Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20122: Incorrect Use of Privileged APIs in Cisco Cisco Catalyst SD-WAN Manager

0
Medium
VulnerabilityCVE-2026-20122cvecve-2026-20122
Published: Wed Feb 25 2026 (02/25/2026, 16:14:21 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Catalyst SD-WAN Manager

Description

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 00:11:31 UTC

Technical Analysis

CVE-2026-20122 identifies a vulnerability in the API interface of Cisco Catalyst SD-WAN Manager, a widely deployed network management solution for SD-WAN environments. The flaw arises from improper file handling within the API, allowing an authenticated attacker with valid read-only API credentials to upload malicious files that overwrite arbitrary files on the local file system. This improper use of privileged APIs can lead to privilege escalation, granting the attacker vmanage user privileges, which are typically administrative in nature. The vulnerability spans a large range of software versions, indicating a long-standing issue affecting many deployments. The attack vector requires network access and valid credentials but does not require user interaction, making it feasible for insiders or attackers who have compromised low-privilege accounts to escalate privileges and potentially manipulate network configurations or exfiltrate sensitive data. The CVSS 3.1 score of 5.4 reflects a medium severity, considering the need for authentication but the significant impact on confidentiality and integrity. No public exploits have been reported yet, but the broad exposure and potential impact warrant proactive mitigation. The vulnerability underscores the importance of secure API design and strict access controls in network management platforms.

Potential Impact

The vulnerability could allow attackers to overwrite critical files on the SD-WAN Manager system, potentially leading to unauthorized configuration changes, data tampering, or further compromise of the network management infrastructure. This can undermine network integrity and confidentiality, disrupt network operations indirectly, and facilitate lateral movement within an organization's network. Organizations relying on Cisco Catalyst SD-WAN Manager for managing their SD-WAN deployments could face increased risk of targeted attacks, especially if attackers gain low-level API credentials through phishing, insider threats, or credential leaks. The broad range of affected versions increases the likelihood that many organizations worldwide are vulnerable. Compromise of the vmanage user privileges could lead to full administrative control over the SD-WAN environment, impacting network traffic routing, security policies, and overall network availability indirectly. This could have severe consequences for enterprises, service providers, and critical infrastructure sectors that depend on secure and reliable SD-WAN operations.

Mitigation Recommendations

1. Immediately audit and restrict API access to only trusted and necessary users, enforcing the principle of least privilege. 2. Monitor API access logs for unusual or unauthorized file upload attempts or privilege escalation activities. 3. Implement multi-factor authentication (MFA) for all accounts with API access to reduce the risk of credential compromise. 4. Apply vendor patches or updates as soon as Cisco releases fixes addressing this vulnerability. 5. Use network segmentation to isolate the SD-WAN Manager system from less trusted network zones to limit exposure. 6. Conduct regular security assessments and penetration tests focusing on API security and privilege escalation vectors. 7. Educate administrators and users about the risks of credential reuse and phishing attacks that could lead to credential compromise. 8. Consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block suspicious API requests. 9. Review and harden file system permissions on the SD-WAN Manager host to limit the impact of arbitrary file overwrites. 10. Establish incident response plans specifically for SD-WAN infrastructure compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d14b7ef31ef0b56db81

Added to database: 2/25/2026, 9:43:48 PM

Last enriched: 3/23/2026, 12:11:31 AM

Last updated: 4/12/2026, 1:04:16 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses