First published: Wed May 07 2025(Updated: )
A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system. This vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst SD-WAN Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20122 is rated as a high severity vulnerability due to its potential to allow root access on affected systems.
To mitigate CVE-2025-20122, apply the latest security patches provided by Cisco for the Catalyst SD-WAN Manager.
CVE-2025-20122 affects users of the Cisco Catalyst SD-WAN Manager with insufficient input validation vulnerabilities.
An authenticated, local attacker can exploit CVE-2025-20122 to gain elevated privileges to the root user on the operating system.
CVE-2025-20122 was disclosed in 2025, highlighting significant security concerns for the affected software.