ID

VAR-202602-3961


CVE

CVE-2026-20122


TITLE

Cisco Systems Cisco Catalyst SD-WAN Manager privilege in  API  Improper Use Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165

DESCRIPTION

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges. Also, some of the information handled by the software may be rewritten. Furthermore, the software will not stop. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-20122 // JVNDB: JVNDB-2026-006165

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst sd-wan managerscope:ltversion:20.12.5.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:gteversion:20.11

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:gteversion:20.16

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:gteversion:20.13

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.12.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:ltversion:20.18.2.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:ltversion:20.9.8.2

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:ltversion:20.15.4.2

Trust: 1.0

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:20.9.8.2

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:20.16 that's all 20.18.2.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:20.13 that's all 20.15.4.2

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:20.11 that's all 20.12.5.3

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:20.12.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165 // NVD: CVE-2026-20122

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@cisco.com: CVE-2026-20122
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2026-20122
value: MEDIUM

Trust: 1.0

NVD: CVE-2026-20122
value: MEDIUM

Trust: 0.8

psirt@cisco.com: CVE-2026-20122
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.5
version: 3.1

Trust: 2.0

NVD: CVE-2026-20122
baseSeverity: MEDIUM
baseScore: 5.4
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165 // NVD: CVE-2026-20122 // NVD: CVE-2026-20122

PROBLEMTYPE DATA

problemtype:CWE-648

Trust: 1.0

problemtype:privilege API improper use of (CWE-648) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165 // NVD: CVE-2026-20122

PATCH

title:Cisco Catalyst SD-WAN Vulnerabilitiesurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165

EXTERNAL IDS

db:NVDid:CVE-2026-20122

Trust: 2.6

db:JVNDBid:JVNDB-2026-006165

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165 // NVD: CVE-2026-20122

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-authbp-qwcx8d4v

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-20122

Trust: 0.8

sources: JVNDB: JVNDB-2026-006165 // NVD: CVE-2026-20122

SOURCES

db:JVNDBid:JVNDB-2026-006165
db:NVDid:CVE-2026-20122

LAST UPDATE DATE

2026-03-09T23:40:28.074000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-006165date:2026-03-06T06:39:00
db:NVDid:CVE-2026-20122date:2026-03-04T21:25:22.193

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-006165date:2026-03-06T00:00:00
db:NVDid:CVE-2026-20122date:2026-02-25T17:25:28.170