HomeCiscoCVE-2026-20128

CVE-2026-20128

HIGH
7.5CVSS
Published: 2026-02-25
Updated: 2026-02-25
AI Analysis

Description

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
local
Complexity
high
Privileges
high
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-257

Metadata

Primary Vendor
CISCO
Published
2/25/2026
Last Modified
2/25/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

Cisco : Refer to Description

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-20128 | HIGH Severity | CVEDatabase.com | CVEDatabase.com