Source: Critical vulnerability in Cisco Secure Workload rated at maximum severity | CSO Online
Author: unknown
URL: https://www.csoonline.com/article/4175913/critical-vulnerability-in-cisco-secure-workload-rated-at-maximum-severity.html
ONE SENTENCE SUMMARY:
Cisco Secure Workload on-prem has a CVSS 10 auth-bypass REST API flaw granting site-admin control, requiring immediate patching.
MAIN POINTS:
- Vulnerability enables attackers to gain site admin privileges and compromise endpoints.
- Cisco Secure Workload controls zero trust, micro-segmentation, and network visibility across enterprises.
- Threat actors likely will scan aggressively for exposed, unpatched internal API endpoints.
- Site-admin access could modify or dismantle security policies, opening previously restricted pathways.
- Multi-tenant deployments face cross-tenant impact, expanding potential exposure across business units or customers.
- CVE-2026-20223 has CVSS 10.0, allowing unauthenticated remote authentication bypass.
- Crafted HTTP requests to internal REST APIs instantly confer site admin privileges.
- Root cause is insufficient validation and authentication on REST API endpoint access.
- No workarounds exist; only software updates remediate the issue.
- SaaS is already patched, while on-prem customers must upgrade to fixed releases.
TAKEAWAYS:
- Prioritize emergency patching for on-prem Secure Workload as if responding to an active incident.
- Upgrade targets: 4.0→4.0.3.17, 3.10→3.10.8.3, 3.9 and earlier→migrate forward.
- Focus assessment on internal REST API exposure rather than the web management interface.
- Treat multi-tenant environments as higher-risk due to potential cross-tenant “blast radius.”
- Verify patch status promptly despite no known exploitation reported at disclosure time.