Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20129: Improper Authentication in Cisco Cisco Catalyst SD-WAN Manager

0
Critical
VulnerabilityCVE-2026-20129cvecve-2026-20129
Published: Wed Feb 25 2026 (02/25/2026, 16:14:09 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Catalyst SD-WAN Manager

Description

A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role. The vulnerability is due to improper authentication for requests that are sent to the API. An attacker could exploit this vulnerability by sending a crafted request to the API of an affected system. A successful exploit could allow the attacker to execute commands with the privileges of the netadmin role. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability. 

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 22:12:42 UTC

Technical Analysis

CVE-2026-20129 is a severe security vulnerability identified in the API user authentication mechanism of Cisco Catalyst SD-WAN Manager. The flaw arises from improper authentication validation for API requests, which allows an unauthenticated remote attacker to bypass authentication controls. By crafting and sending a malicious API request to an affected system, the attacker can gain access with the netadmin role privileges. This role typically has extensive control over the SD-WAN infrastructure, including configuration, management, and operational commands. The vulnerability affects a wide range of Cisco Catalyst SD-WAN Manager versions prior to 20.18, which Cisco has confirmed as not vulnerable. The CVSS v3.1 base score is 9.8, reflecting the critical nature of this vulnerability due to its network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Exploitation could lead to unauthorized command execution, potentially allowing attackers to disrupt network operations, exfiltrate sensitive data, or manipulate network traffic. Although no known exploits have been reported in the wild at the time of publication, the ease of exploitation and high privileges gained make this vulnerability a significant risk for organizations relying on affected Cisco SD-WAN Manager versions. The vulnerability underscores the importance of robust API authentication mechanisms in network management platforms.

Potential Impact

The impact of CVE-2026-20129 is substantial for organizations globally that deploy Cisco Catalyst SD-WAN Manager versions prior to 20.18. Successful exploitation grants attackers netadmin-level access, enabling full control over SD-WAN configurations and operations. This can lead to severe consequences including unauthorized network configuration changes, interception or redirection of network traffic, disruption of network availability, and potential lateral movement within the network. Confidential data managed or transmitted via the SD-WAN infrastructure could be exposed or manipulated. The disruption of SD-WAN services can affect business continuity, especially for enterprises relying on SD-WAN for critical connectivity across distributed sites. Given the critical role of SD-WAN in modern enterprise networks, this vulnerability could facilitate advanced persistent threats, espionage, or sabotage. The broad range of affected versions increases the attack surface, especially in large organizations with complex network environments. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates urgent attention is necessary to prevent potential exploitation.

Mitigation Recommendations

To mitigate CVE-2026-20129, organizations should immediately upgrade Cisco Catalyst SD-WAN Manager to version 20.18 or later, where the vulnerability is resolved. If upgrading is not immediately feasible, restrict API access to trusted networks and IP addresses using network segmentation and firewall rules to limit exposure. Implement strict monitoring and logging of API requests to detect unusual or unauthorized access attempts. Employ multi-factor authentication (MFA) for administrative access where supported to add an additional security layer. Regularly audit user roles and permissions to ensure least privilege principles are enforced, minimizing the impact if credentials are compromised. Conduct vulnerability scanning and penetration testing focused on SD-WAN management interfaces to identify potential exploitation attempts. Maintain up-to-date backups of SD-WAN configurations to enable rapid recovery in case of compromise. Collaborate with Cisco support and subscribe to security advisories for timely updates and patches. Finally, educate network and security teams about this vulnerability and the importance of securing management APIs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2025-10-08T11:59:15.379Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b6fb7ef31ef0b5556a7

Added to database: 2/25/2026, 9:36:47 PM

Last enriched: 3/20/2026, 10:12:42 PM

Last updated: 4/11/2026, 6:00:02 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses