A vulnerability in the web UI of Cisco Catalyst SD-WAN...
Moderate severity
Unreviewed
Published
May 14, 2026
to the GitHub Advisory Database
•
Updated May 14, 2026
Description
Published by the National Vulnerability Database
May 14, 2026
Published to the GitHub Advisory Database
May 14, 2026
Last updated
May 14, 2026
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an authenticated, remote attacker with read-only permissions to elevate their privileges from low to high and perform actions as a high-privileged user.
This vulnerability exists because sensitive session information is recorded in audit logs. An attacker could exploit this vulnerability by elevating their read-only permissions in Cisco Catalyst SD-WAN Manager to those of a high-privileged user. A successful exploit could allow the attacker to perform actions as a high-privileged user.
References