Cisco Patches Critical Auth Bypass Flaw in Catalyst SD-WAN Controller; Exploits Detected

Cisco has recently addressed a critical authentication bypass vulnerability in its Catalyst SD-WAN Controller, identified as CVE-2026-20182, which has been actively exploited in limited attacks. This flaw carries the highest severity rating, with a CVSS score of 10.0, indicating its potential for significant impact.

Understanding the Vulnerability

The issue resides in the peering authentication mechanism of the Cisco Catalyst SD-WAN Controller, formerly known as SD-WAN vSmart, and the Cisco Catalyst SD-WAN Manager, previously SD-WAN vManage. Due to improper functioning of this mechanism, an unauthenticated, remote attacker can send specially crafted requests to the affected system, effectively bypassing authentication protocols. Upon successful exploitation, the attacker gains administrative privileges, allowing them to log in as an internal, high-privileged, non-root user. This access enables the attacker to utilize NETCONF, a network management protocol, to manipulate the network configuration of the SD-WAN fabric.

Affected Deployments

The vulnerability impacts various deployment types, including:

– On-Prem Deployment
– Cisco SD-WAN Cloud-Pro
– Cisco SD-WAN Cloud (Cisco Managed)
– Cisco SD-WAN for Government (FedRAMP)

Discovery and Exploitation

Security firm Rapid7 discovered CVE-2026-20182, noting its similarities to a previous critical authentication bypass vulnerability, CVE-2026-20127, which also affected the same components. The earlier flaw had been exploited by a threat actor known as UAT-8616 since at least 2023. While both vulnerabilities affect the ‘vdaemon’ service over DTLS (UDP port 12346), they are distinct issues within the ‘vdaemon’ networking stack. The exploitation of CVE-2026-20182 allows a remote, unauthenticated attacker to become an authenticated peer of the target appliance and perform privileged operations.

Cisco’s Response and Recommendations

Upon becoming aware of limited exploitation of this flaw in May 2026, Cisco promptly released software updates to address the vulnerability. The company strongly urges customers to apply these updates immediately, as no workarounds are available. Systems accessible over the internet with exposed ports are at increased risk of compromise.

Indicators of Compromise

To detect potential exploitation, Cisco recommends auditing the /var/log/auth.log file for entries indicating accepted public key authentication for the ‘vmanage-admin’ user from unknown or unauthorized IP addresses. Additionally, administrators should look for suspicious peering events in the logs, such as unauthorized peer connections occurring at unexpected times, originating from unrecognized IP addresses, or involving device types inconsistent with the environment’s architecture.

Mitigation Steps

To mitigate the risk associated with CVE-2026-20182, organizations should:

1. Apply Software Updates: Immediately install the software updates provided by Cisco to address the vulnerability.

2. Audit Logs: Regularly review authentication and system logs for any signs of unauthorized access or suspicious activities.

3. Restrict Access: Limit exposure by ensuring that SD-WAN controllers are not accessible over the internet unless absolutely necessary.

4. Monitor Network Traffic: Implement continuous monitoring to detect and respond to unusual network behaviors promptly.

Conclusion

The discovery and active exploitation of CVE-2026-20182 underscore the critical importance of timely vulnerability management and proactive security measures. Organizations utilizing Cisco Catalyst SD-WAN Controllers must prioritize the application of the latest patches and adhere to Cisco’s recommendations to safeguard their network infrastructures against potential threats.