Impact
The flaw is an improper authentication bug in the Catalyst SD‑WAN Manager API that permits an unauthenticated attacker to send a crafted request and receive a session that has netadmin rights. The resulting capabilities are the same as a legitimate netadmin user, enabling the attacker to run arbitrary management commands, alter configuration, and potentially disrupt network services. This represents a high‑impact privilege escalation that could compromise the confidentiality, integrity, and availability of the SD‑WAN fabric.
Affected Systems
The vulnerability affects Cisco Catalyst SD‑WAN Manager versions older than 20.18, including 20.12.6 and earlier releases. Versions 20.18 and later are not vulnerable.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity, while the EPSS score of less than 1% suggests a low probability of real‑world exploitation at this time. The flaw is not listed in CISA’s KEV catalog, but the attack vector is remote via HTTP(S) to the API endpoint, requiring no privileged network access. An attacker must simply identify an exposed SD‑WAN Manager instance and send the crafted API request to elevate privileges.
OpenCVE Enrichment