Cybersecurity

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

Published

on

Cisco has released urgent security updates for a critical authentication bypass vulnerability in its Catalyst SD-WAN Controller and Manager platforms, confirming that the flaw has already been exploited in limited real-world attacks.

The vulnerability, tracked as CVE-2026-20182, carries a maximum CVSS score of 10.0, indicating that successful exploitation can lead to full administrative control of affected systems.

Authentication Bypass Allows Full Administrative Access

The issue affects the Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage), part of Cisco SD-WAN used to manage enterprise network traffic and configuration.

According to Cisco, the flaw exists in the peering authentication mechanism and allows a remote, unauthenticated attacker to bypass security controls and gain privileged access to the system.

Once exploited, attackers may be able to operate as a high-privilege internal account and perform administrative actions across the SD-WAN environment.

How the Vulnerability Works

Cisco reports that the vulnerability can be triggered through specially crafted requests targeting the affected systems. The flaw allows attackers to impersonate trusted peers within the SD-WAN architecture.

Security researchers at Rapid7 noted that CVE-2026-20182 impacts the same underlying service (“vdaemon” over DTLS on UDP port 12346) that was previously affected by an earlier critical vulnerability, CVE-2026-20127.

Although not a patch bypass, the new flaw results in a similar outcome: unauthenticated attackers can become trusted peers and execute privileged operations.

Affected Deployment Environments

Cisco confirmed that multiple deployment models are impacted, including:

  • On-premises SD-WAN deployments
  • Cisco SD-WAN Cloud-Pro
  • Cisco-managed SD-WAN cloud services
  • SD-WAN deployments for government environments (FedRAMP)

Active Exploitation in Limited Attacks

Cisco has acknowledged “limited exploitation” of the vulnerability in the wild as of May 2026. The company has urged customers to apply patches immediately due to the risk of unauthorized administrative access.

The attacks are particularly concerning for internet-exposed SD-WAN controllers, which may be directly reachable from external networks if not properly secured.

Indicators of Compromise and Log Monitoring

Cisco recommends that administrators review system logs for signs of compromise, including:

  • Unauthorized “Accepted publickey” authentication entries
  • vmanage-admin logins from unknown IP addresses
  • Unexpected or out-of-place peer connection attempts
  • Access originating from unfamiliar or inconsistent device types

These indicators may suggest that an attacker has successfully bypassed authentication controls.

Post-Exploitation Activity Observed

Security analysis shows that once access is obtained, attackers may attempt to:

  • Modify NETCONF configurations
  • Add SSH keys for persistent access
  • Escalate privileges to root level
  • Deploy web shells or remote access tools

These actions allow attackers to maintain long-term control over SD-WAN infrastructure.

Security Guidance and Risk Factors

Cisco warns that systems exposed to the internet with open management ports face the highest risk of exploitation. Organizations are strongly advised to:

  • Apply vendor patches immediately
  • Restrict exposure of SD-WAN controllers
  • Monitor authentication logs closely
  • Audit network access and peer configurations

Conclusion

The exploitation of CVE-2026-20182 underscores the ongoing risk of authentication bypass vulnerabilities in critical network infrastructure. With limited but confirmed active exploitation already observed, organizations running Cisco SD-WAN environments are urged to prioritize patching and strengthen monitoring to prevent unauthorized administrative access.

Click to comment
Exit mobile version