CVE Vulnerabilities

CVE-2026-20129

Improper Authentication

Published: Feb 25, 2026 | Modified: Mar 04, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role.

The vulnerability is due to improper authentication for requests that are sent to the API. An attacker could exploit this vulnerability by sending a crafted request to the API of an affected system. A successful exploit could allow the attacker to execute commands with the privileges of the netadmin role. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability. 

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Catalyst_sd-wan_managerCisco*20.9.8.2 (excluding)
Catalyst_sd-wan_managerCisco20.11 (including)20.12.5.3 (excluding)
Catalyst_sd-wan_managerCisco20.13 (including)20.15.4.2 (excluding)
Catalyst_sd-wan_managerCisco20.16 (including)20.18 (excluding)
Catalyst_sd-wan_managerCisco20.12.6 (including)20.12.6 (including)

Potential Mitigations

References