A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to retrieve files that they do not have permission to access. This vulnerability is due to insufficient file access checks. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to read files that they are not authorized to access.
History

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IoT Field Network Director could allow an authenticated, remote attacker with low privileges to retrieve files that they do not have permission to access. This vulnerability is due to insufficient file access checks. An attacker could exploit this vulnerability by submitting crafted input in the web-based management interface. A successful exploit could allow the attacker to read files that they are not authorized to access.
Title Cisco IoT Field Network Director Path Traversal Vulnerability
Weaknesses CWE-388
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2026-05-06T16:15:48.379Z

Updated: 2026-05-06T17:59:11.531Z

Reserved: 2025-10-08T11:59:15.391Z

Link: CVE-2026-20168

cve-icon Vulnrichment

Updated: 2026-05-06T17:59:08.080Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T17:16:20.590

Modified: 2026-05-06T18:59:53.230

Link: CVE-2026-20168

cve-icon Redhat

No data.