CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-20122
5.40.04%

CVE-2026-20122: Arbitrary File Overwrite in Cisco Catalyst SD-WAN Manager API

Amit Schendel
Amit Schendel
Senior Security Researcher

Mar 5, 2026·5 min read·7 visits

Active Exploitation

Executive Summary (TL;DR)

Authenticated remote attackers with read-only permissions can overwrite arbitrary files on the Cisco SD-WAN Manager filesystem via the API. This can lead to privilege escalation. Patches are available in versions 20.9.8.2, 20.12.5.3, 20.15.4.2, and 20.18.2.1.

A vulnerability in the API interface of Cisco Catalyst SD-WAN Manager (formerly vManage) allows an authenticated, remote attacker to overwrite arbitrary files on the underlying operating system. The flaw stems from improper input validation and insufficient privilege checks within specific API endpoints used for file ingestion. By exploiting this vulnerability, an attacker with read-only credentials can overwrite critical system files, potentially leading to privilege escalation to the 'vmanage' user context. This issue is actively being exploited in the wild, often chained with authentication bypass vulnerabilities.

Vulnerability Overview

Cisco Catalyst SD-WAN Manager (formerly vManage) serves as the centralized management plane for the Cisco SD-WAN fabric, handling configuration, monitoring, and troubleshooting for network devices. CVE-2026-20122 identifies a significant flaw in the application's API layer, specifically regarding how it handles file uploads and writes to the local file system.

The vulnerability is classified under CWE-648 (Incorrect Use of Privileged APIs). It permits a user with low-level privileges—specifically, valid read-only credentials—to trigger file write operations that should be restricted to administrative accounts or system processes. The application fails to strictly define the destination paths or validate the filenames provided during API interactions.

While the vendor-assigned CVSS score is Medium (5.4), the practical impact of arbitrary file overwrites in a management appliance is severe. If an attacker can overwrite executable scripts, configuration files, or authorized key stores, they can alter the execution flow of the application or grant themselves persistent access, effectively compromising the integrity of the network management plane.

Root Cause Analysis

The root cause of CVE-2026-20122 lies in the implementation of specific API endpoints responsible for data ingestion or file management. In a secure implementation, file upload functionality must enforce strict allow-lists for destination directories and sanitize input filenames to prevent directory traversal sequences (e.g., ../).

In the vulnerable versions of SD-WAN Manager, the API endpoint lacks these critical checks. Two primary failures occur:

  1. Insufficient Authorization: The endpoint validates that the user is authenticated but fails to enforce a check for write permissions. This allows read-only users, who should strictly be limited to GET requests or harmless POST actions, to invoke file-writing logic.
  2. Improper Path Validation: The application accepts user-controlled input for the file destination without adequately sanitizing the path. This allows the attacker to direct the file write operation to locations outside the intended temporary or upload directories.

The combination of these failures means that the API trusts the user's input regarding where a file should be placed, utilizing the web server's elevated privileges to execute the write operation.

Vulnerability Mechanics

Although specific source code diffs are not publicly available for this proprietary Cisco software, the mechanics of the vulnerability follow a predictable pattern for CWE-648 in Java-based enterprise management systems.

Conceptual Flow

The vulnerable logic likely resembles the following pseudocode flow:

# Vulnerable Logic Representation
def handle_api_upload(request):
    user = request.session.user
    
    # FLAW 1: Only checks if user is logged in, not if they have write privs
    if not user.is_authenticated():
        return HTTP_401
        
    target_path = request.params.get('path')
    file_content = request.params.get('content')
    
    # FLAW 2: No validation that target_path is safe or within a sandbox
    # The application writes blindly to the provided path
    filesystem.write(target_path, file_content)
    
    return HTTP_200

The Security Gap

The patch introduces two necessary controls to this flow:

  1. Role-Based Access Control (RBAC) Check: Verifying user.has_permission('FILE_WRITE') before proceeding.
  2. Path Sanitization: Ensuring target_path resolves to a specific, allowed directory (e.g., /opt/cisco/uploads/safe/) and rejecting any path containing traversal characters.

