The expert warned, “We expect activity to continue as part of the typical long tail of exploitation, as more threat actors become involved,” adding, “With mass and opportunistic exploitation at play, any exposed system should be considered compromised until proven otherwise.”Cisco this week updated a February 25 advisory to inform customers about the exploitation oftwo additional Catalyst SD-WAN vulnerabilities, which can be exploited by authenticated attackers for privilege escalation: CVE-2026-20128 and CVE-2026-20122.The company has not shared any details on the attacks exploiting these vulnerabilities, but its description indicates they have been chained with other flaws.It’s unclear if the same threat actor is behind all of the campaigns targeting Catalyst SD-WAN vulnerabilities. Cisco recently warned that a zero-day in Secure Email Gateway appliances had beenexploited by China-linked hackers, but again, it’s unclear if the attacks are in any way related.Related:China-Linked Hackers Exploiting Zero-Day in Cisco Security GearRelated:Cisco Patches Critical Vulnerabilities in Enterprise Networking ProductsRelated:Cisco, F5 Patch High-Severity Vulnerabilities

Cisco this week updated a February 25 advisory to inform customers about the exploitation oftwo additional Catalyst SD-WAN vulnerabilities, which can be exploited by authenticated attackers for privilege escalation: CVE-2026-20128 and CVE-2026-20122.The company has not shared any details on the attacks exploiting these vulnerabilities, but its description indicates they have been chained with other flaws.It’s unclear if the same threat actor is behind all of the campaigns targeting Catalyst SD-WAN vulnerabilities. Cisco recently warned that a zero-day in Secure Email Gateway appliances had beenexploited by China-linked hackers, but again, it’s unclear if the attacks are in any way related.Related:China-Linked Hackers Exploiting Zero-Day in Cisco Security GearRelated:Cisco Patches Critical Vulnerabilities in Enterprise Networking ProductsRelated:Cisco, F5 Patch High-Severity Vulnerabilities

The company has not shared any details on the attacks exploiting these vulnerabilities, but its description indicates they have been chained with other flaws.It’s unclear if the same threat actor is behind all of the campaigns targeting Catalyst SD-WAN vulnerabilities. Cisco recently warned that a zero-day in Secure Email Gateway appliances had beenexploited by China-linked hackers, but again, it’s unclear if the attacks are in any way related.Related:China-Linked Hackers Exploiting Zero-Day in Cisco Security GearRelated:Cisco Patches Critical Vulnerabilities in Enterprise Networking ProductsRelated:Cisco, F5 Patch High-Severity Vulnerabilities

It’s unclear if the same threat actor is behind all of the campaigns targeting Catalyst SD-WAN vulnerabilities. Cisco recently warned that a zero-day in Secure Email Gateway appliances had beenexploited by China-linked hackers, but again, it’s unclear if the attacks are in any way related.Related:China-Linked Hackers Exploiting Zero-Day in Cisco Security GearRelated:Cisco Patches Critical Vulnerabilities in Enterprise Networking ProductsRelated:Cisco, F5 Patch High-Severity Vulnerabilities

Related:China-Linked Hackers Exploiting Zero-Day in Cisco Security GearRelated:Cisco Patches Critical Vulnerabilities in Enterprise Networking ProductsRelated:Cisco, F5 Patch High-Severity Vulnerabilities

Related:Cisco Patches Critical Vulnerabilities in Enterprise Networking ProductsRelated:Cisco, F5 Patch High-Severity Vulnerabilities

Related:Cisco, F5 Patch High-Severity Vulnerabilities

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.

Join the event where top security experts unpack the biggest software supply chain risks.

Source: SecurityWeek