CVE-2026-20127
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
25/02/2026
Last modified:
26/02/2026
Description
A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.<br />
<br />
This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root&nbsp;user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.&nbsp;
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.9.8.2 (excluding) | |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.11 (including) | 20.12.5.3 (excluding) |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.13 (including) | 20.15.4.2 (excluding) |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.16 (including) | 20.18.2.1 (excluding) |
| cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.9.8.2 (excluding) | |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.11 (including) | 20.12.5.3 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.13 (including) | 20.15.4.2 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:* | 20.16 (including) | 20.18.2.1 (excluding) |
| cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.12.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



