CVE-2026-20182 Cisco Catalyst SD-WAN Authentication Bypass Exploited as Zero-Day

Summary:

Cisco has confirmed active exploitation of CVE-2026-20182, a critical authentication bypass flaw affecting Cisco Catalyst SD-WAN Controller and Manager. The vulnerability allows unauthenticated remote attackers to gain high-privileged access via the vdaemon service over DTLS (UDP 12346) and manipulate enterprise SD-WAN configurations through NETCONF.

The flaw was discovered by Rapid7 and linked to threat actor UAT-8616, which has targeted critical infrastructure since 2023. Post-compromise activity includes SSH key injection, malicious account creation, root escalation, and log clearing. CISA added the flaw to the Known Exploited Vulnerabilities (KEV) Catalog on May 14, 2026, and issued Emergency Directive 26-03 requiring immediate remediation.

Organizations across the UAE, GCC, and broader MENA region using Cisco Catalyst SD-WAN are strongly advised to patch affected systems within 48 hours and conduct compromise assessments to identify signs of unauthorized access and persistence.

Technical Description:

CVE-2026-20182 is an authentication bypass vulnerability in the peering authentication mechanism of the vdaemon service, which handles SD-WAN control connection handshaking over DTLS on UDP port 12346.

The validation failure within the peering logic allows an attacker to send specially crafted requests that are processed as if they originated from a trusted authenticated peer. This is a distinct issue from CVE-2026-20127 and is not a patch bypass vulnerability; however, it exists within a similar area of the networking stack and produces the same outcome. Successful exploitation enables an attacker to become an authenticated peer of the target SD-WAN appliance and perform all privileged operations available to a legitimate peer, including NETCONF access and complete SD-WAN fabric configuration management.

Successful exploitation logs the attacker into the Cisco Catalyst SD-WAN Controller as an internal high-privileged non-root user account with NETCONF access, which is the protocol used to distribute policy and routing changes across the entire SD-WAN fabric.

Post-exploitation activity confirmed by Cisco Talos during UAT-8616 operations includes SSH public key injection for persistent access, NETCONF configuration modifications to alter SD-WAN routing and policy, malicious user account creation, root privilege escalation via CVE-2022-20775 through software version downgrade techniques, and extensive log clearing. Following confirmed or suspected compromise, all SD-WAN control connection peering events require manual validation.

The full exploitation chain is detailed below.

CVE CVSS Vulnerability Type Affected Product Patch Version
CVE-2026-20182 10.0 Authentication Bypass (CWE-287) in vdaemon DTLS peering logic on UDP 12346 Cisco Catalyst SD-WAN Controller (vSmart) and Manager (vManage) – all versions and deployment models Apply Cisco patched SD-WAN release per advisory cisco-sa-sdwan-rpa2-v69WY2SW

Exploitation Chain and Confirmed Post-Compromise Activity:

  • Attackers send crafted DTLS requests to the vdaemon service on UDP port 12346. The flawed peering authentication mechanism treats the attacker as a trusted SD-WAN peer without requiring credentials or certificates.
  • The vulnerability allows attackers to bypass authentication and obtain high-privileged non-root access. This provides complete NETCONF control over SD-WAN routing, policies, and configurations across the SD-WAN fabric.
  • UAT-8616 injects malicious SSH public keys into compromised Controllers for persistent access. Unauthorized “Accepted publickey for vmanage-admin” log entries are a key forensic indicator identified by Cisco Talos.
  • Attackers leverage NETCONF access to modify routing tables, policies, and device management instructions. A single compromised Controller can effectively control the entire enterprise SD-WAN environment.
  • The attackers escalate privileges to root by exploiting CVE-2022-20775 through software downgrade techniques. They also create malicious accounts and clear logs to evade detection and maintain long-term persistence.

Ease of Exploitation:

CVE-2026-20182 carries a maximum CVSS score of 10.0.

The vulnerability requires no authentication, no valid SD-WAN certificates, and no special network position. Attackers only require network reachability to UDP port 12346 on the SD-WAN Controller or Manager to initiate exploitation.

UAT-8616 successfully exploited the vulnerability as a zero-day before a security patch was available. CISA subsequently issued a three-day remediation deadline following inclusion in the KEV Catalog, highlighting the severity of active exploitation.

Additionally, ten separate threat clusters have been observed exploiting the related CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 attack chain following public proof-of-concept release. This demonstrates that the broader Cisco SD-WAN ecosystem is currently under active attack from multiple threat actors.

Conclusion:

CVE-2026-20182 represents one of the most critical Cisco vulnerabilities disclosed in 2026. The flaw combines a maximum CVSS score of 10.0, confirmed zero-day exploitation by a sophisticated state-linked threat actor, and compromise of the SD-WAN management plane—the centralized control point responsible for routing and policy distribution across hundreds or thousands of network devices.

Organizations that have not yet applied the vendor patch should treat this vulnerability as a Priority Zero (P0) security emergency. Immediate remediation is essential to prevent unauthorized access and widespread SD-WAN compromise.

