Configuration Modification Vulnerability in Cisco Catalyst SD-WAN Manager
CVE-2026-20210

5.4MEDIUM

Key Information:

Vendor

Cisco

Vendor
CVE Published:
14 May 2026

Badges

👾 Exploit Exists

What is CVE-2026-20210?

A significant vulnerability has been identified in the web UI of Cisco Catalyst SD-WAN Manager, where an authenticated remote attacker with read-only permissions can manipulate configurations and execute unauthorized actions. The flaw arises from inadequate redaction of sensitive information within device configurations and templates. An attacker could leverage this weakness to escalate their permissions to those of a high-privileged user, potentially gaining access to sensitive configuration settings and other critical functionalities within the Cisco Catalyst SD-WAN Manager platform.

Affected Version(s)

Cisco Catalyst SD-WAN Manager 20.1.12

Cisco Catalyst SD-WAN Manager 19.2.1

Cisco Catalyst SD-WAN Manager 18.4.4

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.