Mar 5, 2026·5 min read·7 visits
Authenticated remote attackers with read-only permissions can overwrite arbitrary files on the Cisco SD-WAN Manager filesystem via the API. This can lead to privilege escalation. Patches are available in versions 20.9.8.2, 20.12.5.3, 20.15.4.2, and 20.18.2.1.
A vulnerability in the API interface of Cisco Catalyst SD-WAN Manager (formerly vManage) allows an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system. The flaw stems from improper input validation and insufficient privilege checks within specific API endpoints used for file ingestion. By exploiting this vulnerability, an attacker with read-only credentials can overwrite critical system files, potentially leading to privilege escalation to the 'vmanage' user context. This issue is actively being exploited in the wild, often chained with authentication bypass vulnerabilities.
Cisco Catalyst SD-WAN Manager (formerly vManage) serves as the centralized management plane for the Cisco SD-WAN fabric, handling configuration, monitoring, and troubleshooting for network devices. CVE-2026-20122 identifies a significant flaw in the application's API layer, specifically regarding how it handles file uploads and writes to the local file system.
The vulnerability is classified under CWE-648 (Incorrect Use of Privileged APIs). It permits a user with low-level privileges—specifically, valid read-only credentials—to trigger file write operations that should be restricted to administrative accounts or system processes. The application fails to strictly define the destination paths or validate the filenames provided during API interactions.
While the vendor-assigned CVSS score is Medium (5.4), the practical impact of arbitrary file overwrites in a management appliance is severe. If an attacker can overwrite executable scripts, configuration files, or authorized key stores, they can alter the execution flow of the application or grant themselves persistent access, effectively compromising the integrity of the network management plane.
The root cause of CVE-2026-20122 lies in the implementation of specific API endpoints responsible for data ingestion or file management. In a secure implementation, file upload functionality must enforce strict allow-lists for destination directories and sanitize input filenames to prevent directory traversal sequences (e.g., ../).
In the vulnerable versions of SD-WAN Manager, the API endpoint lacks these critical checks. Two primary failures occur:
GET requests or harmless POST actions, to invoke file-writing logic.The combination of these failures means that the API trusts the user's input regarding where a file should be placed, utilizing the web server's elevated privileges to execute the write operation.
Although specific source code diffs are not publicly available for this proprietary Cisco software, the mechanics of the vulnerability follow a predictable pattern for CWE-648 in Java-based enterprise management systems.
The vulnerable logic likely resembles the following pseudocode flow:
# Vulnerable Logic Representation
def handle_api_upload(request):
user = request.session.user
# FLAW 1: Only checks if user is logged in, not if they have write privs
if not user.is_authenticated():
return HTTP_401
target_path = request.params.get('path')
file_content = request.params.get('content')
# FLAW 2: No validation that target_path is safe or within a sandbox
# The application writes blindly to the provided path
filesystem.write(target_path, file_content)
return HTTP_200The patch introduces two necessary controls to this flow:
user.has_permission('FILE_WRITE') before proceeding.target_path resolves to a specific, allowed directory (e.g., /opt/cisco/uploads/safe/) and rejecting any path containing traversal characters.Exploitation of CVE-2026-20122 is straightforward but requires valid credentials. The attack surface is exposed via the web management interface (typically HTTPS on port 443 or 8443).
/home/vmanage/.ssh/authorized_keys or a script executed by cron).vmanage user.The successful exploitation of this vulnerability compromises the integrity of the SD-WAN Manager.
Privilege Escalation:
The primary impact is the ability to escalate privileges to the vmanage user. This user accounts for the core application processes. While not explicitly root initially, the vmanage user has extensive control over the SD-WAN fabric configurations and access to sensitive data stored on the manager.
Operational Risk:
With vmanage access, an attacker can:
Wild Exploitation: Intelligence sources indicate this vulnerability is being exploited in the wild. Attackers are actively scanning for exposed SD-WAN Managers and utilizing this flaw, often in conjunction with other exploits, to establish persistence in critical network infrastructure.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N| Product | Affected Versions | Fixed Version |
|---|---|---|
Cisco Catalyst SD-WAN Manager Cisco | < 20.9.8.2 | 20.9.8.2 |
Cisco Catalyst SD-WAN Manager Cisco | 20.11.0 - 20.12.5.2 | 20.12.5.3 |
Cisco Catalyst SD-WAN Manager Cisco | 20.13.0 - 20.15.4.1 | 20.15.4.2 |
Cisco Catalyst SD-WAN Manager Cisco | 20.16.0 - 20.18.2.0 | 20.18.2.1 |
| Attribute | Detail |
|---|---|
| CVSS v3.1 | 5.4 (Medium) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
| CWE | CWE-648 (Incorrect Use of Privileged APIs) |
| EPSS Score | 0.04% (Low but rising) |
| Exploit Status | Active Exploitation Reported |
| Privilege Required | Read-Only (Low) |
The application uses an API in a way that bypasses or incorrectly applies security controls associated with privileged operations.