Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
CISA Known Exploited Vulnerability
Date added 2026-02-25 | Due date 2026-02-27
Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
Problem types
Product status
18.3.1
19.2.1
17.2.4
19.3.0
18.3.0
18.3.4
18.4.303
18.4.0.1
17.2.9
18.3.7
18.2.0
17.2.10
18.4.5
18.4.0
17.2.5
18.3.8
18.4.4
18.4.302
17.2.7
19.2.098
20.1.1
19.2.099
18.3.3
18.4.1
17.2.8
18.3.5
19.0.0
18.4.3
19.1.0
17.2.6
18.3.3.1
19.2.097
20.1.1.1
18.3.6
19.2.0
19.2.2
20.1.11
20.1.12
19.1.0a
19.2.3
17.3.1ESM1
20.3.1
17.3.1ESM2
17.2.1LA
20.1.2
17.3.1ESM3
19.2.929
19.2.31
20.3.2
19.2.32
17.3.2ESM1
20.3.2.1
18.4.6
20.4.1
17.3.2ESM2
19.2.4
20.4.1.1
20.3.3
20.3.809
20.3.3.1
20.5.1
20.3.811
20.1.3
20.4.1.2
17.4.2.2527
17.4.2ES1
17.3.2ESM3
20.4.2
20.3.4
20.6.1
20.6.1.1
20.6.2
20.7.1
20.4.2.1
20.3.4.1
20.5.1.1
20.6.2.1
20.3.4.2
20.4.2.2
20.6.2.2
20.5.1.2
20.7.1.1
20.3.5
20.6.3
20.7.2
20.6.3.1
20.6.4
20.3.6
20.6.5
20.3.7
20.6.5.1
20.6.4.1
20.6.3.2
20.4.2.3
20.6.1.2
20.3.4.3
20.6.5.2
20.3.3.2
20.3.7.1
20.3.5.1
20.1.3.1
20.6.5.3
20.6.3.3
20.3.7.2
20.6.5.4
20.6.4.2
20.6.5.5
20.6.3.4
20.3.8
20.6.6
20.6.7
20.6.8
20.1.12
19.2.1
18.4.4
18.4.5
20.1.1.1
20.1.1
19.3.0
19.2.2
19.2.099
18.3.6
18.3.7
19.2.0
18.3.8
19.0.0
19.1.0
18.4.302
18.4.303
19.2.097
19.2.098
17.2.10
18.3.6.1
19.0.1a
18.2.0
18.4.3
18.4.1
17.2.8
18.3.3.1
18.4.0
18.3.1
17.2.6
17.2.9
18.3.4
17.2.5
18.3.1.1
18.3.5
18.4.0.1
18.3.3
17.2.7
17.2.4
18.3.0
19.2.3
18.4.501_ES
20.3.1
20.1.2
19.2.929
19.2.31
20.3.2
19.2.32
20.3.2_925
20.3.2.1
20.3.2.1_927
18.4.6
20.1.2_937
20.4.1
20.3.2_928
20.3.2_929
20.4.1.0.1
20.3.2.1_930
19.2.4
20.5.0.1.1
20.4.1.1
20.3.3
19.2.4.0.1
20.3.2_937
20.3.3.1
20.5.1
20.1.3
20.3.3.0.4
20.3.3.1.2
20.3.3.1.1
20.4.1.2
20.3.3.0.2
20.4.1.1.5
20.4.1.0.01
20.4.1.0.02
20.3.3.1.7
20.3.3.1.5
20.5.1.0.1
20.3.3.1.10
20.3.3.0.8
20.4.2
20.4.2.0.1
20.3.4
20.3.3.0.14
19.2.4.0.8
19.2.4.0.9
20.3.4.0.1
20.3.2.0.5
20.6.1
20.5.1.0.2
20.3.3.0.17
20.6.1.1
20.6.0.18.3
20.3.2.0.6
20.6.0.18.4
20.4.2.0.2
20.3.3.0.16
20.3.4.0.5
20.6.1.0.1
20.3.4.0.6
20.6.2
20.7.1EFT2
20.3.4.0.9
20.3.4.0.11
20.4.2.0.4
20.3.3.0.18
20.7.1
20.6.2.1
20.3.4.1
20.5.1.1
20.4.2.1
20.4.2.1.1
20.3.4.1.1
20.3.813
20.3.4.0.19
20.4.2.2.1
20.5.1.2
20.3.4.2
20.3.814
20.4.2.2
20.6.2.2
