Vulnslist

find the latest Cisco vulnerabilities

Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability

cisco-sa-catalyst-tls-PqnD5KEJ · Medium · Published · Updated

A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information. This vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catalyst-tls-PqnD5KEJ

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2025-20157
Cisco Bug IDsCSCwm84885
CVSS ScoreBase 5.9
Base 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Catalyst SD-WAN Manager

Related Products

Product CVE Evidence
Cisco SD-WAN vManage CVE-2025-20157 Cisco OpenVuln
Cisco Catalyst SD-WAN Manager CVE-2025-20157 Cisco OpenVuln
Cisco Catalyst SD-WAN CVE-2025-20157 Cisco OpenVuln