Description
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an authenticated, remote attacker with read-only permissions to modify configurations and perform unauthorized actions on an affected system.

This vulnerability exists because of a failure to redact sensitive information within device configurations and templates. An attacker could exploit this vulnerability by elevating their read-only permissions to those of a high-privileged user. A successful exploit could allow the attacker to access or modify configuration settings within Cisco Catalyst SD-WAN Manager as a high-privileged user.
Published: 2026-05-14
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from a failure to hide sensitive data in device configurations and templates within the web UI, allowing an attacker who is authenticated with read‑only permissions to elevate to a high‑privileged user. This flaw enables unauthorized modification of configuration settings, compromising the integrity of the SD‑WAN Manager and potentially affecting confidentiality and availability. The weakness aligns with CWE‑779, which involves improper validation or life‑time management leading to privilege escalation.

Affected Systems

The affected product is Cisco Catalyst SD‑WAN Manager, previously known as SD‑WAN vManage. No specific version information is provided, so all current deployments of this product are considered at risk.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium severity assessment; EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires legitimate access with read‑only rights and is performed through the web interface. Because the attacker needs to authenticate, the attack vector is web‑based and internal to the networked environment where the SD‑WAN Manager is hosted.

Generated by OpenCVE AI on May 14, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Cisco Catalyst SD‑WAN Manager to the latest release that removes the information leakage bug.
  • If an immediate patch is unavailable, remove or disable read‑only accounts that have network management privileges until a fix can be applied.
  • Implement strict role‑based access controls and audit logs to detect and mitigate unauthorized privilege changes.

Generated by OpenCVE AI on May 14, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco catalyst Sd-wan Manager
Vendors & Products Cisco
Cisco catalyst Sd-wan Manager

Thu, 14 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an authenticated, remote attacker with read-only permissions to modify configurations and perform unauthorized actions on an affected system. This vulnerability exists because of a failure to redact sensitive information within device configurations and templates. An attacker could exploit this vulnerability by elevating their read-only permissions to those of a high-privileged user. A successful exploit could allow the attacker to access or modify configuration settings within Cisco Catalyst SD-WAN Manager as a high-privileged user.
Title Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability
Weaknesses CWE-779
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Cisco Catalyst Sd-wan Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-15T03:56:12.822Z

Reserved: 2025-10-08T11:59:15.398Z

Link: CVE-2026-20210

cve-icon Vulnrichment

Updated: 2026-05-14T17:38:03.268Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T17:16:20.057

Modified: 2026-05-14T17:19:57.600

Link: CVE-2026-20210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:00:09Z

Weaknesses