CVE-2026-20126

Source
https://cve.org/CVERecord?id=CVE-2026-20126
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-20126.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-20126
Published
2026-02-25T17:25:28.840Z
Modified
2026-03-13T04:02:53.717534Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system.

This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-20126.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "20.9.8.2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "20.11"
            },
            {
                "fixed": "20.12.5.3"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "20.13"
            },
            {
                "fixed": "20.15.4.2"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "20.16"
            },
            {
                "fixed": "20.18.2.1"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "20.12.6"
            }
        ]
    }
]