TROYANOSYVIRUS
Volver a CVEs

CVE-2026-20127

CRITICALCISA KEV
10.0

Descripcion

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 

Detalles CVE

Puntuacion CVSS v3.110.0
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/25/2026
Ultima modificacion2/26/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorCisco
ProductoCatalyst SD-WAN Controller and Manager
Nombre vulnerabilidadCisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability
Fecha inclusion KEV2026-02-25
Fecha limite remediacion2026-02-27
Uso en ransomwareUnknown

Productos afectados

cisco:catalyst_sd-wan_managercisco:sd-wan_vsmart_controller

Debilidades (CWE)

CWE-287CWE-287

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.