← Volver a CVEs
CVE-2026-20122
MEDIUMCISA KEV5.4
Descripcion
A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.
Detalles CVE
Puntuacion CVSS v3.15.4
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado2/25/2026
Ultima modificacion4/21/2026
Fuentenvd
Avistamientos honeypot0
CISA KEV
VendedorCisco
ProductoCatalyst SD-WAN Manger
Nombre vulnerabilidadCisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
Fecha inclusion KEV2026-04-20
Fecha limite remediacion2026-04-23
Uso en ransomwareUnknown
Productos afectados
cisco:catalyst_sd-wan_manager
Debilidades (CWE)
CWE-648
Referencias
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v(psirt@cisco.com)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20122(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.