6 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-20223 is a critical authentication bypass vulnerability affecting Cisco Secure Workload.
The vulnerability is caused by missing authentication validation in internal REST API access handling. An unauthenticated remote attacker may exploit the flaw by sending crafted requests to affected Cisco Secure Workload instances.
Successful exploitation could allow attackers to gain Site Admin privileges without valid credentials and obtain unauthorized access to site resources, management functionality, and administrative operations.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Cisco Secure Workload Authentication Bypass Vulnerability
Identifier: CVE-2026-20223
PoC or Exploitation: There were no confirmed reports of active exploitation in the wild and no public proof-of-concept exploit code at this time.
CVSS Score: 10.0 (Critical, CVSS v3.1)
Update / Patch:
- Cisco Secure Workload 3.9 and earlier
- Cisco Secure Workload 3.10 prior to 3.10.8.3
- Cisco Secure Workload 4.0 prior to 4.0.3.17
- Cisco Secure Workload 3.9 and earlier (Migrate to a supported fixed release)
- Cisco Secure Workload 3.10 (Fixed in version 3.10.8.3)
- Cisco Secure Workload 4.0 (Fixed in version 4.0.3.17)
Description:
Mitigation Recommendation: