CVE-2026-20223

Cisco · Secure Workload

Cisco Secure Workload contains an access validation flaw in internal REST APIs that permits unauthenticated, remote attackers to perform unauthorized configuration changes as a Site Admin.

Executive summary

An unauthenticated remote code execution vulnerability in Cisco Secure Workload allows attackers to bypass authentication and gain full administrative control over site resources.

Vulnerability

This is an authentication bypass vulnerability affecting internal REST API endpoints. Unauthenticated attackers can send specifically crafted requests to these endpoints, successfully masquerading as a Site Admin user.

Business impact

A successful exploitation grants an attacker full administrative privileges, leading to unauthorized data exfiltration, modification of network security policies, and complete compromise of the Secure Workload environment. Given the critical CVSS score of 10.0, this vulnerability presents an immediate, catastrophic risk to organizational security and operational integrity.

Remediation

Immediate Action: Apply the latest security patches provided by Cisco immediately.

Proactive Monitoring: Audit REST API access logs for anomalous, high-privilege requests originating from unauthorized or external IP addresses.

Compensating Controls: Implement strict network segmentation and restrict access to the Secure Workload management interfaces to trusted administrative subnets only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The severity of this flaw necessitates immediate remediation. Administrators must prioritize applying vendor-supplied updates to all affected Secure Workload instances to close the authentication bypass vector and prevent unauthorized administrative access.