Critical (10.0) Actively Exploited

Catalyst SD-WAN bypass grants admin access (CVE-2026-20182)

CVE-2026-20182

CVE-2026-20182: CRITICAL (CVSS 10.0) auth bypass in Cisco Catalyst SD-WAN Controller and Manager exploited in the wild. Grants unauthenticated attackers administrative NETCONF access. Patch now - see advisory.

Actively exploited in the wild - CVE-2026-20182 is a critical authentication bypass in Cisco Catalyst SD-WAN Controller and Manager that lets unauthenticated attackers gain administrative privileges and access NETCONF. Patched as of May 2026 - apply the fix immediately.

Overview

CVE-2026-20182 is a maximum-severity vulnerability (CVSS 10.0) in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage). The flaw exists because the control connection handshaking does not properly validate authentication. An unauthenticated, remote attacker can send crafted requests to bypass authentication entirely and log in as an internal, high-privileged, non-root user account.

From this elevated position, the attacker gains access to NETCONF, the network configuration protocol that manages the entire SD-WAN fabric. This means the attacker can read, modify, or destroy network routing policies, tunnel configurations, and security rules across all connected SD-WAN edge devices. Because the impacted systems are the controllers and managers of the SD-WAN deployment, a compromise effectively hands the attacker full administrative control over the organization’s wide-area network.

CVE-2026-20182 was added to the CISA Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild. The details were initially disclosed in February 2026, with a fix released in May 2026. Organizations that have not yet patched should consider themselves at immediate risk.

Affected Products and Versions

This vulnerability affects all versions of Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager released prior to the May 2026 maintenance release. Customers should consult Cisco’s official advisory for the exact version ranges.

Remediation and Mitigation

Apply the vendor patch immediately - Cisco has released a software update for both products in the May 2026 maintenance window. There are no workarounds that fully mitigate the authentication bypass.

While preparing to patch, administrators should:

  1. Restrict network access to the SD-WAN Controller and Manager to only trusted IP ranges.
  2. Review current connections using the Show Control Connections command on the controller to identify any unauthorized peering sessions or anomalous source IPs.
  3. Audit user accounts for signs of unauthorized privilege escalation, especially any accounts with NETCONF access that were created after February 2026.

This vulnerability is part of an active threat landscape. See related coverage:

Security Insight

CVE-2026-20182 is a stark reminder that SD-WAN controllers - the single pane of glass for modern WAN architecture - are high-value targets that bridge network and security teams. A CVSS 10.0 authentication bypass in the control plane handshake suggests a fundamental failure in the authentication protocol design, not a simple coding error. This pattern echoes the 2024 PAN-OS GlobalProtect zero-day (CVE-2024-3400), where a similar trust boundary in a network security appliance was bypassed. When the authentication layer of a network controller fails this completely, it calls into question the segregation between the management plane and the data plane, and whether other parts of the SD-WAN suite rely on the same flawed trust model. Organizations should treat this as a sign to thoroughly review any peering or handshake mechanisms in their network infrastructure.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Related Across Yazoul

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.