CVE-2026-20115
Received Received - Intake
Information Disclosure in Cisco Meraki IOS XE via Insecure Tunnel

Publication date: 2026-03-25

Last updated on: 2026-03-25

Assigner: Cisco Systems, Inc.

Description
A vulnerability in Cisco IOS XE Software for Cisco Meraki could allow a remote, unauthenticated attacker to view confidential device information. This vulnerability is due to a device configuration upload being performed over an insecure tunnel. An attacker could exploit this vulnerability by conducting an on-path attack between the affected device and the Cisco Meraki Dashboard. A successful exploit could allow the attacker to view sensitive device configuration information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-03-25
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco ios_xe *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-319 The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to gain access to sensitive device configuration information without authentication.

This exposure of confidential information could lead to further attacks or unauthorized access to network devices.


Can you explain this vulnerability to me?

This vulnerability exists in Cisco IOS XE Software for Cisco Meraki devices. It allows a remote, unauthenticated attacker to view confidential device information by exploiting the fact that device configuration uploads are performed over an insecure tunnel.

An attacker can carry out an on-path attack between the affected device and the Cisco Meraki Dashboard, intercepting sensitive device configuration information.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows a remote, unauthenticated attacker to view sensitive device configuration information by exploiting an insecure tunnel used for device configuration uploads. Such unauthorized disclosure of confidential information can lead to non-compliance with data protection regulations like GDPR and HIPAA, which mandate the protection of sensitive data against unauthorized access and disclosure.

Because the vulnerability involves cleartext transmission of sensitive information (CWE-319), it increases the risk of data breaches that could violate confidentiality requirements under these standards.

Organizations using affected Cisco IOS XE devices with Meraki dashboard management should consider this vulnerability a risk to compliance and should remediate it by upgrading to fixed software releases as recommended by Cisco.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The presence of a Meraki tunnel, which is related to this vulnerability, can be verified using the CLI command to check if the tunnel is connected, up, and registered.

  • Use the command `show meraki connect brief` on affected Cisco IOS XE devices to determine if the Meraki tunnel is active.

What immediate steps should I take to mitigate this vulnerability?

There are no workarounds available for this vulnerability. Cisco strongly recommends upgrading affected devices to fixed software releases to fully remediate the issue.

Customers can use the Cisco Software Checker tool to identify vulnerable software versions and the earliest fixed releases.

If you do not have a direct Cisco service contract or cannot obtain fixed software through your point of sale, contact Cisco TAC with product serial numbers and advisory URLs for assistance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart