CVE-2026-20126

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/02/2026
Last modified:
04/03/2026

Description

A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system.<br /> <br /> This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to&amp;nbsp;gain root privileges on the underlying operating system.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.9.8.2 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.11 (including) 20.12.5.3 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.13 (including) 20.15.4.2 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.16 (including) 20.18.2.1 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.6:*:*:*:*:*:*:*