Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
3693 articles · 153441 vulns · 36/41 feeds (7d)
← Back to list
10.0
CVE-2026-20182KEVEXPLOITED
Cisco · Cisco Catalyst SD-WAN Manager

Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

Description

May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

Affected Products

VendorProductVersions
CiscoCisco Catalyst SD-WAN Manager20.1.12, 19.2.1, 18.4.4, 18.4.5, 20.1.1.1, 20.1.1, 19.2.099, 18.3.6, 18.3.7, 19.2.0, 19.1.0, 18.4.303, 19.2.098, 18.3.6.1, 18.2.0, 17.2.8, 18.3.3.1, 18.4.0, 18.3.1, 17.2.6, 17.2.9, 17.2.5, 18.4.0.1, 18.3.3, 18.3.0, 19.2.3, 18.4.501_ES, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.4, 19.2.4.0.9, 20.1.3.1, 20.9, 20.10, 20.11, 20.12, 20.13, 20.14, 20.15, 20.16, 20.18, 26.1

References

  • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW
  • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk

Related News (6 articles)

Tier B
CCCS Canada27m ago
Cisco security advisory (AV26-471)
→ No new info (linked only)
Tier D
The Hacker News1h ago
Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
→ No new info (linked only)
Tier C
VulDB1h ago
CVE-2026-20182 | Cisco Catalyst SD-WAN Manager up to 20.3.2 improper authentication (cisco-sa-sdwan-rpa2-v69WY2SW)
→ No new info (linked only)
Tier C
Cisco Talos2h ago
Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities
→ No new info (linked only)
Tier C
Rapid7 Blog3h ago
CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)
→ No new info (linked only)
Tier C
Rapid7 Blog3h ago
The Dark Side of Efficiency: When Network Controllers Become "God Mode" for Attackers
→ No new info (linked only)
CVSS 3.110.0 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CISA KEV✅ Yes
Actively exploited✅ Yes
CWECWE-287
PublishedMay 14, 2026
Last enriched6m agov6
Tags
UAT-8616CVE-2026-20182
Trending Score153🔥
Source articles8
Independent5
Info Completeness11/14
Missing: epss, patch, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-20185
Cisco SG350 and SG350X Series Managed Switches SNMP Denial of Service Vunerability
Trending: 17
HIGHCVE-2026-20167
Cisco IoT Field Network Director Remote Device Denial of Service Vulnerability
Trending: 14
MEDIUMCVE-2026-20189
Cisco Prime Infrastructure Information Disclosure Vulnerability
Trending: 13
MEDIUMCVE-2026-20193
Cisco Identity Services Engine Authentication Bypass Vulnerability
Trending: 13
MEDIUMCVE-2026-20169
Cisco IoT Field Network Director Command Injection Vulnerability
Trending: 12

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 14, 2026
Added to CISA KEV
May 14, 2026
Discovered by ZDM
May 14, 2026
Updated: iocs, tags
May 14, 2026
Updated: exploitAvailable, activelyExploited
May 14, 2026
Updated: description, tags
May 14, 2026
Updated: severity
May 14, 2026
Actively Exploited
May 14, 2026
Exploit Available
May 14, 2026
Updated: affectedVersions
May 14, 2026

Version History

v6
Last enriched 6m ago
v6Tier B6m ago

Added new affected versions 20.9 through 20.18 and 26.1.

affectedVersions
via CCCS Canada
v5Tier C37m ago

Updated severity from CRITICAL to HIGH and added new affected version 20.3.2.

severity
via VulDB
v4Tier C2h ago

Updated description with new technical details and added CVE-2026-20182.

descriptiontags
via Rapid7 Blog
v3Tier C2h ago

Updated exploit availability to true and noted active exploitation of CVE-2026-20182, along with the identification of XenShell as an IOC.

exploitAvailableactivelyExploited
via Cisco Talos
v2Tier C2h ago

Updated to indicate that CVE-2026-20182 is actively exploited and added new tags and IoCs related to the exploitation.

iocstags
via Cisco Talos
v12h ago

Initial creation