SB2026022552 - Multiple vulnerabilities in Catalyst SD-WAN Manager
Published: February 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper authentication (CVE-ID: CVE-2026-20129)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in the API user authentication mechanism. A remote non-authenticated attacker can bypass authentication process and access the affected system under netadmin role.
2) Improper authorization (CVE-ID: CVE-2026-20126)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient authorization checks in the REST API. A local low-privileged user can execute arbitrary code with root privileges.
3) Unprotected storage of credentials (CVE-ID: CVE-2026-20128)
The vulnerability allows a local user to gain access to other users' credentials.
The vulnerability exists due to presence of a credential file for the DCA user. A local user can view contents of the configuration file and gain access to passwords for 3rd party integration.
4) Improper access control (CVE-ID: CVE-2026-20133)
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions within the API. A remote non-authenticated attacker can bypass implemented security restrictions and gain access to sensitive information.
5) Arbitrary file upload (CVE-ID: CVE-2026-20122)
The vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload on the API interface. A remote authenticated user can upload a malicious file, execute it on the server and gain vmanage user privileges.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
- https://bst.cisco.com/bugsearch/bug/CSCws33587
- https://bst.cisco.com/bugsearch/bug/CSCws93470
- https://bst.cisco.com/bugsearch/bug/CSCws33585
- https://bst.cisco.com/bugsearch/bug/CSCws33583
- https://bst.cisco.com/bugsearch/bug/CSCws33586
- https://bst.cisco.com/bugsearch/bug/CSCws33584