A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system.
This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system. This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system. | |
| Title | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | |
| Weaknesses | CWE-648 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2026-02-25T19:05:52.731Z
Reserved: 2025-10-08T11:59:15.378Z
Link: CVE-2026-20126
No data.
Status : Received
Published: 2026-02-25T17:25:28.840
Modified: 2026-02-25T17:25:28.840
Link: CVE-2026-20126
No data.
OpenCVE Enrichment
No data.