20.3.4.2.1
20.7.1.1
20.3.4.1.2
20.6.2.2.2
20.3.4.0.20
20.6.2.2.3
20.4.2.2.2
20.3.5
20.6.2.0.4
20.4.2.2.3
20.3.4.0.24
20.6.2.2.7
20.6.3
20.3.4.2.2
20.4.2.2.4
20.7.1.0.2
20.3.5.0.8
20.3.5.0.9
20.3.5.0.7
20.3.6
20.3.7
20.3.5.1
20.3.4.3
20.3.3.2
20.3.7.1
20.3.4.0.25
20.6.2.2.4
20.6.1.2
20.3.4.0.26
20.3.7.2
20.3.8
18.4.5
20.1.12
18.3.6
19.2.1
19.3.0
20.1.1
19.2.2
18.3.8
18.4.3
18.4.4
18.4.302
19.1.0
18.4.303
19.2.0
19.2.098
17.2.10
18.3.7
18.3.1
19.2.099
19.2.097
18.3.4
18.2.0
18.3.5
18.4.1
17.2.5
17.2.7
17.2.8
17.2.9
18.4.0
17.2.6
18.3.0
17.2.4
18.3.3
19.2.3
20.3.1
20.1.2
19.2.1
20.1.12
18.4.4
19.3.0
18.3.8
19.2.2
20.1.1
18.3.6
18.4.3
18.4.302
18.4.5
18.4.303
19.2.098
19.1.0
17.2.10
19.0.1a
19.2.099
18.3.7
19.2.097
18.3.1
19.2.0
17.2.9
18.3.4
18.2.0
18.4.1
17.2.5
18.4.0
18.3.5
18.3.3
17.2.7
17.2.6
17.2.8
18.3.0
17.2.4
19.2.3
20.3.1
20.1.2
19.2.929
19.2.31
20.3.2
19.2.32
18.4.6
20.4.1
19.2.4
20.4.1.1
20.3.3
20.5.1
20.1.3
20.4.1.2
20.4.2
20.3.4
20.6.1
20.6.2
20.7.1
20.3.5
20.6.3
20.7.2
20.6.4
20.3.6
20.6.5
20.3.7
20.4.2.3
20.3.4.3
20.6.4.1
20.6.3.2
20.3.5.1
20.6.5.2
20.3.7.1
20.3.3.2
20.6.1.2
20.1.3.1
20.6.5.3
20.6.3.3
20.3.7.2
20.6.5.4
20.3.8
20.6.6
20.6.7
20.6.8
18.4.303
18.3.7
19.3.0
18.2.0
20.1.12
19.2.099
17.2.10
18.3.3
18.3.6
19.0.0
17.2.6
18.4.0
19.1.01
19.2.098
18.3.1
18.4.302
19.2.2
18.3.5
17.2.9
19.1.0
20.1.11
19.2.097
18.4.5
17.2.5
17.2.8
18.3.8
18.3.0
18.4.3
18.4.4
19.2.1
17.2.4
18.3.4
19.0.1a
20.1.1
17.2.7
18.4.1
19.2.0
19.2.3
20.3.1
20.1.2
19.2.929
19.2.31
20.3.2
19.2.32
18.4.6
20.4.1
19.2.4
20.4.1.1
20.3.3
20.5.1
20.1.3
20.4.1.2
20.4.2
20.3.4
20.6.1
20.6.2
20.7.1
20.7.1.2
20.3.5
20.6.3
20.7.2
20.6.4
20.3.6
20.6.5
20.3.7
20.6.5.1
20.3.3.2
20.6.4.1
20.6.3.2
20.3.4.3
20.6.5.2
20.3.7.1
20.3.5.1
20.6.1.2
20.6.5.3
20.6.3.3
20.3.7.2
20.6.5.4
20.3.8
20.6.6
20.6.7
20.6.8
References
tools.cisco.com/...ityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF (20220928 Cisco SD-WAN Software Privilege Escalation Vulnerabilities)
tools.cisco.com/...ityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF
github.com/...search/security/advisories/GHSA-wmjv-552v-pxjc
www.cisa.gov/...erabilities-catalog?field_cve=CVE-2022-20775
sec.cloudapps.cisco.com/...ory/cisco-sa-sd-wan-priv-E6e8tEdF (cisco-sa-sd-wan-priv-E6e8tEdF)