A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system.
This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco catalyst Sd-wan Manager |
|
| Vendors & Products |
Cisco
Cisco catalyst Sd-wan Manager |
Thu, 26 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system. This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system. | |
| Title | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | |
| Weaknesses | CWE-648 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published: 2026-02-25T16:13:58.856Z
Updated: 2026-02-26T14:44:06.591Z
Reserved: 2025-10-08T11:59:15.378Z
Link: CVE-2026-20126
Updated: 2026-02-25T18:17:57.061Z
Status : Awaiting Analysis
Published: 2026-02-25T17:25:28.840
Modified: 2026-02-27T14:06:59.787
Link: CVE-2026-20126
No data.