TROYANOSYVIRUS
Volver a CVEs

CVE-2026-20122

MEDIUMCISA KEV
5.4

Descripcion

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

Detalles CVE

Puntuacion CVSS v3.15.4
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado2/25/2026
Ultima modificacion4/21/2026
Fuentenvd
Avistamientos honeypot0

CISA KEV

VendedorCisco
ProductoCatalyst SD-WAN Manger
Nombre vulnerabilidadCisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
Fecha inclusion KEV2026-04-20
Fecha limite remediacion2026-04-23
Uso en ransomwareUnknown

Productos afectados

cisco:catalyst_sd-wan_manager

Debilidades (CWE)

CWE-648

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.