CVE-2025-20122

HIGH

Cisco Catalyst SD-WAN Manager - Privilege Escalation

Title source: llm

Description

A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system. This vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.

Scores

CVSS v3 7.8
EPSS 0.0006
EPSS Percentile 19.2%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-300
Status published

Affected Products (50)

cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
... and 35 more

Timeline

Published May 07, 2025
Tracked Since Feb 18, 2026