Privilege Escalation Vulnerability in Cisco Catalyst SD-WAN Manager
CVE-2025-20122
7.8HIGH
Summary
A vulnerability exists within the CLI of Cisco Catalyst SD-WAN Manager that permits an authenticated local attacker to escalate their privileges to that of the root user on the underlying operating system. This issue arises from inadequate input validation, allowing an authenticated user with read-only rights to craft a malicious request aimed at the CLI. If successful, this exploit grants the attacker unauthorized root access, compromising the system’s integrity and security.
Affected Version(s)
Cisco Catalyst SD-WAN Manager 20.1.12
Cisco Catalyst SD-WAN Manager 19.2.1
Cisco Catalyst SD-WAN Manager 18.4.4
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved