Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Cisco Catalyst SD-WAN Manager DCA Credentials Exposed, Local Privilege Escalation
CVE-2026-20128
Summary
A vulnerability in Cisco Catalyst SD-WAN Manager's Data Collection Agent feature allows an authorized but malicious user on the same network to gain administrator-level access to the system by accessing a stored password file. This could allow the attacker to access other systems on the network. Affected systems should be updated to version 20.18 or later to prevent this vulnerability.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| cisco | catalyst_sd-wan_manager | <= 20.9.8.2 | – |
| cisco | catalyst_sd-wan_manager | > 20.11 , <= 20.12.5.3 | – |
| cisco | catalyst_sd-wan_manager | > 20.13 , <= 20.15.4.2 | – |
| cisco | catalyst_sd-wan_manager | > 20.16 , <= 20.18 | – |
| cisco | catalyst_sd-wan_manager | 20.12.6 | – |
Original title
A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploi...
Original description
A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid vmanage credentials on the affected system.
This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges.
Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.
This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges.
Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.
nvd CVSS3.1
7.5
Vulnerability type
CWE-257
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026