Cyber Posture

CVE-2026-20129

Critical

Published: 25 February 2026

Published
25 February 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 22.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20129 is a critical-severity Improper Authentication (CWE-287) vulnerability in Cisco Catalyst Sd-Wan Manager. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and IA-2 (Identification and Authentication (Organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification and authentication of organizational users for API access, directly addressing the improper authentication mechanism exploited in this CVE.

prevent

Prohibits and monitors actions without identification or authentication, preventing unauthenticated attackers from gaining netadmin access via crafted API requests.

prevent

Mandates timely flaw remediation through patching to Cisco Catalyst SD-WAN Manager 20.18 or later, eliminating the authentication bypass vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing API endpoint, directly enabling exploitation of a public-facing application to gain unauthorized elevated (netadmin) access and execute arbitrary commands.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability in the API user authentication of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain access to an affected system as a user who has the netadmin role. The vulnerability is due to improper authentication for…

more

requests that are sent to the API. An attacker could exploit this vulnerability by sending a crafted request to the API of an affected system. A successful exploit could allow the attacker to execute commands with the privileges of the netadmin role. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability. 

Deeper analysisAI

CVE-2026-20129 is a high-severity authentication bypass vulnerability (CWE-287) in the API user authentication mechanism of Cisco Catalyst SD-WAN Manager. Published on 2026-02-25, it stems from improper authentication handling for API requests, enabling an unauthenticated remote attacker to gain unauthorized access to affected systems. The issue affects Cisco Catalyst SD-WAN Manager releases prior to version 20.18.

An unauthenticated, remote attacker can exploit this vulnerability by sending a crafted request to the API endpoint of an affected system. Successful exploitation grants the attacker access equivalent to a user with the netadmin role, allowing them to execute arbitrary commands with those elevated privileges. The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical impact with high confidentiality, integrity, and availability consequences.

Cisco's security advisory notes that Catalyst SD-WAN Manager releases 20.18 and later are not affected, recommending upgrade to a patched version for mitigation. Additional details are available in the official advisory at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v.

Details

CWE(s)

Affected Products

cisco
catalyst sd-wan manager
20.12.6 · ≤ 20.9.8.2 · 20.11 — 20.12.5.3 · 20.13 — 20.15.4.2

CVEs Like This One

CVE-2026-20127Same product: Cisco Catalyst Sd-Wan Manager
CVE-2026-20128Same product: Cisco Catalyst Sd-Wan Manager
CVE-2026-20122Same product: Cisco Catalyst Sd-Wan Manager
CVE-2026-20126Same product: Cisco Catalyst Sd-Wan Manager
CVE-2026-20133Same product: Cisco Catalyst Sd-Wan Manager
CVE-2025-20393Same vendor: Cisco
CVE-2025-20363Same vendor: Cisco
CVE-2025-20337Same vendor: Cisco
CVE-2026-20131Same vendor: Cisco
CVE-2026-20103Same vendor: Cisco

References