CVE-2022-20775

high Cisco ⚠️ CISA KEV — Exploited in the Wild
CVSS v3 Base Score
7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.5%
Exploitation probability in 30 days
Top 34% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Published: September 30, 2022 (1321 days ago)
Last Modified: February 26, 2026
Vendor: Cisco

⚠️ CISA Known Exploited Vulnerability

Added to KEV: 2026-02-25
Remediation Due: 2026-02-27 (⚠ 76d overdue)

Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

CWE

CWE-25

Affected Products

cisco catalyst sd-wan managercisco sd-wan vbond orchestratorcisco sd-wan vedge cloudcisco sd-wan vsmart controllercisco sd-wan

References