SARA / Free Tools / KEV / CVE-2022-20775

CVE-2022-20775 on CISA KEV

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.

CISA KEV — Actively Exploited

Cisco SD-WAN Path Traversal Vulnerability

Vendor / Product
— / Cisco / SD-WAN
Added to KEV
2026-02-25
BOD 22-01 due
2026-02-27
Ransomware use
Unknown
CVSS / EPSS
7.8 HIGH · EPSS 50.00%

01What CISA says about this vulnerability

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.

02Required action — verbatim from CISA

Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

03Notes & references

04SARA's analyst layer — why this matters

This vulnerability is currently on the CISA KEV list, which CISA only adds CVEs to when there is reliable evidence of active exploitation in the wild. For federal civilian agencies, BOD 22-01 requires remediation by the due date above. For everyone else, KEV is the strongest "patch immediately" signal you can get from public threat intel.

05Affected products (summary)

VendorProductVersions
CiscoCisco Catalyst SDWAN — 18.3.1, 19.2.1, 17.2.4, 19.3.0, 18.3.0, 18.3.4, 18.4.303, 18.4.0.1, 17.2.9, 18.3.7, 18.2.0, 17.2.10, 18.4.5, 18.4.0, 17.2.5, 18.3.8, 18.4.4, 18.4.302, 17.2.7, 19.2.098, 20.1.1, 19.2.099, 18.3.3, 18.4.1, 17.2.8, 18.3.5, 19.0.0, 18.4.3, 19.1.0, 17.2.6, 18.3.3.1, 19.2.097, 20.1.1.1, 18.3.6, 19.2.0, 19.2.2, 20.1.11, 20.1.12, 19.1.0a, 19.2.3, 17.3.1ESM1, 20.3.1, 17.3.1ESM2, 17.2.1LA, 20.1.2, 17.3.1ESM3, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 17.3.2ESM1, 20.3.2.1, 18.4.6, 20.4.1, 17.3.2ESM2, 19.2.4, 20.4.1.1, 20.3.3, 20.3.809, 20.3.3.1, 20.5.1, 20.3.811, 20.1.3, 20.4.1.2, 17.4.2.2527, 17.4.2ES1, 17.3.2ESM3, 20.4.2, 20.3.4, 20.6.1, 20.6.1.1, 20.6.2, 20.7.1, 20.4.2.1, 20.3.4.1, 20.5.1.1, 20.6.2.1, 20.3.4.2, 20.4.2.2, 20.6.2.2, 20.5.1.2, 20.7.1.1, 20.3.5, 20.6.3, 20.7.2, 20.6.3.1, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.6.5.1, 20.6.4.1, 20.6.3.2, 20.4.2.3, 20.6.1.2, 20.3.4.3, 20.6.5.2, 20.3.3.2, 20.3.7.1, 20.3.5.1, 20.1.3.1, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.6.4.2, 20.6.5.5, 20.6.3.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8
CiscoCisco Catalyst SDWAN Manager — 20.1.12, 19.2.1, 18.4.4, 18.4.5, 20.1.1.1, 20.1.1, 19.3.0, 19.2.2, 19.2.099, 18.3.6, 18.3.7, 19.2.0, 18.3.8, 19.0.0, 19.1.0, 18.4.302, 18.4.303, 19.2.097, 19.2.098, 17.2.10, 18.3.6.1, 19.0.1a, 18.2.0, 18.4.3, 18.4.1, 17.2.8, 18.3.3.1, 18.4.0, 18.3.1, 17.2.6, 17.2.9, 18.3.4, 17.2.5, 18.3.1.1, 18.3.5, 18.4.0.1, 18.3.3, 17.2.7, 17.2.4, 18.3.0, 19.2.3, 18.4.501_ES, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 20.3.2_925, 20.3.2.1, 20.3.2.1_927, 18.4.6, 20.1.2_937, 20.4.1, 20.3.2_928, 20.3.2_929, 20.4.1.0.1, 20.3.2.1_930, 19.2.4, 20.5.0.1.1, 20.4.1.1, 20.3.3, 19.2.4.0.1, 20.3.2_937, 20.3.3.1, 20.5.1, 20.1.3, 20.3.3.0.4, 20.3.3.1.2, 20.3.3.1.1, 20.4.1.2, 20.3.3.0.2, 20.4.1.1.5, 20.4.1.0.01, 20.4.1.0.02, 