PT-2026-21952 · Cisco · Cisco Catalyst Sd-Wan Manager
Arthur Vidineyev
·
Published
2026-02-25
·
Updated
2026-03-16
·
CVE-2026-20122
CVSS v2.0
7.5
High
| AV:N/AC:L/Au:S/C:N/I:C/A:P |
Name of the Vulnerable Software and Affected Versions
Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage) (affected versions not specified)
Description
A flaw exists in the API of Cisco Catalyst SD-WAN Manager that could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. The attacker must possess valid read-only credentials with API access on the affected system. This is due to improper file handling within the API interface. Successful exploitation may allow the attacker to overwrite files and potentially gain vmanage user privileges. Cisco has confirmed active exploitation of this issue in the wild. The vulnerability is related to the use of privileged application programming interfaces (APIs).
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Catalyst Sd-Wan Manager