CVE-2026-20168: Unauthorized File Retrieval in Cisco IoT FND Web UI
CVE-2026-20168 Published on May 6, 2026
Cisco IoT Field Network Director Path Traversal Vulnerability
A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to retrieve files that they do not have permission to access.
This vulnerability is due to insufficient file access checks. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to read files that they are not authorized to access.
Vulnerability Analysis
CVE-2026-20168 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
7PK - Errors
This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that occur when an application does not properly handle errors that occur during processing. According to the authors of the Seven Pernicious Kingdoms, "Errors and error handling represent a class of API. Errors related to error handling are so common that they deserve a special kingdom of their own. As with 'API Abuse,' there are two ways to introduce an error-related security vulnerability: the most common one is handling errors poorly (or not at all). The second is producing errors that either give out too much information (to possible attackers) or are difficult to handle."
Affected Versions
Cisco IoT Field Network Director (IoT-FND):- Version 4.5.1 is affected.
- Version 4.4.3 is affected.
- Version 4.1.0 is affected.
- Version 4.1.3 is affected.
- Version 4.6.1 is affected.
- Version 4.1.1 is affected.
- Version 4.4.0 is affected.
- Version 4.2.0 is affected.
- Version 4.4.2 is affected.
- Version 4.3.0 is affected.
- Version 4.6.0 is affected.
- Version 4.4.4 is affected.
- Version 4.3.2 is affected.
- Version 4.1.2 is affected.
- Version 4.4.1 is affected.
- Version 4.5.0 is affected.
- Version 4.3.1 is affected.
- Version 4.7.0 is affected.
- Version 4.6.2 is affected.
- Version 4.7.1 is affected.
- Version 4.7.2 is affected.
- Version 4.8.0 is affected.
- Version 4.8.1 is affected.
- Version 4.9.0 is affected.
- Version 4.9.1 is affected.
- Version 4.10.0 is affected.
- Version 4.9.2 is affected.
- Version 4.11.0 is affected.
- Version 4.12.0 is affected.
- Version 4.12.1 is affected.