Unrated severityCISA KEVNVD Advisory· Published Sep 30, 2022· Updated Mar 2, 2026
Cisco SD-WAN Software Privilege Escalation Vulnerability
CVE-2022-20775
Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
Affected products
5- Cisco/Cisco Catalyst SD-WANv5Range: 18.3.1
- Cisco/Cisco Catalyst SD-WAN Managerv5Range: 20.1.12
- Cisco/Cisco SD-WAN vContainerv5Range: 18.4.5
- Cisco/Cisco SD-WAN vEdge Cloudv5Range: 19.2.1
- Cisco/Cisco SD-WAN vEdge Routerv5Range: 18.4.303
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.