8.8
CVE-2026-20126
- EPSS 0.04%
- Veröffentlicht 25.02.2026 16:13:58
- Zuletzt bearbeitet 04.03.2026 21:21:49
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system. This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Catalyst Sd-wan Manager Version < 20.9.8.2
Cisco ≫ Catalyst Sd-wan Manager Version >= 20.11 < 20.12.5.3
Cisco ≫ Catalyst Sd-wan Manager Version >= 20.13 < 20.15.4.2
Cisco ≫ Catalyst Sd-wan Manager Version >= 20.16 < 20.18.2.1
Cisco ≫ Catalyst Sd-wan Manager Version20.12.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.127 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| psirt@cisco.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-648 Incorrect Use of Privileged APIs
The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.