A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
History

Thu, 26 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco sd-wan Vedge Cloud
CPEs cpe:2.3:a:cisco:sd-wan_vedge_cloud:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vedge_cloud:20.8:*:*:*:*:*:*:*
Vendors & Products Cisco sd-wan Vedge Cloud

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
Description Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
Title Cisco SD-WAN Software Privilege Escalation Vulnerabilities Cisco SD-WAN Software Privilege Escalation Vulnerability
References

Wed, 25 Feb 2026 18:30:00 +0000


Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2026-02-25T00:00:00+00:00', 'dueDate': '2026-02-27T00:00:00+00:00'}


Wed, 06 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2022-09-30T18:45:26.687Z

Updated: 2026-03-02T13:12:09.231Z

Reserved: 2021-11-02T00:00:00.000Z

Link: CVE-2022-20775

cve-icon Vulnrichment

Updated: 2024-08-03T02:24:49.634Z

cve-icon NVD

Status : Analyzed

Published: 2022-09-30T19:15:11.467

Modified: 2026-02-26T16:20:09.420

Link: CVE-2022-20775

cve-icon Redhat

No data.