CISA added three Cisco Catalyst SD-WAN Manager vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalogue on Monday 20 April with a three-day federal remediation deadline, the shortest of the window 1. CVE-2026-20122 is an API privilege escalation; CVE-2026-20133 is sensitive information exposure; CVE-2026-20128 is a password storage flaw. All three sit in Cisco's software-defined wide-area network management plane, the orchestrator that pushes policy to branch-office routers across an enterprise estate.
KEV catalogue size has now reached 1,585 entries with 16 additions in the thirteen-day window, running at roughly 1.2 per day. The same emergency cadence applied to CitrixBleed 3 on 23 March and to the F5 BIG-IP APM reclassification on 14 April . The pace has not slowed despite the proposed FY27 CISA budget cut ; the operational tempo is being held against a workforce reduction.
The contrast with the FIRESTARTER cluster is what changes the CISO's procurement maths. The same vendor whose ASA and Firepower line hosts a nation-state-tier implant below the patch layer also has an SD-WAN trio caught by fast patching against opportunistic-tier actors. CISA's SD-WAN deadline shows the patching tier still functioning against opportunistic actors, while AA26-113A shows the eviction tier failing against the FIRESTARTER actor. For any organisation buying Cisco for both perimeter security and SD-WAN, the two stories converge on the same change-control queue: SD-WAN devices need to be patched on a stopwatch, and ASA devices need to be unplugged and audited from cold start. The single-vendor stack conversation gets harder in that week.
