ctipilot.ch

Cisco Secure Workload CVSS 10.0 zero-auth REST API Site Admin access

cve · CVE-2026-20223

Coverage timeline
1
first 2026-05-22 → last 2026-05-22
Briefs
1
1 distinct
Sources cited
36
24 hosts
Sections touched
1
trending_vulns
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-22CTI Daily Brief — 2026-05-22
    trending_vulnsCisco PSIRT 2026-05-20; CVSS 10.0; no workaround; on-prem upgrade required

Where this entity is cited

  • trending_vulns1

Source distribution

  • attack.mitre.org6 (17%)
  • blog.talosintelligence.com5 (14%)
  • sec.cloudapps.cisco.com3 (8%)
  • thehackernews.com2 (6%)
  • security-hub.ncsc.admin.ch1 (3%)
  • theregister.com1 (3%)
  • bankinfosecurity.com1 (3%)
  • bleepingcomputer.com1 (3%)
  • other16 (44%)

Related entities

External references

NVD · cve.org · CISA KEV

All cited sources (36)

Items in briefs about Cisco Secure Workload CVSS 10.0 zero-auth REST API Site Admin access (1)

CVE-2026-20223 — Cisco Secure Workload: CVSS 10.0 zero-auth REST API grants Site Admin privileges across all tenants, no workaround

From CTI Daily Brief — 2026-05-22 · published 2026-05-22 · view item permalink →

CVE-2026-20223 (CVSS 10.0, AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) is an access validation failure in the internal REST API of Cisco Secure Workload (formerly Tetration), the enterprise micro-segmentation platform (Cisco PSIRT, 2026-05-20). An unauthenticated remote attacker sends a single crafted HTTP request to an internal API endpoint to be granted Site Admin-level privileges — enabling cross-tenant data read, configuration modification, and full visibility over workload segmentation policy across all tenant boundaries. Both SaaS-hosted and on-premises deployments are affected; Cisco silently patched SaaS. On-premises operators must upgrade: 4.0.x → 4.0.3.17; 3.10.x → 3.10.8.3; 3.9 and earlier must migrate (no fix available). No workaround exists. Cisco found no evidence of exploitation at disclosure (2026-05-20); the vulnerability was discovered internally. NCSC-CH flagged this on 2026-05-21. The attack surface is the internal REST API management plane — restrict untrusted network access to the Secure Workload cluster API as the primary compensating control until patching is complete. Technique: T1190 Exploit Public-Facing Application. This is distinct from CVE-2026-20182 (Cisco Catalyst SD-WAN) covered on 2026-05-20.

CVE Summary Table

CVE Product CVSS EPSS KEV Exploited Patch Source
CVE-2026-34926 Trend Micro Apex One On-Premise 6.7 n/a Yes (2026-05-21) Yes (ITW) Build 17079 Trend Micro
CVE-2025-34291 Langflow AI Platform 9.4 (v4) / 8.8 (v3) n/a Yes (2026-05-21) Yes (ITW since Jan 2026) >= 1.7.0 / 1.9.3 CISA KEV
CVE-2026-20223 Cisco Secure Workload 10.0 n/a No No (disclosed internally) 3.10.8.3 / 4.0.3.17 Cisco PSIRT