A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Cisco Catalyst SD | WAN — 18.3.1, 19.2.1, 17.2.4, 19.3.0, 18.3.0, 18.3.4, 18.4.303, 18.4.0.1, 17.2.9, 18.3.7, 18.2.0, 17.2.10, 18.4.5, 18.4.0, 17.2.5, 18.3.8, 18.4.4, 18.4.302, 17.2.7, 19.2.098, 20.1.1, 19.2.099, 18.3.3, 18.4.1, 17.2.8, 18.3.5, 19.0.0, 18.4.3, 19.1.0, 17.2.6, 18.3.3.1, 19.2.097, 20.1.1.1, 18.3.6, 19.2.0, 19.2.2, 20.1.11, 20.1.12, 19.1.0a, 19.2.3, 17.3.1ESM1, 20.3.1, 17.3.1ESM2, 17.2.1LA, 20.1.2, 17.3.1ESM3, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 17.3.2ESM1, 20.3.2.1, 18.4.6, 20.4.1, 17.3.2ESM2, 19.2.4, 20.4.1.1, 20.3.3, 20.3.809, 20.3.3.1, 20.5.1, 20.3.811, 20.1.3, 20.4.1.2, 17.4.2.2527, 17.4.2ES1, 17.3.2ESM3, 20.4.2, 20.3.4, 20.6.1, 20.6.1.1, 20.6.2, 20.7.1, 20.4.2.1, 20.3.4.1, 20.5.1.1, 20.6.2.1, 20.3.4.2, 20.4.2.2, 20.6.2.2, 20.5.1.2, 20.7.1.1, 20.3.5, 20.6.3, 20.7.2, 20.6.3.1, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.6.5.1, 20.6.4.1, 20.6.3.2, 20.4.2.3, 20.6.1.2, 20.3.4.3, 20.6.5.2, 20.3.3.2, 20.3.7.1, 20.3.5.1, 20.1.3.1, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.6.4.2, 20.6.5.5, 20.6.3.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8 |
| Cisco | Cisco Catalyst SD | WAN Manager — 20.1.12, 19.2.1, 18.4.4, 18.4.5, 20.1.1.1, 20.1.1, 19.3.0, 19.2.2, 19.2.099, 18.3.6, 18.3.7, 19.2.0, 18.3.8, 19.0.0, 19.1.0, 18.4.302, 18.4.303, 19.2.097, 19.2.098, 17.2.10, 18.3.6.1, 19.0.1a, 18.2.0, 18.4.3, 18.4.1, 17.2.8, 18.3.3.1, 18.4.0, 18.3.1, 17.2.6, 17.2.9, 18.3.4, 17.2.5, 18.3.1.1, 18.3.5, 18.4.0.1, 18.3.3, 17.2.7, 17.2.4, 18.3.0, 19.2.3, 18.4.501_ES, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 20.3.2_925, 20.3.2.1, 20.3.2.1_927, 18.4.6, 20.1.2_937, 20.4.1, 20.3.2_928, 20.3.2_929, 20.4.1.0.1, 20.3.2.1_930, 19.2.4, 20.5.0.1.1, 20.4.1.1, 20.3.3, 19.2.4.0.1, 20.3.2_937, 20.3.3.1, 20.5.1, 20.1.3, 20.3.3.0.4, 20.3.3.1.2, 20.3.3.1.1, 20.4.1.2, 20.3.3.0.2, 20.4.1.1.5, 20.4.1.0.01, 20.4.1.0.02, 20.3.3.1.7, 20.3.3.1.5, 20.5.1.0.1, 20.3.3.1.10, 20.3.3.0.8, 20.4.2, 20.4.2.0.1, 20.3.4, 20.3.3.0.14, 19.2.4.0.8, 19.2.4.0.9, 20.3.4.0.1, 20.3.2.0.5, 20.6.1, 20.5.1.0.2, 20.3.3.0.17, 20.6.1.1, 20.6.0.18.3, 20.3.2.0.6, 20.6.0.18.4, 20.4.2.0.2, 20.3.3.0.16, 20.3.4.0.5, 20.6.1.0.1, 20.3.4.0.6, 20.6.2, 20.7.1EFT2, 20.3.4.0.9, 20.3.4.0.11, 20.4.2.0.4, 20.3.3.0.18, 20.7.1, 20.6.2.1, 20.3.4.1, 20.5.1.1, 20.4.2.1, 20.4.2.1.1, 20.3.4.1.1, 20.3.813, 