SB2026022552 - Multiple vulnerabilities in Catalyst SD-WAN Manager



SB2026022552 - Multiple vulnerabilities in Catalyst SD-WAN Manager

Published: February 25, 2026

Security Bulletin ID SB2026022552
Severity
Critical
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 20% Medium 40% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper authentication (CVE-ID: CVE-2026-20129)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in the API user authentication mechanism. A remote non-authenticated attacker can bypass authentication process and access the affected system under netadmin role. 


2) Improper authorization (CVE-ID: CVE-2026-20126)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient authorization checks in the REST API. A local low-privileged user can execute arbitrary code with root privileges. 


3) Unprotected storage of credentials (CVE-ID: CVE-2026-20128)

The vulnerability allows a local user to gain access to other users' credentials.

The vulnerability exists due to presence of a credential file for the DCA user. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration.


4) Improper access control (CVE-ID: CVE-2026-20133)

The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.

The vulnerability exists due to improper access restrictions within the API. A remote non-authenticated attacker can bypass implemented security restrictions and gain access to sensitive information. 


5) Arbitrary file upload (CVE-ID: CVE-2026-20122)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload on the API interface. A remote authenticated user can upload a malicious file, execute it on the server and gain vmanage user privileges.


Remediation

Install update from vendor's website.