Critical REST API validation flaw in Cisco Secure Workload (CVE-2026-20223) patched
Summary
Hide ▲
Show ▼
Cisco patched CVE-2026-20223, a critical vulnerability in Secure Workload with a CVSS score of 10.0, enabling attackers to access site resources with Site Admin privileges by sending crafted API requests to internal REST endpoints. The flaw stems from insufficient input validation and authentication in the REST API. Successful exploitation permits reading sensitive data and modifying configurations across tenant boundaries. The issue affects both SaaS and on-prem deployments of Secure Workload Cluster Software and is limited to internal REST APIs, not the web-based management interface. No exploitation in the wild has been reported.
Timeline
-
21.05.2026 15:04 1 articles · 1h ago
Critical REST API flaw (CVE-2026-20223) in Cisco Secure Workload patched
Cisco released patches for CVE-2026-20223, a critical vulnerability in Secure Workload’s internal REST API that enables privilege escalation to Site Admin via crafted requests. The flaw, affecting both SaaS and on-prem deployments, was addressed in versions 3.10.8.3 and 4.0.3.17. Cisco notes no active exploitation but urges users to apply updates promptly to mitigate potential risks.
Show sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
Information Snippets
-
CVE-2026-20223 is a critical vulnerability in Cisco Secure Workload with a CVSS score of 10.0, allowing attackers with access to internal REST API endpoints to escalate privileges to Site Admin.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
-
The flaw exists due to insufficient validation and authentication in Secure Workload’s REST API endpoints, enabling crafted API requests to be exploited.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
-
Exploitation allows attackers to read sensitive information and modify configurations across tenant boundaries, impacting both SaaS and on-prem deployments regardless of device configuration.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
-
The vulnerability affects only internal REST APIs and does not impact the web-based management interface of Secure Workload.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
-
Cisco Secure Workload versions 3.10.8.3 and 4.0.3.17 include patches addressing CVE-2026-20223.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
-
Cisco has not observed active exploitation of CVE-2026-20223 in the wild but recommends immediate updates to mitigate potential future exposure.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04
-
Cisco also released patches for three medium-severity vulnerabilities affecting ThousandEyes Virtual Appliance, ThousandEyes Enterprise Agent, and Nexus 3000/9000 series switches, including remote command execution and BGP-induced DoS risks.
First reported: 21.05.2026 15:041 source, 1 articleShow sources
- Cisco Patches Critical Vulnerability in Secure Workload — www.securityweek.com — 21.05.2026 15:04