CVE-2022-20775
highCVSS v3 Base Score
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.5%
Exploitation probability in 30 days
Top 34% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
⚠️ CISA Known Exploited Vulnerability
Added to KEV: 2026-02-25
Remediation Due: 2026-02-27 (⚠ 76d overdue)
Vulnerability Report
Generated by CyberWatcher
Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
CWE
CWE-25Affected Products
cisco catalyst sd-wan managercisco sd-wan vbond orchestratorcisco sd-wan vedge cloudcisco sd-wan vsmart controllercisco sd-wan