Lyrie
active-exploitation
ACTIVELY EXPLOITED3 sources verified·4 min read
By Lyrie Threat Intelligence·4/20/2026

What happened

CISA added CVE-2026-20122 to the Known Exploited Vulnerabilities (KEV) catalog on 2026-04-20, confirming active exploitation in the wild CISA KEV. The entry targets Cisco Catalyst SD-WAN Manager and describes an “incorrect use of privileged APIs” stemming from improper file handling on the API interface CISA KEV. According to the KEV description, an attacker can upload a malicious file to the local filesystem and overwrite arbitrary files, resulting in vmanage user privileges on the affected system CISA KEV.

CISA assigned a remediation due date of 2026-04-23 for federal agencies and issued required actions tied to its Cisco SD-WAN emergency directive and hardening guidance CISA KEV. The weakness aligns with incorrect privileged API usage (CWE-648), as noted in public CVE records for the identifier NVD CVE-2026-20122 and the canonical CVE entry MITRE CVE.

Why it matters

A confirmed-exploited KEV listing means real adversaries are abusing this flaw now, not hypothetically CISA KEV. The impact is direct control escalation on the SD-WAN Manager host via arbitrary file overwrite and acquisition of vmanage user privileges CISA KEV. File-overwrite routes are high-leverage because they can redirect execution paths, plant configuration changes, or tamper with service behavior on the target system, all from an API-access vector NVD CVE-2026-20122.

For federal agencies, KEV inclusion drives mandatory action with an aggressive deadline, tied to CISA’s emergency directive for Cisco SD-WAN systems and its supplemental hunt-and-hardening guidance ED 26-03 and Hunt & Hardening Guidance. Private-sector operators should track the same guidance because exploitation activity has already crossed the threshold required for KEV listing CISA KEV.

Technical detail

Per the KEV entry, the root issue is “incorrect use of privileged APIs” triggered by improper file handling on the API interface of Cisco Catalyst SD-WAN Manager CISA KEV. An adversary can upload a malicious file to the local filesystem through the product’s API, then leverage that path to overwrite arbitrary files on the system CISA KEV. A successful exploit yields vmanage user privileges on the affected host, granting elevated operational control in the application context CISA KEV.

The vulnerability maps to CWE-648 (Incorrect Use of Privileged APIs) in public records for the CVE, reinforcing that the flaw arises from invoking privileged operations without proper safeguards in the API workflow NVD CVE-2026-20122. The CVE record is established and tracked by the CVE Program, confirming the identifier and scope MITRE CVE.

Because the exploitation vector is an API-enabled file upload, the blast radius centers on files the application can touch and any privileged code paths reachable via those files CISA KEV. That makes integrity monitoring of application-managed paths and strict validation of uploaded content critical while remediation is in progress ED 26-03.

Defense

CISA’s KEV entry mandates federal agencies follow Emergency Directive 26-03 and the associated Cisco SD-WAN hunt-and-hardening guidance on an expedited timeline CISA KEV. Start with the directive and supplemental guidance, then execute mitigations and hunts as prescribed ED 26-03 and Hunt & Hardening Guidance.

Interim hardening and detection priorities (until vendor remediation is fully applied):

  • Restrict and authenticate access to SD-WAN Manager API endpoints; prefer management-plane isolation and least privilege while patching ED 26-03.
  • Instrument file integrity monitoring on application-owned directories to catch unexpected overwrites initiated by API calls CISA KEV.
  • Alert on API file-upload events that result in writes outside expected safe paths (e.g., config/cache/upload temp) to detect arbitrary write behavior NVD CVE-2026-20122.
  • Review system accounts and tokens associated with vmanage user privileges for anomalous creation or escalation during the exposure window CISA KEV.
  • Execute targeted hunts from CISA’s supplemental guidance specific to Cisco SD-WAN systems to identify compromise artifacts Hunt & Hardening Guidance.

Verification and closure should reference the CVE record and KEV catalog to confirm scope, timelines, and remediation status tracking MITRE CVE and CISA KEV.

Lyrie Verdict

This is an API-to-filesystem exploit path that adversaries can chain and scale with automation; human-speed response will miss the window between upload and privilege gain CISA KEV. Lyrie’s stance: treat API-origin file writes as high-fidelity signals and enforce autonomous interdiction at machine speed. Concretely, auto-correlate SD-WAN Manager API upload calls to real-time filesystem telemetry, block or sandbox writes that deviate from allowed directories, and trigger immediate containment on first arbitrary-write attempt tied to this CVE’s behavior NVD CVE-2026-20122. Pair that with continuous privilege-monitoring to kill escalations into vmanage user contexts without waiting for analyst review ED 26-03.

Lyrie Verdict

API-driven file uploads leading to arbitrary write and vmanage privileges demand autonomous controls. Lyrie correlates upload calls to filesystem writes in real time, blocks out-of-policy paths instantly, and auto-quarantines hosts upon first privilege-escalation signal—closing the gap adversaries exploit at machine speed.