
A maximum-severity security vulnerability affects Cisco Secure Workload Cluster Software on both SaaS and on-prem deployments. The flaw is tracked as CVE-2026-20223 with a CVSS score of 10.0. It stems from insufficient validation and authentication when accessing REST API endpoints. An attacker can exploit the issue by sending a crafted API request to an affected endpoint. A successful exploit may allow reading sensitive information and making configuration changes across tenant boundaries using the privileges of the Site Admin user. Cisco states there are no workarounds and that the vulnerability has been fixed in specific Secure Workload releases.
"Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data. Tracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints."
""An attacker could exploit this vulnerability if they are able to send a crafted API request to an affected endpoint," Cisco said. "A successful exploit could allow the attacker to read sensitive information and make configuration changes across tenant boundaries with the privileges of the Site Admin user.""
"The shortcoming impacts Cisco Secure Workload Cluster Software on SaaS and on-prem deployments, regardless of device configuration. Cisco said there are no workarounds that address the vulnerability. The issue has been addressed in the following versions - Cisco Secure Workload Release 3.9 and earlier (Migrate to a fixed release) Cisco Secure Workload Release 3.10 (Fixed in 3.10.8.3) Cisco Secure Workload Release 4.0 (Fixed in 4.0.3.17)"
"The networking equipment major said it found the vulnerability during internal security testing and that there is no evidence of it being exploited in the wild. The disclosure comes a week after Cisco revealed that another maximum-severity authentication bypass flaw in Catalyst SD-WAN Controller ( CVE-2026-20182, CVSS score: 10.0) has been exploited by a threat actor known as UAT-8616 to gain unauthorized access to SD-WAN systems."
#cisco-secure-workload #cve-2026-20223 #rest-api-security #authentication-bypass #tenant-boundary-access
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]