TROYANOSYVIRUS
Back to CVEs

CVE-2026-20122

MEDIUM
5.4

Description

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

CVE Details

CVSS v3.1 Score5.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/25/2026
Last Modified3/4/2026
Sourcenvd
Honeypot Sightings0

Affected Products

cisco:catalyst_sd-wan_manager

Weaknesses (CWE)

CWE-648

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.