Cisco Security Advisory - Critical Vulnerabilities Update

Cisco has updated its security advisory to address critical vulnerabilities across several products, including the Catalyst SD-WAN and Nexus series, while also patching severe flaws in Identity Services and Webex that could lead to arbitrary code execution.

VulnerabilitiesCRITICALUpdated: Published: πŸ“° 2 sources
Featured image for Cisco Security Advisory - Critical Vulnerabilities Update

Original Reporting

CCCanadian Cyber Centre Alerts

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Cisco found serious security holes in some of its products that hackers could use to break in and take control. They’ve released updates to fix these problems, and it's super important for users to install them right away to keep their systems safe.

The Flaw

On February 25, 2026, Cisco published security advisories to address critical vulnerabilities in several products, including the Cisco Catalyst SD-WAN Controller, Catalyst SD-WAN Manager, Nexus 3600 and 9500-R Switching Platform, Nexus 9000 Series Fabric Switches, and UCS Software. Notably, CVE-2026-20127 has been confirmed as exploited in the wild. Recent updates have added CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133 to the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Database.

In addition to these vulnerabilities, Cisco has announced patches for four critical security flaws affecting Identity Services and Webex Services. These include:

  • CVE-2026-20184 (CVSS score: 9.8): An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services, allowing an unauthenticated attacker to impersonate any user.
  • CVE-2026-20147 (CVSS score: 9.9): An insufficient validation of user-supplied input in Identity Services Engine (ISE) that could allow an authenticated attacker to execute arbitrary code.
  • CVE-2026-20180 and CVE-2026-20186 (CVSS scores: 9.9): Multiple insufficient validation vulnerabilities in ISE that could allow an authenticated attacker to execute commands on the operating system of an affected device.

What's at Risk

The vulnerabilities in the Catalyst and Nexus products could lead to significant disruptions in network operations, including denial of service conditions. The Identity Services and Webex flaws pose severe risks, as they could enable unauthorized access and control over user accounts, potentially leading to data breaches or further exploitation within corporate networks.

Patch Status

Cisco has released patches for the affected products. Users are encouraged to update their systems to the latest versions to mitigate risks. Specifically, for the Identity Services vulnerabilities, users must migrate to fixed releases as specified in the advisory. CVE-2026-20184 does not require customer action as it is cloud-based, but those using SSO should upload a new identity provider SAML certificate.

Immediate Actions

Organizations using affected Cisco products should:

  1. Review the advisories and apply the necessary updates immediately.
  2. For Identity Services users, ensure migration to the specified patched releases.
  3. Monitor for any unusual activity that may indicate exploitation attempts.
  4. Stay informed through CISA updates and Cisco advisories regarding any further developments or additional vulnerabilities that may arise.

πŸ”’ Pro Insight

The recent vulnerabilities underscore the importance of timely patch management and proactive monitoring for organizations using Cisco products, especially in light of confirmed exploits in the wild.

Related Pings