Impact
A flaw in the peering authentication mechanism of Cisco Catalyst SD‑WAN Controller and Manager allows an unauthenticated, remote attacker to bypass authentication, log in as a high‑privileged non‑root user, and access NETCONF to manipulate the SD‑WAN fabric. The vulnerability is a classic authentication bypass (CWE‑287) that can compromise confidentiality, integrity, and availability of the network configuration.
Affected Systems
Affected are Cisco Catalyst SD‑WAN Manager and SD‑WAN vSmart Controller, specifically versions 20.12.6 and any release that has not yet incorporated the fix. The vulnerability can impact any installation of these products that uses the default peering authentication configuration.
Risk and Exploitability
The CVSS base score of 10 combined with an EPSS of 0.33% indicates a catastrophic severity but a low likelihood of exploitation. The vulnerability is catalogued by CISA’s Known Exploited Vulnerabilities list. Attackers can send crafted requests over the network to trigger the bypass; the vector is inferred to be remote over the peering or control plane interfaces, giving the attacker an internal, high‑privileged account without requiring credentials.
OpenCVE Enrichment