CVE-2026-20122

medium Cisco ⚠️ CISA KEV — Exploited in the Wild
CVSS v3 Base Score
5.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
EPSS Score
1.1%
Exploitation probability in 30 days
Top 22% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Confidentiality
Low
Integrity
Low
Availability
None
Published: February 25, 2026 (77 days ago)
Last Modified: April 21, 2026
Vendor: Cisco
Source: NVD

⚠️ CISA Known Exploited Vulnerability

Added to KEV: 2026-04-20
Remediation Due: 2026-04-23 (⚠ 21d overdue)

Description

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

CWE

CWE-648

Affected Products

cisco catalyst sd-wan manager

References