LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-20129

CVE-2026-20129 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: February 27, 2026

Cisco Catalyst SD-WAN Manager - Authentication Bypass

Published: February 25, 2026Updated: February 27, 2026Remote Exploitable

Overview

Cisco Catalyst SD-WAN Manager < 20.18 contains a broken authentication caused by improper authentication in API user requests, letting unauthenticated remote attackers gain netadmin role privileges, exploit requires crafted API request.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 12.4%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can gain netadmin privileges and execute commands, potentially compromising the entire system.

Mitigation

Upgrade to version 20.18 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

šŸ”“ CVE-2026-20129 - Critical (9.8) A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the&nbsp;netadmin role. The vulnerability is due to improper ... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-20129/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-20129
Severity
Critical
CVSS Score
9.8
Type
broken_authentication
Status
unconfirmed
EPSS
12.4%
Social Posts
1

CWE

  • CWE-287

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

12.4%Probability of exploitation in the next 30 days