CVE-2025-20122
HIGHCisco Catalyst SD-WAN Manager - Privilege Escalation
Title source: llmDescription
A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system. This vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
Scores
CVSS v3
7.8
EPSS
0.0006
EPSS Percentile
19.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-300
Status
published
Affected Products (50)
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
cisco/catalyst_sd-wan_manager
... and 35 more
Timeline
Published
May 07, 2025
Tracked Since
Feb 18, 2026