๐Ÿ” CVE Alert

CVE-2026-20199

MEDIUM 4.7
CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user. This vulnerability is due to insufficient validation of user-supplied input. An authenticated attacker could exploit this vulnerability by uploading a crafted certificate to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit this vulnerability, the attacker must have valid administrative credentials.

CWE CWE-74
Vendor cisco
Product cisco thousandeyes enterprise agent
Ecosystems
Industries
NetworkingTelecommunications
Published May 20, 2026
Stay Ahead of the Next One

Get instant alerts for cisco cisco thousandeyes enterprise agent

Be the first to know when new medium vulnerabilities affecting cisco cisco thousandeyes enterprise agent are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

Cisco / Cisco ThousandEyes Enterprise Agent
N/A

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
sec.cloudapps.cisco.com: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tevacert-rce-RMJVEym5