20.3.4.0.19, 20.4.2.2.1, 20.5.1.2, 20.3.4.2, 20.3.814, 20.4.2.2, 20.6.2.2, 20.3.4.2.1, 20.7.1.1, 20.3.4.1.2, 20.6.2.2.2, 20.3.4.0.20, 20.6.2.2.3, 20.4.2.2.2, 20.3.5, 20.6.2.0.4, 20.4.2.2.3, 20.3.4.0.24, 20.6.2.2.7, 20.6.3, 20.3.4.2.2, 20.4.2.2.4, 20.7.1.0.2, 20.3.5.0.8, 20.3.5.0.9, 20.3.5.0.7, 20.3.6, 20.3.7, 20.3.5.1, 20.3.4.3, 20.3.3.2, 20.3.7.1, 20.3.4.0.25, 20.6.2.2.4, 20.6.1.2, 20.3.4.0.26, 20.3.7.2, 20.3.8 |
| Cisco | Cisco SD | WAN vContainer — 18.4.5, 20.1.12, 18.3.6, 19.2.1, 19.3.0, 20.1.1, 19.2.2, 18.3.8, 18.4.3, 18.4.4, 18.4.302, 19.1.0, 18.4.303, 19.2.0, 19.2.098, 17.2.10, 18.3.7, 18.3.1, 19.2.099, 19.2.097, 18.3.4, 18.2.0, 18.3.5, 18.4.1, 17.2.5, 17.2.7, 17.2.8, 17.2.9, 18.4.0, 17.2.6, 18.3.0, 17.2.4, 18.3.3, 19.2.3, 20.3.1, 20.1.2 |
| Cisco | Cisco SD | WAN vEdge Cloud — 19.2.1, 20.1.12, 18.4.4, 19.3.0, 18.3.8, 19.2.2, 20.1.1, 18.3.6, 18.4.3, 18.4.302, 18.4.5, 18.4.303, 19.2.098, 19.1.0, 17.2.10, 19.0.1a, 19.2.099, 18.3.7, 19.2.097, 18.3.1, 19.2.0, 17.2.9, 18.3.4, 18.2.0, 18.4.1, 17.2.5, 18.4.0, 18.3.5, 18.3.3, 17.2.7, 17.2.6, 17.2.8, 18.3.0, 17.2.4, 19.2.3, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 18.4.6, 20.4.1, 19.2.4, 20.4.1.1, 20.3.3, 20.5.1, 20.1.3, 20.4.1.2, 20.4.2, 20.3.4, 20.6.1, 20.6.2, 20.7.1, 20.3.5, 20.6.3, 20.7.2, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.4.2.3, 20.3.4.3, 20.6.4.1, 20.6.3.2, 20.3.5.1, 20.6.5.2, 20.3.7.1, 20.3.3.2, 20.6.1.2, 20.1.3.1, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8 |
| Cisco | Cisco SD | WAN vEdge Router — 18.4.303, 18.3.7, 19.3.0, 18.2.0, 20.1.12, 19.2.099, 17.2.10, 18.3.3, 18.3.6, 19.0.0, 17.2.6, 18.4.0, 19.1.01, 19.2.098, 18.3.1, 18.4.302, 19.2.2, 18.3.5, 17.2.9, 19.1.0, 20.1.11, 19.2.097, 18.4.5, 17.2.5, 17.2.8, 18.3.8, 18.3.0, 18.4.3, 18.4.4, 19.2.1, 17.2.4, 18.3.4, 19.0.1a, 20.1.1, 17.2.7, 18.4.1, 19.2.0, 19.2.3, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 18.4.6, 20.4.1, 19.2.4, 20.4.1.1, 20.3.3, 20.5.1, 20.1.3, 20.4.1.2, 20.4.2, 20.3.4, 20.6.1, 20.6.2, 20.7.1, 20.7.1.2, 20.3.5, 20.6.3, 20.7.2, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.6.5.1, 20.3.3.2, 20.6.4.1, 20.6.3.2, 20.3.4.3, 20.6.5.2, 20.3.7.1, 20.3.5.1, 20.6.1.2, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8 |
Yes — actively exploited. Added to the CISA KEV catalog on 2026-02-25. Ransomware use: Unknown.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.