Catalyst SD-WAN bypass grants admin access (CVE-2026-20182)
CVE-2026-20182
CVE-2026-20182: CRITICAL (CVSS 10.0) auth bypass in Cisco Catalyst SD-WAN Controller and Manager exploited in the wild. Grants unauthenticated attackers administrative NETCONF access. Patch now - see advisory.
Actively exploited in the wild - CVE-2026-20182 is a critical authentication bypass in Cisco Catalyst SD-WAN Controller and Manager that lets unauthenticated attackers gain administrative privileges and access NETCONF. Patched as of May 2026 - apply the fix immediately.
Overview
CVE-2026-20182 is a maximum-severity vulnerability (CVSS 10.0) in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage). The flaw exists because the control connection handshaking does not properly validate authentication. An unauthenticated, remote attacker can send crafted requests to bypass authentication entirely and log in as an internal, high-privileged, non-root user account.
From this elevated position, the attacker gains access to NETCONF, the network configuration protocol that manages the entire SD-WAN fabric. This means the attacker can read, modify, or destroy network routing policies, tunnel configurations, and security rules across all connected SD-WAN edge devices. Because the impacted systems are the controllers and managers of the SD-WAN deployment, a compromise effectively hands the attacker full administrative control over the organization’s wide-area network.
CVE-2026-20182 was added to the CISA Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild. The details were initially disclosed in February 2026, with a fix released in May 2026. Organizations that have not yet patched should consider themselves at immediate risk.
Affected Products and Versions
This vulnerability affects all versions of Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager released prior to the May 2026 maintenance release. Customers should consult Cisco’s official advisory for the exact version ranges.
Remediation and Mitigation
Apply the vendor patch immediately - Cisco has released a software update for both products in the May 2026 maintenance window. There are no workarounds that fully mitigate the authentication bypass.
While preparing to patch, administrators should:
- Restrict network access to the SD-WAN Controller and Manager to only trusted IP ranges.
- Review current connections using the Show Control Connections command on the controller to identify any unauthorized peering sessions or anomalous source IPs.
- Audit user accounts for signs of unauthorized privilege escalation, especially any accounts with NETCONF access that were created after February 2026.
Related Threat Intelligence
This vulnerability is part of an active threat landscape. See related coverage:
- Weekly Threat Roundup: Apache & cPanel Zero-Days (Apr 27 - May 3)
- TeamPCP Supply Chain Campaign: Update 008 - 26-Day Paus
- Weekly Threat Roundup: 10 Critical CVEs & Two Major Breaches (Apr 20-26)
Security Insight
CVE-2026-20182 is a stark reminder that SD-WAN controllers - the single pane of glass for modern WAN architecture - are high-value targets that bridge network and security teams. A CVSS 10.0 authentication bypass in the control plane handshake suggests a fundamental failure in the authentication protocol design, not a simple coding error. This pattern echoes the 2024 PAN-OS GlobalProtect zero-day (CVE-2024-3400), where a similar trust boundary in a network security appliance was bypassed. When the authentication layer of a network controller fails this completely, it calls into question the segregation between the management plane and the data plane, and whether other parts of the SD-WAN suite rely on the same flawed trust model. Organizations should treat this as a sign to thoroughly review any peering or handshake mechanisms in their network infrastructure.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
openvpn-auth-oauth2 is a plugin/management interface client for OpenVPN server to handle an OIDC based single sign-on (SSO) auth flows. From version 1.26.3 to before version 1.27.3, when openvpn-auth-...
Nhost is an open source Firebase alternative with GraphQL. Prior to version 0.49.1, Nhost automatically links an incoming OAuth identity to an existing Nhost account when the email addresses match. Th...
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on a...
Hirschmann HiOS and HiSecOS products RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, EAGLE contain an authentication bypass vulnerability in the HTTP(S) management module that allows unauthentica...