Cisco Catalyst SD-WAN Manager DCA Privilege Escalation before 20.18
CVE-2026-20128 Published on February 25, 2026
Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability
A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid vmanage credentials on the affected system.
This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges.
Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.
Vulnerability Analysis
CVE-2026-20128 is exploitable with local system access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Storing Passwords in a Recoverable Format
The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fact, it should be noted that recoverable encrypted passwords provide no significant benefit over plaintext passwords since they are subject not only to reuse by malicious attackers but also by malicious insiders. If a system administrator can recover a password directly, or use a brute force search on the available information, the administrator can use the password on other accounts.
Products Associated with CVE-2026-20128
Want to know whenever a new CVE is published for Cisco Catalyst Sd Wan Manager? stack.watch will email you.
Affected Versions
Cisco Catalyst SD-WAN Manager:- Version 20.1.12 is affected.
- Version 19.2.1 is affected.
- Version 18.4.4 is affected.
- Version 18.4.5 is affected.
- Version 20.1.1.1 is affected.
- Version 20.1.1 is affected.
- Version 19.3.0 is affected.
- Version 19.2.2 is affected.
- Version 19.2.099 is affected.
- Version 18.3.6 is affected.
- Version 18.3.7 is affected.
- Version 19.2.0 is affected.
- Version 18.3.8 is affected.
- Version 19.0.0 is affected.
- Version 19.1.0 is affected.
- Version 18.4.302 is affected.
- Version 18.4.303 is affected.
- Version 19.2.097 is affected.
- Version 19.2.098 is affected.
- Version 17.2.10 is affected.
- Version 18.3.6.1 is affected.
- Version 19.0.1a is affected.
- Version 18.2.0 is affected.
- Version 18.4.3 is affected.
- Version 18.4.1 is affected.
- Version 17.2.8 is affected.
- Version 18.3.3.1 is affected.
- Version 18.4.0 is affected.
- Version 18.3.1 is affected.
- Version 17.2.6 is affected.
- Version 17.2.9 is affected.
- Version 18.3.4 is affected.
- Version 17.2.5 is affected.
- Version 18.3.1.1 is affected.
- Version 18.3.5 is affected.
- Version 18.4.0.1 is affected.
- Version 18.3.3 is affected.
- Version 17.2.7 is affected.
- Version 18.3.0 is affected.
- Version 19.2.3 is affected.
- Version 18.4.501_ES is affected.
- Version 20.3.1 is affected.
- Version 20.1.2 is affected.
- Version 19.2.929 is affected.
- Version 19.2.31 is affected.
- Version 20.3.2 is affected.
- Version 19.2.32 is affected.
- Version 20.3.2.1 is affected.
- Version 20.3.2.1_927 is affected.
- Version 18.4.6 is affected.
- Version 20.3.2_928 is affected.
- Version 20.3.2_929 is affected.
- Version 20.4.1.0.1 is affected.
- Version 20.3.2.1_930 is affected.
- Version 19.2.4 is affected.
- Version 20.5.0.1.1 is affected.
- Version 20.4.1.1 is affected.
- Version 20.3.3 is affected.
- Version 19.2.4.0.1 is affected.
- Version 20.3.2_937 is affected.
- Version 20.5.1 is affected.
- Version 20.1.3 is affected.
- Version 20.3.3.0.4 is affected.
- Version 20.3.3.1.2 is affected.
- Version 20.3.3.1.1 is affected.
- Version 20.4.1.2 is affected.
- Version 20.3.3.0.2 is affected.
- Version 20.4.1.1.5 is affected.
- Version 20.4.1.0.02 is affected.
- Version 20.3.3.1.7 is affected.
- Version 20.3.3.1.5 is affected.
- Version 20.5.1.0.1 is affected.
- Version 20.3.3.1.10 is affected.
- Version 20.3.3.0.8 is affected.
- Version 20.4.2 is affected.
- Version 20.3.4 is affected.
- Version 20.3.3.0.14 is affected.
- Version 19.2.4.0.8 is affected.
- Version 19.2.4.0.9 is affected.
- Version 20.3.4.0.1 is affected.
- Version 20.3.2.0.5 is affected.
- Version 20.5.1.0.2 is affected.
- Version 20.6.1.1 is affected.
- Version 20.6.0.18.3 is affected.
- Version 20.3.2.0.6 is affected.
- Version 20.6.0.18.4 is affected.
- Version 20.4.2.0.2 is affected.
- Version 20.3.3.0.16 is affected.
- Version 20.6.1.0.1 is affected.
- Version 20.3.4.0.6 is affected.
- Version 20.7.1EFT2 is affected.
- Version 20.3.4.0.9 is affected.
- Version 20.3.4.0.11 is affected.
- Version 20.3.3.0.18 is affected.
- Version 20.6.2.1 is affected.
- Version 20.3.4.1 is affected.
- Version 20.4.2.1 is affected.
- Version 20.4.2.1.1 is affected.
- Version 20.3.4.1.1 is affected.
- Version 20.3.813 is affected.
- Version 20.3.4.0.19 is affected.
- Version 20.4.2.2.1 is affected.
- Version 20.5.1.2 is affected.
- Version 20.3.814 is affected.
- Version 20.4.2.2 is affected.
- Version 20.6.2.2 is affected.
- Version 20.3.4.2.1 is affected.
- Version 20.3.4.1.2 is affected.
- Version 20.3.4.0.20 is affected.
- Version 20.6.2.2.3 is affected.
- Version 20.4.2.2.2 is affected.
- Version 20.6.2.0.4 is affected.
- Version 20.3.4.0.24 is affected.
- Version 20.6.2.2.7 is affected.
- Version 20.3.4.2.2 is affected.
- Version 20.4.2.2.4 is affected.
- Version 20.3.5.0.8 is affected.
- Version 20.3.5.0.9 is affected.
- Version 20.3.5.0.7 is affected.
- Version 20.6.3.0.2 is affected.
- Version 20.9.1EFT2 is affected.
- Version 20.3.6 is affected.
- Version 20.3.7 is affected.
- Version 20.4.2.3 is affected.
- Version 20.3.5.1 is affected.
- Version 20.3.4.3 is affected.
- Version 20.3.3.2 is affected.
- Version 20.3.7.1 is affected.
- Version 20.3.4.0.25 is affected.
- Version 20.6.2.2.4 is affected.
- Version 20.6.1.2 is affected.
- Version 20.1.3.1 is affected.
- Version 20.6.5.1.4 is affected.
- Version 20.3.8 is affected.
- Version 20.12.501 is affected.
- Version 26.1.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.