Fixed Intel

CVE Tracker

Track known exploited vulnerabilities, CISA KEV alerts, and linked threat intelligence.

2,234

Total CVEs

1,589

CISA KEV

41

Known Exploits

8.8

Avg CVSS Score

Severity Distribution

CRITICAL 8
HIGH 1599
MEDIUM 7
INFO 620

Showing 20 of 101 CVEs matching "Cisco"

CVE-2026-20114
Info

Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software

CVE-2026-20113
Info

Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software

CVE-2026-20112
Info

Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software

CVE-2026-20110
Info

Referenced in article: Cisco Patches Multiple Vulnerabilities in IOS Software

CVE-2026-20118
Info

Referenced in article: Cisco Patches High-Severity IOS XR Vulnerabilities

EPSS 0.1%
CVE-2026-20074
Info

Referenced in article: Cisco Patches High-Severity IOS XR Vulnerabilities

EPSS 0.0%
CVE-2026-20046
Info

Referenced in article: Cisco Patches High-Severity IOS XR Vulnerabilities

EPSS 0.0%
CVE-2026-20040
Info

Referenced in article: Cisco Patches High-Severity IOS XR Vulnerabilities

EPSS 0.0%
CVE-2026-20133KEV
Info

Referenced in article: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

CiscoEPSS 0.1%
CVE-2026-20129
Info

Referenced in article: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

EPSS 0.2%
CVE-2026-20126
Info

Referenced in article: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

EPSS 0.0%
CVE-2026-20122KEV
Info

Referenced in article: Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

CiscoEPSS 0.0%
CVE-2026-20131KEV
High

Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.

CiscoEPSS 0.8%
CVE-2026-20079
Critical

A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.

CVSS 10
CVE-2026-20128KEV
High

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to gain DCA user privileges on an affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.

CiscoCVSS 7.5
CVE-2022-20775KEV
High

Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

CiscoEPSS 0.5%
CVE-2026-20127KEV
High

Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

CiscoEPSS 2.6%
CVE-2026-20045KEV
High

Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance contain a code injection vulnerability that could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.

CiscoEPSS 0.9%
CVE-2025-20393KEV
High

Cisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance.

CiscoEPSS 6.3%
CVE-2025-20352KEV
High

Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.

CiscoEPSS 2.0%
Previous
Next