A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system.
This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Mar 2026, 21:21
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.6:*:*:*:*:*:*:* |
|
| First Time |
Cisco
Cisco catalyst Sd-wan Manager |
|
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v - Vendor Advisory |
25 Feb 2026, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 17:25
Updated : 2026-03-04 21:21
NVD link : CVE-2026-20126
Mitre link : CVE-2026-20126
CVE.ORG link : CVE-2026-20126
JSON object : View
Products Affected
cisco
- catalyst_sd-wan_manager
CWE
CWE-648
Incorrect Use of Privileged APIs
