs
WatchTowr Labs
WatchTowr Labs disclosed CVE-2026-41940 after the 28 April patch shipped, providing the 65-day exploitation timeline from KnownHost telemetry. The disclosure is textbook; the open question is why WebPros did not catch the cpsrvd CRLF class flaw before external researchers found it under active exploitation.