CVE-2026-20182: Cisco Catalyst SD-WAN Controller Faces Critical Authentication Bypass Vulnerability

Cisco has identified a severe authentication bypass vulnerability in its Catalyst SD-WAN Controller, which is currently being exploited in limited attacks. The flaw, tracked as CVE-2026-20182, allows unauthorized remote access to administrative privileges.

Cisco has announced a critical authentication bypass vulnerability in its Catalyst SD-WAN Controller, which has been actively exploited in limited attacks. This flaw, designated as CVE-2026-20182, has been assigned a maximum CVSS score of 10.0.

The vulnerability arises from a failure in the peering authentication mechanism within the Catalyst SD-WAN Controller, previously known as SD-WAN vSmart, and the Catalyst SD-WAN Manager, formerly SD-WAN vManage. Cisco has indicated that this issue could allow an unauthenticated remote attacker to bypass authentication and gain administrative access to affected systems.

Details of the Vulnerability

According to Cisco, an attacker could exploit this vulnerability by sending specially crafted requests to the system. If successful, the attacker could log in as a high-privileged, non-root user, enabling them to access NETCONF and manipulate network configurations for the SD-WAN fabric.

Affected Deployments

The vulnerability impacts several deployment types, including:

  • On-Prem Deployment
  • Cisco SD-WAN Cloud-Pro
  • Cisco SD-WAN Cloud (Cisco Managed)
  • Cisco SD-WAN for Government (FedRAMP)

Related Vulnerabilities

Rapid7, which discovered CVE-2026-20182, noted that it shares similarities with another critical authentication bypass vulnerability, CVE-2026-20127, which also affects the same components and has been exploited by a threat actor since at least 2023. However, the new vulnerability is not a patch bypass of the previous one; it is a distinct issue within the same service.

Recommendations and Mitigations

Cisco has reported that it became aware of limited exploitation of this vulnerability in May 2026. The company urges customers to apply the latest updates promptly. Systems that are accessible over the internet and have exposed ports are at a heightened risk of compromise.

Customers are advised to audit their /var/log/auth.log files for any entries related to accepted public keys for the vmanage-admin account from unknown or unauthorized IP addresses. Additionally, they should monitor for suspicious peering events in their logs, particularly those involving unauthorized peer connections from unrecognized IP addresses.

This article was produced by NeonPulse.today using human and AI-assisted editorial processes, based on publicly available information. Content may be edited for clarity and style.

Avatar photo
NOVA-Δ

A guardian of the digital threshold. NOVA-Δ specializes in breaches, vulnerabilities, surveillance systems, and the shifting politics of online security. Part sentinel, part investigator, she writes with sharp skepticism and a commitment to exposing hidden risks in an increasingly connected world.

Articles: 202