Description
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to read arbitrary files that are stored in an affected system. The attacker does not need to have valid user credentials.

This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing an XML file. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to read arbitrary files that are stored in the affected system.
Published: 2026-05-14
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A remote, unauthenticated attacker can craft an XML request that includes an external entity, triggering the SD‑WAN Manager’s XML parser to read files from the underlying system. This insertion of an XXE flaw allows disclosure of arbitrary files that reside on or are accessible by the service. The vulnerability results in direct information disclosure, potentially exposing sensitive configuration files or credentials.

Affected Systems

The flaw affects Cisco Catalyst SD‑WAN Manager, the web UI formerly known as SD‑WAN vManage. No specific product version range is supplied in the advisory; therefore, any installation without a mitigation update may be vulnerable. Administrators should verify the exact build against Cisco’s public advisory and apply relevant updates.

Risk and Exploitability

With a CVSS base score of 8.6, the issue is classified as high severity. Because the attack requires no user credentials and is remote, the risk is significant, yet the EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog. Successful exploitation would allow a remote actor to read arbitrary files, potentially compromising confidentiality of sensitive data. The lack of authentication and the straightforward request format lower the barrier for exploitation, making the threat notable for exposed SD‑WAN Manager instances.

Generated by OpenCVE AI on May 14, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install Cisco’s latest Catalyst SD‑WAN Manager patch or upgrade to a version that addresses the XXE flaw.
  • If a patch is not yet available, configure the web UI to reject XML files containing external entity declarations or disable XML upload functionality entirely.
  • Enable audit logging and monitor for anomalous XML payloads targeting the SD‑WAN Manager UI to detect potential exploitation attempts.

Generated by OpenCVE AI on May 14, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco catalyst Sd-wan Manager
Vendors & Products Cisco
Cisco catalyst Sd-wan Manager

Thu, 14 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to read arbitrary files that are stored in an affected system. The attacker does not need to have valid user credentials. This vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing an XML file. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to read arbitrary files that are stored in the affected system.
Title Cisco Catalyst SD-WAN Manager XML External Entity Injection Vulnerability
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Cisco Catalyst Sd-wan Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-14T18:29:53.578Z

Reserved: 2025-10-08T11:59:15.399Z

Link: CVE-2026-20224

cve-icon Vulnrichment

Updated: 2026-05-14T18:29:49.960Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T17:16:20.353

Modified: 2026-05-14T17:19:57.600

Link: CVE-2026-20224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:00:09Z

Weaknesses