CVE-2026-20127

Severity CVSS v4.0:
Pending analysis
Type:
CWE-287 Authentication Issues
Publication date:
25/02/2026
Last modified:
26/02/2026

Description

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.<br /> <br /> This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root&amp;nbsp;user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.&amp;nbsp;

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.9.8.2 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.11 (including) 20.12.5.3 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.13 (including) 20.15.4.2 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* 20.16 (including) 20.18.2.1 (excluding)
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.9.8.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.11 (including) 20.12.5.3 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.13 (including) 20.15.4.2 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* 20.16 (including) 20.18.2.1 (excluding)
cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.12.6:*:*:*:*:*:*:*