Cisco SD-WAN Auth Bypass Hits CVSS 10.0, CISA Sets May 17 Deadline
CVE-2026-20182 allows unauthenticated attackers to gain admin access to Cisco Catalyst SD-WAN controllers. CISA added it to the KEV catalog after confirmed exploitation.
A maximum-severity authentication bypass in Cisco Catalyst SD-WAN Controller is now under active exploitation, prompting CISA to add it to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of May 17, 2026.
CVE-2026-20182 carries a CVSS score of 10.0—the highest possible rating. The flaw allows unauthenticated remote attackers to bypass authentication entirely and gain administrative privileges on affected devices. Cisco's Product Security Incident Response Team confirmed limited exploitation in the wild, attributed to the threat actor cluster tracked as UAT-8616.
How the Attack Works
The vulnerability targets the vdaemon service, which listens on UDP port 12346 over DTLS. The flaw stems from a malfunction in the peering authentication mechanism that allows attackers to initiate a DTLS connection using a self-signed certificate, then send a crafted message claiming to originate from a high-trust peer type.
Once authenticated as a trusted peer, attackers log into the SD-WAN Controller as an internal high-privileged user account. From there, they can access NETCONF and manipulate network configurations across the entire SD-WAN fabric—potentially rerouting traffic, intercepting communications, or establishing persistent access.
Affected Products
The vulnerability impacts multiple Cisco SD-WAN deployment types:
- Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart)
- Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage)
- On-premises deployments
- Cisco SD-WAN Cloud-Pro
- Cisco SD-WAN Cloud (Cisco Managed)
- Cisco SD-WAN for Government (FedRAMP)
Organizations running internet-accessible SD-WAN management interfaces face the highest risk. The attack requires no authentication, no special headers, and no specific URL patterns—just network reachability to the vulnerable service.
UAT-8616 Threat Actor
According to Rapid7 researchers, UAT-8616 has exploited similar vulnerabilities in Cisco SD-WAN infrastructure since at least 2023. This vulnerability parallels CVE-2026-20127, another CVSS 10.0 flaw that exploited the same vdaemon service—suggesting systematic research into this attack surface.
Cisco Talos published additional analysis of ongoing SD-WAN exploitation patterns that organizations should review for detection guidance and indicators of compromise.
Remediation Steps
- Patch immediately - Apply the security update from Cisco's advisory
- Restrict network access - Block UDP port 12346 from untrusted networks
- Review logs - Check for anomalous DTLS connections or unexpected admin sessions
- Verify configurations - Audit SD-WAN fabric settings for unauthorized changes
- Assume compromise - If your controller was internet-exposed, conduct full incident response
Federal agencies must remediate by May 17, 2026 per CISA's KEV requirements. Private sector organizations should treat this deadline as their own—the exploit window is already open.
Why This Matters
SD-WAN controllers sit at the center of enterprise network architecture, managing traffic routing across branch offices, data centers, and cloud environments. Compromising these devices gives attackers visibility into and control over network communications at scale. The active exploitation combined with trivial attack requirements makes this one of the most urgent patches of the month.
This adds to a difficult May for network defenders—Microsoft's Patch Tuesday already delivered 120 vulnerabilities including 17 critical RCEs, and Fortinet disclosed critical flaws in FortiSandbox and FortiAuthenticator just days ago.
Related Articles
Cisco Patches Dual 9.8 CVSS Flaws in IMC and SSM On-Prem
CVE-2026-20093 and CVE-2026-20160 let unauthenticated attackers take full control of Cisco UCS servers and licensing infrastructure. No workarounds exist.
Apr 6, 2026Ivanti EPM Auth Bypass Now Under Active Exploitation, CISA Warns
CVE-2026-1603 allows unauthenticated attackers to steal credential vaults from Ivanti Endpoint Manager. CISA added it to KEV catalog after exploitation detected.
Mar 11, 2026Cisco SD-WAN Flaws CVE-2026-20122 and 20128 Under Active Attack
Cisco confirms active exploitation of two more SD-WAN Manager vulnerabilities. Attackers deploying web shells through arbitrary file overwrite and credential exposure flaws.
Mar 7, 2026Cisco SD-WAN Manager Flaws Actively Exploited for Web Shells
Cisco confirmed CVE-2026-20122 and CVE-2026-20128 in Catalyst SD-WAN Manager are under active exploitation, with attackers deploying web shells globally.
Mar 7, 2026