Description
A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to view sensitive information on an affected system.

This vulnerability is due to insufficient file system access restrictions. An attacker could exploit this vulnerability by accessing the API of an affected system. A successful exploit could allow the attacker to read sensitive information on the underlying operating system.
Published: 2026-02-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

A vulnerability in Cisco Catalyst SD-WAN Manager allows an unauthenticated, remote attacker to read sensitive information on the underlying operating system by accessing the system’s API. The weakness stems from insufficient file system access restrictions, enabling the attacker to retrieve data that should be protected. This leads to exposure of confidential or privileged information without requiring authentication.

Affected Systems

Cisco Catalyst SD-WAN Manager, particularly versions that match the identified CPEs, including the 20.12.6 release. All deployments of the product that have not applied the vendor’s fix are susceptible.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity vulnerability, and the EPSS score of less than 1% suggests a low likelihood of exploitation at the current time. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The likely attack vector is remote, via the exposed API, and the impact is limited to information disclosure; there is no evidence of code execution, privilege escalation, or denial of service.

Generated by OpenCVE AI on April 16, 2026 at 06:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and apply the latest Cisco Catalyst SD-WAN Manager patch that addresses insufficient file system access restrictions.
  • If an immediate patch cannot be applied, isolate the SD-WAN Manager service from external networks and restrict API access to trusted internal hosts only.
  • Configure file system permissions to prevent the SD-WAN Manager user from accessing sensitive directories, tightening the access control for the affected files.

Generated by OpenCVE AI on April 16, 2026 at 06:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.6:*:*:*:*:*:*:*

Fri, 27 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco catalyst Sd-wan Manager
Vendors & Products Cisco
Cisco catalyst Sd-wan Manager

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system access restrictions. An attacker could exploit this vulnerability by accessing the API of an affected system. A successful exploit could allow the attacker to read sensitive information on the underlying operating system.
Title Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Cisco Catalyst Sd-wan Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-20T21:48:45.809Z

Reserved: 2025-10-08T11:59:15.380Z

Link: CVE-2026-20133

cve-icon Vulnrichment

Updated: 2026-02-25T18:17:58.540Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T17:25:30.983

Modified: 2026-03-04T21:20:11.183

Link: CVE-2026-20133

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:15:26Z

Weaknesses