Cisco Secure Workload CVSS 10 Flaw Grants Site Admin Access
Cisco patches CVE-2026-20223, a maximum-severity REST API vulnerability in Secure Workload enabling unauthenticated attackers to gain Site Admin privileges across tenants.
Cisco has patched a maximum-severity vulnerability in Secure Workload that allows unauthenticated attackers to gain Site Admin privileges through crafted API requests. The flaw, tracked as CVE-2026-20223, carries a CVSS score of 10.0—the highest possible rating—and affects both SaaS and on-premises deployments.
The vulnerability stems from insufficient validation and authentication in Secure Workload's internal REST API endpoints. Exploitation requires no credentials, no user interaction, and can cross tenant boundaries in multi-tenant environments.
What Makes This Critical
Cisco Secure Workload (formerly Tetration) provides microsegmentation and workload protection across hybrid cloud environments. Organizations use it to enforce zero-trust policies, monitor application behavior, and detect anomalies across their infrastructure. Site Admin is the highest privilege level, with full control over all tenants and configurations.
According to Cisco's security advisory, an attacker who successfully exploits CVE-2026-20223 could:
- Read sensitive configuration and policy data across all tenants
- Modify security policies and microsegmentation rules
- Access monitoring data and telemetry from protected workloads
- Make administrative changes that persist across the environment
The cross-tenant impact is particularly concerning. In shared environments where multiple business units or customers operate separate tenants, a single exploitation could compromise the entire deployment.
Technical Details
The vulnerability exists in Secure Workload's internal REST APIs—distinct from the web management interface, which is not affected. BleepingComputer reports that exploitation involves sending specially crafted HTTP requests to vulnerable API endpoints.
The attack requires network access to the management interface but no authentication. Given that Secure Workload management interfaces are typically accessible only from internal networks or VPNs, the most likely attack scenarios involve:
- Insider threat — Malicious or compromised employees with network access
- Lateral movement — Attackers who have already gained initial access to the network
- VPN compromise — Exploitation following credential theft or VPN vulnerability abuse
This pattern mirrors other recent Cisco vulnerabilities we've covered. The Cisco SD-WAN authentication bypass (CVE-2026-20182) that CISA added to the KEV catalog last week similarly allowed unauthenticated privilege escalation on network management infrastructure.
Affected Versions and Patches
The flaw impacts Cisco Secure Workload versions prior to 3.10.8.3 and 4.0.3.17. Organizations should upgrade to these patched versions immediately:
| Affected Version | Fixed Version |
|---|---|
| 3.10.x and earlier | 3.10.8.3 |
| 4.0.x | 4.0.3.17 |
For Secure Workload SaaS customers, Cisco has already applied the patch to the cloud-hosted environment. No customer action is required for SaaS deployments.
On-premises customers should prioritize patching, particularly in multi-tenant configurations where the cross-boundary access risk is highest.
No Active Exploitation—Yet
Cisco stated it was not aware of active exploitation at the time of disclosure on May 21, 2026. The vulnerability was discovered internally, reducing the window for pre-disclosure attacks.
That said, CVSS 10 vulnerabilities attract immediate attention from threat actors. The Verizon 2026 DBIR found that exploitation of vulnerabilities as an initial access vector has increased 180% year-over-year, with attackers particularly targeting network infrastructure and security tools.
Why This Matters
Cisco's security infrastructure products have become frequent targets in 2026. Beyond the SD-WAN flaw, we've seen critical vulnerabilities in Cisco ISE, authentication bypasses in multiple product lines, and a steady stream of advisories requiring emergency patching.
The pattern suggests attackers are systematically probing enterprise security tools—products that organizations deploy specifically to improve their security posture. Compromising these systems provides attackers with visibility into defensive configurations and often grants access to privileged network segments.
For security teams already stretched thin by constant patching cycles, another CVSS 10 in core infrastructure represents both an immediate risk and a longer-term sustainability question. Organizations running Cisco Secure Workload should patch within days, not weeks, given the severity and potential for exploitation.
Related Articles
Cisco SD-WAN Auth Bypass Hits CVSS 10.0, CISA Sets May 17 Deadline
CVE-2026-20182 allows unauthenticated attackers to gain admin access to Cisco Catalyst SD-WAN controllers. CISA added it to the KEV catalog after confirmed exploitation.
May 15, 2026Cisco Patches Dual 9.8 CVSS Flaws in IMC and SSM On-Prem
CVE-2026-20093 and CVE-2026-20160 let unauthenticated attackers take full control of Cisco UCS servers and licensing infrastructure. No workarounds exist.
Apr 6, 2026Quest KACE SMA CVSS 10.0 Flaw Exploited in the Wild
Attackers exploiting CVE-2025-32975 authentication bypass in Quest KACE to hijack admin accounts and deploy credential harvesters. Patched in May 2025—many remain exposed.
Mar 24, 2026Sentry SAML Flaw Lets Attackers Hijack Any Account—No Password Needed
CVE-2026-42354 (CVSS 9.1) allows attackers to take over any Sentry user account via malicious SAML IdP. Patch to version 26.4.1 immediately.
May 9, 2026