Cisco Vulnerability (CVE-2026-20129)
CVE-2026-20129
A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin...
Overview
A critical security flaw has been identified in the Cisco Catalyst SD-WAN Manager. This vulnerability allows an unauthenticated attacker to bypass the login process entirely and gain administrative access to the system’s API.
Vulnerability Explained Simply
The SD-WAN Manager has an application programming interface (API) that software uses to communicate with it. The authentication check for this API is broken. An attacker can send a specially crafted request to this API without needing any username or password. If successful, the system mistakenly grants them the privileges of a “netadmin” user, which is a powerful administrative role.
Potential Impact
The impact of this vulnerability is severe. A remote attacker with no prior access could:
- Gain full administrative control over the SD-WAN Manager.
- View, change, or delete SD-WAN configuration and policies.
- Potentially disrupt or intercept network traffic across the entire software-defined wide area network.
- Use this access as a foothold to attack other parts of the network.
This is scored as a 9.8 out of 10 on the CVSS severity scale, classifying it as CRITICAL.
Remediation and Mitigation
The primary and most secure action is to apply software updates.
1. Immediate Patching:
- Upgrade to a fixed release. Cisco has confirmed that releases 20.18 and later are NOT affected.
- If you are running a version prior to 20.18, you must plan an immediate upgrade to a patched version. Consult the official Cisco Security Advisory for the specific fixed versions for earlier release trains.
2. Interim Mitigation (If Patching is Delayed): While patching is the only complete solution, you can reduce risk by:
- Restrict Network Access: Ensure the management interface of the Catalyst SD-WAN Manager is not exposed to the public internet. Limit access to only trusted, necessary IP addresses using firewall rules and access control lists (ACLs).
- Monitor Logs: Closely monitor authentication and API access logs for any suspicious activity, particularly unexpected login attempts or configuration changes from unfamiliar sources.
Next Steps: All administrators of Cisco Catalyst SD-WAN Manager should immediately check their software version and initiate the upgrade process to a release of 20.18 or higher. Refer to the official Cisco advisory for detailed upgrade paths and instructions.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, r...
A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an a...
A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root o...
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote...
Other Cisco Vulnerabilities
A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an a...
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote...
A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming...
A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload...