Authentication Flaw in Cisco Catalyst SD-WAN Manager Exposes User Privileges
CVE-2026-20129

9.8CRITICAL

Key Information:

Vendor

Cisco

Vendor
CVE Published:
25 February 2026

Badges

👾 Exploit Exists

What is CVE-2026-20129?

A security flaw in the user authentication mechanism of Cisco Catalyst SD-WAN Manager allows unauthenticated remote attackers to manipulate requests sent to the API. By exploiting this weakness, an attacker may gain unauthorized access to the system as a user with administrative privileges (netadmin role). This could lead to unauthorized command execution within the affected system. It's crucial for users to upgrade to releases 20.18 and later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Cisco Catalyst SD-WAN Manager 20.1.12

Cisco Catalyst SD-WAN Manager 19.2.1

Cisco Catalyst SD-WAN Manager 18.4.4

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.