Critical (9.8)

Cisco Vulnerability (CVE-2026-20129)

CVE-2026-20129

A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin...

Affected: Cisco

Overview

A critical security flaw has been identified in the Cisco Catalyst SD-WAN Manager. This vulnerability allows an unauthenticated attacker to bypass the login process entirely and gain administrative access to the system’s API.

Vulnerability Explained Simply

The SD-WAN Manager has an application programming interface (API) that software uses to communicate with it. The authentication check for this API is broken. An attacker can send a specially crafted request to this API without needing any username or password. If successful, the system mistakenly grants them the privileges of a “netadmin” user, which is a powerful administrative role.

Potential Impact

The impact of this vulnerability is severe. A remote attacker with no prior access could:

  • Gain full administrative control over the SD-WAN Manager.
  • View, change, or delete SD-WAN configuration and policies.
  • Potentially disrupt or intercept network traffic across the entire software-defined wide area network.
  • Use this access as a foothold to attack other parts of the network.

This is scored as a 9.8 out of 10 on the CVSS severity scale, classifying it as CRITICAL.

Remediation and Mitigation

The primary and most secure action is to apply software updates.

1. Immediate Patching:

  • Upgrade to a fixed release. Cisco has confirmed that releases 20.18 and later are NOT affected.
  • If you are running a version prior to 20.18, you must plan an immediate upgrade to a patched version. Consult the official Cisco Security Advisory for the specific fixed versions for earlier release trains.

2. Interim Mitigation (If Patching is Delayed): While patching is the only complete solution, you can reduce risk by:

  • Restrict Network Access: Ensure the management interface of the Catalyst SD-WAN Manager is not exposed to the public internet. Limit access to only trusted, necessary IP addresses using firewall rules and access control lists (ACLs).
  • Monitor Logs: Closely monitor authentication and API access logs for any suspicious activity, particularly unexpected login attempts or configuration changes from unfamiliar sources.

Next Steps: All administrators of Cisco Catalyst SD-WAN Manager should immediately check their software version and initiate the upgrade process to a release of 20.18 or higher. Refer to the official Cisco advisory for detailed upgrade paths and instructions.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Cisco Vulnerabilities

View all Cisco vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.