A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system.
This vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system.
References
Configurations
No configuration.
History
08 May 2025, 14:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 May 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-07 18:15
Updated : 2025-05-08 14:39
NVD link : CVE-2025-20122
Mitre link : CVE-2025-20122
CVE.ORG link : CVE-2025-20122
JSON object : View
Products Affected
No product.
CWE
CWE-300
Channel Accessible by Non-Endpoint