20.3.3.1.7, 20.3.3.1.5, 20.5.1.0.1, 20.3.3.1.10, 20.3.3.0.8, 20.4.2, 20.4.2.0.1, 20.3.4, 20.3.3.0.14, 19.2.4.0.8, 19.2.4.0.9, 20.3.4.0.1, 20.3.2.0.5, 20.6.1, 20.5.1.0.2, 20.3.3.0.17, 20.6.1.1, 20.6.0.18.3, 20.3.2.0.6, 20.6.0.18.4, 20.4.2.0.2, 20.3.3.0.16, 20.3.4.0.5, 20.6.1.0.1, 20.3.4.0.6, 20.6.2, 20.7.1EFT2, 20.3.4.0.9, 20.3.4.0.11, 20.4.2.0.4, 20.3.3.0.18, 20.7.1, 20.6.2.1, 20.3.4.1, 20.5.1.1, 20.4.2.1, 20.4.2.1.1, 20.3.4.1.1, 20.3.813, 20.3.4.0.19, 20.4.2.2.1, 20.5.1.2, 20.3.4.2, 20.3.814, 20.4.2.2, 20.6.2.2, 20.3.4.2.1, 20.7.1.1, 20.3.4.1.2, 20.6.2.2.2, 20.3.4.0.20, 20.6.2.2.3, 20.4.2.2.2, 20.3.5, 20.6.2.0.4, 20.4.2.2.3, 20.3.4.0.24, 20.6.2.2.7, 20.6.3, 20.3.4.2.2, 20.4.2.2.4, 20.7.1.0.2, 20.3.5.0.8, 20.3.5.0.9, 20.3.5.0.7, 20.3.6, 20.3.7, 20.3.5.1, 20.3.4.3, 20.3.3.2, 20.3.7.1, 20.3.4.0.25, 20.6.2.2.4, 20.6.1.2, 20.3.4.0.26, 20.3.7.2, 20.3.8
CiscoCisco SDWAN vContainer — 18.4.5, 20.1.12, 18.3.6, 19.2.1, 19.3.0, 20.1.1, 19.2.2, 18.3.8, 18.4.3, 18.4.4, 18.4.302, 19.1.0, 18.4.303, 19.2.0, 19.2.098, 17.2.10, 18.3.7, 18.3.1, 19.2.099, 19.2.097, 18.3.4, 18.2.0, 18.3.5, 18.4.1, 17.2.5, 17.2.7, 17.2.8, 17.2.9, 18.4.0, 17.2.6, 18.3.0, 17.2.4, 18.3.3, 19.2.3, 20.3.1, 20.1.2
CiscoCisco SDWAN vEdge Cloud — 19.2.1, 20.1.12, 18.4.4, 19.3.0, 18.3.8, 19.2.2, 20.1.1, 18.3.6, 18.4.3, 18.4.302, 18.4.5, 18.4.303, 19.2.098, 19.1.0, 17.2.10, 19.0.1a, 19.2.099, 18.3.7, 19.2.097, 18.3.1, 19.2.0, 17.2.9, 18.3.4, 18.2.0, 18.4.1, 17.2.5, 18.4.0, 18.3.5, 18.3.3, 17.2.7, 17.2.6, 17.2.8, 18.3.0, 17.2.4, 19.2.3, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 18.4.6, 20.4.1, 19.2.4, 20.4.1.1, 20.3.3, 20.5.1, 20.1.3, 20.4.1.2, 20.4.2, 20.3.4, 20.6.1, 20.6.2, 20.7.1, 20.3.5, 20.6.3, 20.7.2, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.4.2.3, 20.3.4.3, 20.6.4.1, 20.6.3.2, 20.3.5.1, 20.6.5.2, 20.3.7.1, 20.3.3.2, 20.6.1.2, 20.1.3.1, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8
CiscoCisco SDWAN vEdge Router — 18.4.303, 18.3.7, 19.3.0, 18.2.0, 20.1.12, 19.2.099, 17.2.10, 18.3.3, 18.3.6, 19.0.0, 17.2.6, 18.4.0, 19.1.01, 19.2.098, 18.3.1, 18.4.302, 19.2.2, 18.3.5, 17.2.9, 19.1.0, 20.1.11, 19.2.097, 18.4.5, 17.2.5, 17.2.8, 18.3.8, 18.3.0, 18.4.3, 18.4.4, 19.2.1, 17.2.4, 18.3.4, 19.0.1a, 20.1.1, 17.2.7, 18.4.1, 19.2.0, 19.2.3, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 18.4.6, 20.4.1, 19.2.4, 20.4.1.1, 20.3.3, 20.5.1, 20.1.3, 20.4.1.2, 20.4.2, 20.3.4, 20.6.1, 20.6.2, 20.7.1, 20.7.1.2, 20.3.5, 20.6.3, 20.7.2, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.6.5.1, 20.3.3.2, 20.6.4.1, 20.6.3.2, 20.3.4.3, 20.6.5.2, 20.3.7.1, 20.3.5.1, 20.6.1.2, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8

06Detection

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection:

Open in Sigma generator →

Programmatic KEV data?
SARA's API returns KEV, CVSS, EPSS + analyst summary in one call.
Read the API reference →