CVE-2026-20209
Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an authenticated, remote attacker with read-only permissions to elevate their privileges from low to high and perform actions as a high-privileged user. This vulnerability exists because sensitive session information is recorded in audit logs. An attacker could exploit this vulnerability by elevating their read-only permissions in Cisco Catalyst SD-WAN Manager to those of a high-privileged user. A successful exploit could allow the attacker to perform actions as a high-privileged user.
| CWE | CWE-779 |
| Vendor | cisco |
| Product | cisco catalyst sd-wan manager |
| Ecosystems | |
| Industries | NetworkingTelecommunications |
| Published | May 14, 2026 |
| Last Updated | May 14, 2026 |
Get instant alerts for cisco cisco catalyst sd-wan manager
Be the first to know when new medium vulnerabilities affecting cisco cisco catalyst sd-wan manager are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N