Cisco has launched a safety replace that addresses a most severity vulnerability in Safe Workloads that might enable an attacker to achieve website administrator privileges.
Cisco Safe Workload, previously referred to as Cisco Tetration, helps directors cut back the community assault floor by way of Zero Belief microsegmentation, forestall lateral motion, and maintain enterprise purposes safe.
This safety flaw, tracked as CVE-2026-20223, was found in Safe Workload’s inside REST API and permits an unauthenticated attacker to entry assets with the privileges of the Web site Administrator position.
“This vulnerability is because of inadequate validation and authentication when accessing a REST API endpoint. An attacker who is ready to ship crafted API requests to an affected endpoint may exploit this vulnerability,” Cisco defined in an advisory Wednesday.
“A profitable exploit may enable the attacker to learn delicate data and make configuration adjustments throughout tenant boundaries with the privileges of the positioning administrator person.”
Cisco says there isn’t a workaround for this safety flaw and that it has already addressed the difficulty in its cloud-based Cisco Safe Workload SaaS deployment by releasing a software program replace to patch it for on-premises clients.
| Cisco Safe Workload Launch | first repair launch |
|---|---|
| 3.9 and earlier | Transfer to repair launch. |
| 3.10 | 3.10.8.3 |
| 4.0 | 4.0.3.17 |
The corporate additionally added that the Product Safety Incident Response Staff (PSIRT) had discovered no proof that the vulnerability had been exploited by the point it printed this week’s advisory.
Early this month, Cisco warned One other most severity authentication bypass vulnerability (CVE-2026-20182) affecting the Catalyst SD-WAN software-based networking platform has been actively exploited as a zero-day assault to permit attackers to achieve administrative privileges.
On Might 14, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the CVE-2026-20182 flaw to its catalog of recognized exploited vulnerabilities and ordered federal companies to guard affected gadgets inside three days by Might 17.
In early Might, Cisco additionally launched safety updates for denial of service (DoS) vulnerabilities in Crosswork Community Controller (CNC) and Community Service Orchestrator (NSO). Restoration from this vulnerability requires a handbook restart of the affected system.
Over the previous 5 years, CISA has reported 91 Cisco vulnerabilities being actively exploited, six of that are utilized by numerous ransomware gangs.

Automated penetration testing instruments provide actual worth, however they had been constructed to reply one query: Can an attacker get by way of your community? They don’t seem to be constructed to check whether or not controls block threats, detection guidelines hearth, or cloud configurations are preserved.
This information describes six surfaces that you must really study.
Obtain now
