CVE-2026-20129 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: February 27, 2026
Cisco Catalyst SD-WAN Manager - Authentication Bypass
Overview
Cisco Catalyst SD-WAN Manager < 20.18 contains a broken authentication caused by improper authentication in API user requests, letting unauthenticated remote attackers gain netadmin role privileges, exploit requires crafted API request.
Severity & Score
Impact
Unauthenticated attackers can gain netadmin privileges and execute commands, potentially compromising the entire system.
Mitigation
Upgrade to version 20.18 or later.
Social Media Activity(1 post)
š“ CVE-2026-20129 - Critical (9.8) A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role. The vulnerability is due to improper ... š https://www.thehackerwire.com/vulnerability/CVE-2026-20129/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-20129
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- broken_authentication
- Status
- unconfirmed
- EPSS
- 12.4%
- Social Posts
- 1
CWE
- CWE-287
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H