A vulnerability in the web UI of Cisco Catalyst SD-WAN...
Moderate severity
Unreviewed
Published
May 14, 2026
to the GitHub Advisory Database
•
Updated May 14, 2026
Description
Published by the National Vulnerability Database
May 14, 2026
Published to the GitHub Advisory Database
May 14, 2026
Last updated
May 14, 2026
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an authenticated, remote attacker with read-only permissions to modify configurations and perform unauthorized actions on an affected system.
This vulnerability exists because of a failure to redact sensitive information within device configurations and templates. An attacker could exploit this vulnerability by elevating their read-only permissions to those of a high-privileged user. A successful exploit could allow the attacker to access or modify configuration settings within Cisco Catalyst SD-WAN Manager as a high-privileged user.
References