Description
A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user.

This vulnerability is due to insufficient validation of user-supplied input. An authenticated attacker could exploit this vulnerability by uploading a crafted certificate to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit this vulnerability, the attacker must have valid administrative credentials.
Published: 2026-05-20
Score: 4.7 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from insufficient validation of user‑supplied SSL certificates. An authenticated attacker can upload a crafted certificate to the Cisco ThousandEyes Virtual Appliance, which results in arbitrary code execution as root on the underlying operating system. The weakness is classified as CWE‑74 and is rated with a CVSS score of 4.7.

Affected Systems

The affected product is Cisco ThousandEyes Virtual Appliance, specifically the enterprise agent component. No version or build information was supplied, so all current deployments of the appliance are considered vulnerable until a patch is applied.

Risk and Exploitability

Although the CVSS score indicates moderate severity, the capability to execute root commands makes this a serious risk for systems that are controlled by the appliance. Exploitation requires valid administrative credentials, limiting the attack surface to privileged users or compromised accounts. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, but organizations should treat the situation as a potential high‑impact event if an attacker gains admin access.

Generated by OpenCVE AI on May 20, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco ThousandEyes firmware or patch that addresses the SSL certificate validation flaw.
  • Limit administrative access to the appliance by enforcing strong authentication and least‑privilege policies.
  • Regularly review and remove unused administrative accounts and enforce multifactor authentication.

Generated by OpenCVE AI on May 20, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via Crafted SSL Certificate in Cisco ThousandEyes Virtual Appliance

Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user. This vulnerability is due to insufficient validation of user-supplied input. An authenticated attacker could exploit this vulnerability by uploading a crafted certificate to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit this vulnerability, the attacker must have valid administrative credentials.
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-20T18:31:30.067Z

Reserved: 2025-10-08T11:59:15.397Z

Link: CVE-2026-20199

cve-icon Vulnrichment

Updated: 2026-05-20T18:31:26.219Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T17:16:20.100

Modified: 2026-05-20T17:30:40.450

Link: CVE-2026-20199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T17:30:35Z

Weaknesses