VYPR
Unrated severityCISA KEVNVD Advisory· Published Sep 30, 2022· Updated Mar 2, 2026

Cisco SD-WAN Software Privilege Escalation Vulnerability

CVE-2022-20775

Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.

This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

Affected products

5
  • Cisco/Cisco Catalyst SD-WANv5
    Range: 18.3.1
  • Cisco/Cisco Catalyst SD-WAN Managerv5
    Range: 20.1.12
  • Cisco/Cisco SD-WAN vContainerv5
    Range: 18.4.5
  • Cisco/Cisco SD-WAN vEdge Cloudv5
    Range: 19.2.1
  • Cisco/Cisco SD-WAN vEdge Routerv5
    Range: 18.4.303

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1