An attacker who exploits this vulnerability gains Site Administrator access to Cisco Secure Workload with no authentication, enabling them to read and modify workload security policies, access multi-tenant data, and potentially disable segmentation controls protecting regulated or business-critical systems. For organizations using Secure Workload to enforce microsegmentation, a successful attack could expose sensitive application traffic, violate data isolation requirements, and create pathways for lateral movement across environments. Regulatory exposure is significant for any organization using Secure Workload to segment workloads subject to PCI-DSS, HIPAA, or SOC 2 requirements, as the breach of administrative controls may require disclosure and remediation documentation.
You Are Affected If
You run Cisco Secure Workload on-premises on version 3.9 or any earlier release (no patch is available for these versions)
You run Cisco Secure Workload on-premises on version 3.10 prior to 3.10.8.3 and have not yet applied the fixed release
You run Cisco Secure Workload on-premises on version 4.0 prior to 4.0.3.17 and have not yet applied the fixed release
The Cisco Secure Workload management plane or internal REST API ports are reachable from untrusted network segments or the internet without firewall or IPS controls
You operate a multi-tenant Cisco Secure Workload deployment where tenant isolation is a compliance or contractual requirement
Board Talking Points
A critical flaw in Cisco Secure Workload allows any attacker to gain full administrative control of the platform with no password required, threatening the security policy layer protecting our most sensitive systems.
On-premises teams should upgrade to the patched version this week; any deployment on the oldest software version requires immediate escalation to Cisco because no patch exists.
Without action, an attacker could silently disable or modify the segmentation controls that separate regulated data environments, potentially triggering breach notification obligations.
PCI-DSS — Cisco Secure Workload is commonly deployed to enforce network segmentation of cardholder data environments; administrative compromise could invalidate segmentation controls required under PCI-DSS Requirement 1
HIPAA — Organizations using Secure Workload to segment ePHI workloads may face a breach of the Security Rule's access control and audit control requirements (45 CFR §164.312) if Site Admin access was obtained without authorization
SOC 2 — Unauthorized Site Admin access to a workload security platform directly implicates SOC 2 CC6 (Logical and Physical Access Controls) and may require disclosure to auditors