Following patch deployment, organizations should perform a comprehensive compromise assessment to identify SSH key injections, unauthorized NETCONF changes, newly created accounts, root escalation activity, and evidence of log tampering before declaring affected environments secure.

Given the strategic role SD-WAN infrastructure plays in modern enterprise environments, successful exploitation may provide attackers with extensive control over enterprise communications, routing decisions, security policies, and distributed network operations.

Impact:

Successful exploitation of CVE-2026-20182 grants an unauthenticated remote attacker high-privileged access to the Cisco Catalyst SD-WAN Controller with full NETCONF capabilities, enabling read and write control over the entire SD-WAN fabric, including routing, policy, and device configuration management.

In observed UAT-8616 operations, this access was followed by root privilege escalation, SSH key persistence, malicious account creation, and configuration manipulation designed to maintain long-term access and operational control.

For organizations managing distributed enterprise networks through SD-WAN, compromise of a Controller is effectively equivalent to a complete network management takeover, allowing attackers to influence connectivity, routing decisions, policy enforcement, and administrative operations throughout the enterprise.

For UAE and GCC organizations, successful exploitation may additionally trigger UAE NCA ECC incident reporting requirements, potential PDPL obligations where regulated or sensitive information is exposed, and significant operational, financial, and reputational consequences resulting from compromise of critical network infrastructure.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Privilege Escalation, Persistence, Lateral Movement, Defence Evasion, Impact
Technique Name Unauthenticated DTLS Peering Authentication Bypass (UDP 12346), High-Privileged vdaemon Account Access, NETCONF Fabric Configuration Manipulation, SSH Key Injection for Persistent Access, CVE-2022-20775 Root Escalation via Version Downgrade, Malicious Account Creation, Extensive Log Clearing
Sub Technique Name Crafted DTLS request to UDP 12346 — broken peering authentication bypassed — high-privileged vdaemon account login — NETCONF access to full SD-WAN fabric — SSH key injection (vmanage-admin) — NETCONF configuration modification — CVE-2022-20775 software downgrade — root escalation — malicious account creation — log clearing — persistent fabric-wide access
Attack Type Vulnerability
Targeted Applications Cisco Catalyst SD-WAN Controller (vSmart), Cisco Catalyst SD-WAN Manager (vManage) — all software versions and deployment models (on-premises and SD-WAN Cloud). Related campaigns also target Cisco Catalyst SD-WAN Validator (vBond) and WAN Edge Routers.
Region Impacted Global
Industry Impacted Critical Infrastructure, Financial Services, Government, Telecommunications, Enterprise (any organisation running Cisco Catalyst SD-WAN)
IOC’s
grep "Accepted publickey for vmanage-admin" /var/log/auth.log | grep -v known_good_IP
CVE CVE-2026-20182

Recommended Actions:

  • Patch Cisco Catalyst SD-WAN Controller and Manager systems immediately using a fixed software release. This remains the only complete remediation. Refer to advisory cisco-sa-sdwan-rpa2-v69WY2SW to identify the correct patched release for your environment.
  • Conduct a comprehensive compromise assessment on all SD-WAN Controllers. Review /var/log/auth.log for suspicious “Accepted publickey for vmanage-admin” entries originating from unknown IP addresses. Execute show control connections detail and investigate any unexpected state:up entries with challenge-ack: 0, which may indicate unauthorized peer connections.
  • Rotate all credentials, SSH keys, and service account passwords associated with any SD-WAN Controller or Manager that was exposed to the internet before patching. If compromise indicators are discovered, assume credential exposure and perform a full credential rotation.
  • Review NETCONF configuration change logs for unauthorized modifications affecting SD-WAN routing tables, policies, segmentation controls, or device configurations. Any unapproved changes should be investigated and remediated following validation.
  • Integrate Cisco Catalyst SD-WAN logs into your SIEM platform and create alerts for unexpected peering activity on UDP port 12346, unauthorized SSH key additions, NETCONF sessions from non-approved IP addresses, software downgrade events, and suspicious account creation activity.
  • If immediate patching is not possible, restrict access to UDP port 12346 on all SD-WAN Controllers and Managers through perimeter security controls. This reduces exposure but does not eliminate the vulnerability and should only be considered a temporary mitigation.
  • Open a Cisco TAC case at Severity 3 with CVE-2026-20182 referenced in the title if compromise is suspected. Execute the request admin-tech command on affected control-plane components before opening the case to provide Cisco with the required diagnostic information.
  • Note that CVE-2026-20182 is part of a broader campaign involving CVE-2026-20127, CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122, all of which are currently included in the CISA KEV Catalog. Organizations should review exposure to all five vulnerabilities and conduct a comprehensive SD-WAN security assessment.

Reference:

https://www.rapid7.com/blog/post/2026/05/14/cve-2026-20182-cisco-sd-wan-authentication-bypass/

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW

https://www.cisa.gov/known-exploited-vulnerabilities-catalog