A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user. This vulnerability is due to insufficient validation of user-supplied input. An authenticated attacker could exploit this vulnerability by uploading a crafted certificate to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit this vulnerability, the attacker must have valid administrative credentials.
History

Wed, 20 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via Crafted SSL Certificate in Cisco ThousandEyes Virtual Appliance

Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the SSL certificate handling of Cisco ThousandEyes Virtual Appliance could allow an authenticated, remote attacker to execute commands on the underlying operating system as the root user. This vulnerability is due to insufficient validation of user-supplied input. An authenticated attacker could exploit this vulnerability by uploading a crafted certificate to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system. To exploit this vulnerability, the attacker must have valid administrative credentials.
Weaknesses CWE-74
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2026-05-20T16:15:18.647Z

Updated: 2026-05-20T16:15:18.647Z

Reserved: 2025-10-08T11:59:15.397Z

Link: CVE-2026-20199

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T17:16:20.100

Modified: 2026-05-20T17:30:40.450

Link: CVE-2026-20199

cve-icon Redhat

No data.