Key Takeaway
CVE-2022-20775 is a path traversal vulnerability in Cisco SD-WAN's CLI that allows an authenticated local attacker to bypass access controls and execute arbitrary commands as root. The flaw affects Cisco SD-WAN deployments and carries a CISA KEV remediation deadline of February 27, 2026 for federal agencies. Administrators should apply Cisco's official patches immediately and restrict CLI access to trusted accounts as an interim control.
CVE-2022-20775: Cisco SD-WAN CLI Path Traversal Enables Root-Level Privilege Escalation
CVE ID: CVE-2022-20775 Vendor: Cisco Affected Product: Cisco SD-WAN Attack Vector: Local (authenticated) Vulnerability Type: Path Traversal / Improper Access Control CISA KEV Patch Deadline: February 27, 2026
Vulnerability Overview
Cisco SD-WAN's command-line interface contains a path traversal vulnerability tracked as CVE-2022-20775. The flaw stems from improper access controls applied to commands within the application's CLI. An authenticated local attacker can exploit these deficient controls to traverse the file system beyond intended boundaries and execute arbitrary commands with root-level privileges.
The vulnerability does not require remote network access to trigger. An attacker must already hold a valid local account on the affected system. However, once that threshold is met, the authorization controls that are supposed to restrict privileged command execution fail to enforce boundaries correctly, allowing full root compromise.
Technical Details
Path traversal vulnerabilities occur when an application fails to sanitize or restrict file path inputs, allowing an attacker to reference directories and files outside the intended scope. In this case, the Cisco SD-WAN CLI does not adequately validate or restrict the commands and associated paths available to authenticated users.
By supplying crafted input to the CLI, an attacker can move outside the restricted command context and reach system-level functionality. The access control mechanism that should gate privileged operations does not correctly evaluate or block these traversal attempts, resulting in arbitrary command execution under the root user context.
This class of flaw is particularly dangerous on network infrastructure platforms like SD-WAN controllers and edge devices, where root access provides visibility into routing configurations, encryption keys, VPN tunnel parameters, and connected branch network topology.
Real-World Impact
Cisco SD-WAN is widely deployed across enterprise branch networking, connecting distributed offices, data centers, and cloud environments through centralized policy and orchestration. Devices running vulnerable SD-WAN software represent high-value targets: a single compromised node can expose routing tables, traffic policies, and credentials used to authenticate other nodes in the fabric.
An attacker who achieves root access on an SD-WAN component can:
- Extract private keys, certificates, and authentication tokens stored on the device
- Modify routing and policy configurations to redirect or intercept traffic
- Pivot laterally into connected network segments
- Establish persistent backdoors that survive software restarts
- Disrupt WAN connectivity for dependent branch sites
While local access is a prerequisite, this requirement is not a reliable mitigating factor in practice. Insider threats, compromised service accounts, and attackers who have already established a foothold via a separate vulnerability can all satisfy the authentication requirement. CISA's inclusion of this CVE in the Known Exploited Vulnerabilities catalog and its mandated remediation deadline for federal agencies signals that the vulnerability carries demonstrated exploitation risk.
Organizations running Cisco SD-WAN in environments where multiple personnel or automated systems have CLI access face elevated exposure. Shared administrative credentials, poorly scoped service accounts, or inadequately monitored privileged sessions each increase the likelihood that an attacker can meet the local authentication requirement.
Affected Versions
Organizations should consult Cisco's official security advisory for the complete list of affected SD-WAN software versions and platform models. Cisco publishes version-specific guidance through its Security Advisories portal, and administrators should cross-reference their deployed versions against Cisco's confirmed vulnerable releases before applying fixes.
Patching and Mitigation Guidance
Primary remediation: Apply the patches released by Cisco that address CVE-2022-20775. Federal agencies are bound by CISA's remediation deadline of February 27, 2026, but all organizations should treat patching as time-sensitive given the KEV designation.
If immediate patching is not possible, apply the following interim controls:
-
Restrict CLI access: Limit SD-WAN CLI access strictly to a named set of trusted administrators. Remove or disable accounts that do not require direct CLI interaction.
-
Enforce network-level access controls: Place CLI management interfaces behind out-of-band management networks or jump hosts with multi-factor authentication. Block direct CLI access from general corporate or user-facing networks.
-
Audit existing accounts: Review all local accounts on SD-WAN nodes. Revoke accounts that are unnecessary, dormant, or tied to former personnel.
-
Enable and monitor audit logging: Capture all CLI command execution in audit logs. Forward logs to a SIEM and create detection rules for unusual command patterns, unexpected privilege escalation attempts, or access from atypical source addresses or times.
-
Review for indicators of prior compromise: Given KEV status, treat currently unpatched systems as potentially already compromised. Review historical CLI logs for anomalous activity before and after patching.
Administrators managing Cisco SD-WAN deployments should reference Cisco Security Advisory cisco-sa-sdwan-privesc-QVszVUez for full technical details, affected version matrices, and fixed release information.
Original Source
CISA KEV
Related Articles
CVE Pending: Critical Vulnerability in Anthropic's Claude Code Discovered Days After Source Code Leak
Adversa AI discovered a critical vulnerability in Anthropic's Claude Code agentic coding assistant within days of Anthropic accidentally leaking the product's source code. Claude Code operates with elevated system privileges in developer environments, making exploitation potentially severe — including credential theft, CI/CD pipeline manipulation, and lateral movement. Organizations should audit deployments, rotate credentials, and apply patches immediately once Anthropic releases a fix.
CVE-2024-6387: OpenSSH regreSSHion RCE Flaw Exposes Millions of Linux Servers to Unauthenticated Root Access
CVE-2024-6387 (regreSSHion) is a signal handler race condition in OpenSSH sshd versions 8.5p1 through 9.7p1 that allows unauthenticated remote code execution as root. Discovered by Qualys, the flaw affects an estimated 700,000 publicly exposed servers. Administrators should upgrade to OpenSSH 9.8p1 immediately or set LoginGraceTime 0 as a temporary workaround.
Apple Expands DarkSword Exploit Kit Mitigations Across Device Fleet After State-Sponsored and Spyware Vendor Abuse
Apple has expanded mitigations against the DarkSword exploit kit to additional devices after the toolkit was used in operations by state-sponsored threat groups and commercial spyware vendors. The expansion follows Apple's standard model of phased protection rollouts across its device ecosystem. All Apple device owners should apply the latest OS updates immediately, and high-risk individuals should enable Lockdown Mode.
CVE-2026-20093: Critical Cisco IMC Authentication Bypass Carries CVSS 9.8
Cisco has patched CVE-2026-20093, a critical authentication bypass vulnerability in the Cisco Integrated Management Controller (IMC) with a CVSS score of 9.8. An unauthenticated remote attacker can exploit the flaw to bypass authentication and gain elevated privileges over affected hardware management interfaces. Administrators should apply Cisco's patch immediately and restrict IMC network access to isolated management VLANs.