Exploitation Methodology

Exploitation of CVE-2026-20122 is straightforward but requires valid credentials. The attack surface is exposed via the web management interface (typically HTTPS on port 443 or 8443).

Attack Prerequisites

  1. Network Access: Connectivity to the vManage web interface.
  2. Authentication: Valid credentials. These can be low-privileged, read-only accounts. In real-world attack scenarios, attackers often obtain these via default credentials, phishing, or by chaining this vulnerability with an authentication bypass flaw like CVE-2026-20127.

Attack Chain

  1. Target Identification: The attacker identifies a vulnerable vManage instance (e.g., version < 20.9.8.2).
  2. Payload Construction: The attacker crafts a malicious file. This could be a web shell, a modified configuration file, or an SSH authorized_keys file.
  3. API Request: The attacker sends a crafted POST request to the vulnerable API endpoint. The request includes the payload and specifies a sensitive destination path (e.g., /home/vmanage/.ssh/authorized_keys or a script executed by cron).
  4. Execution: The system processes the request and overwrites the target file. If the file was a script or key, the attacker waits for the system to execute it or uses the key to log in via SSH, achieving privilege escalation to the vmanage user.

Impact Assessment

The successful exploitation of this vulnerability compromises the integrity of the SD-WAN Manager.

Privilege Escalation: The primary impact is the ability to escalate privileges to the vmanage user. This user accounts for the core application processes. While not explicitly root initially, the vmanage user has extensive control over the SD-WAN fabric configurations and access to sensitive data stored on the manager.

Operational Risk: With vmanage access, an attacker can:

  • Modify network configurations pushed to edge routers.
  • Intercept traffic telemetry.
  • Disrupt network availability by corrupting essential database files or binaries.
  • Pivot to other network components managed by the compromised instance.

Wild Exploitation: Intelligence sources indicate this vulnerability is being exploited in the wild. Attackers are actively scanning for exposed SD-WAN Managers and utilizing this flaw, often in conjunction with other exploits, to establish persistence in critical network infrastructure.

Official Patches

CiscoCisco Security Advisory: Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability

Technical Appendix

CVSS Score
5.4/ 10
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
EPSS Probability
0.04%
Top 87% most exploited

Affected Systems

Cisco Catalyst SD-WAN Manager (vManage)

Affected Versions Detail

Product
Affected Versions
Fixed Version
Cisco Catalyst SD-WAN Manager
Cisco
< 20.9.8.220.9.8.2
Cisco Catalyst SD-WAN Manager
Cisco
20.11.0 - 20.12.5.220.12.5.3
Cisco Catalyst SD-WAN Manager
Cisco
20.13.0 - 20.15.4.120.15.4.2
Cisco Catalyst SD-WAN Manager
Cisco
20.16.0 - 20.18.2.020.18.2.1
AttributeDetail
CVSS v3.15.4 (Medium)
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CWECWE-648 (Incorrect Use of Privileged APIs)
EPSS Score0.04% (Low but rising)
Exploit StatusActive Exploitation Reported
Privilege RequiredRead-Only (Low)

MITRE ATT&CK Mapping

T1078Valid Accounts
Initial Access
T1565Data Manipulation
Impact
T1068Exploitation for Privilege Escalation
Privilege Escalation
CWE-648
Incorrect Use of Privileged APIs

The application uses an API in a way that bypasses or incorrectly applies security controls associated with privileged operations.

Vulnerability Timeline

Cisco publishes Security Advisory cisco-sa-sdwan-authbp-qwCX8D4v
2026-02-25
CVE-2026-20122 record created in NVD
2026-02-25
Reports of active exploitation in the wild
2026-03-01

References & Sources

  • [1]NVD - CVE-2026-20122
  • [2]SentinelOne Vulnerability Analysis
Related Vulnerabilities
CVE-2026-20127CVE-2026-20128