{"id":"CVE-2026-20128","details":"A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid&nbsp;vmanage credentials on the affected system.\r\n\r\nThis vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges.\r\nNote: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.","modified":"2026-03-13T04:03:02.429680Z","published":"2026-02-25T17:25:30.150Z","references":[{"type":"ADVISORY","url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-20128.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"20.9.8.2"}]},{"events":[{"introduced":"20.11"},{"fixed":"20.12.5.3"}]},{"events":[{"introduced":"20.13"},{"fixed":"20.15.4.2"}]},{"events":[{"introduced":"20.16"},{"fixed":"20.18"}]},{"events":[{"introduced":"0"},{"last_affected":"20.12.6"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}