Improper authentication in Cisco Systems, Inc products - CVE-2026-20182

 

Improper authentication in Cisco Systems, Inc products - CVE-2026-20182

Published: May 14, 2026


Vulnerability identifier: #VU131450
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:A/U:Red
CVE-ID: CVE-2026-20182
CWE-ID: CWE-287
Exploitation vector: Remote access
Exploit availability: The vulnerability is being exploited in the wild
Vendor: Cisco Systems, Inc
Affected software:
Catalyst SD-WAN Manager (formerly SD-WAN vManage)
Cisco SD-WAN vEdge Routers
Catalyst SD-WAN Controller (formerly SD-WAN vSmart)

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication and obtain administrative privileges.

The vulnerability exists due to improper authentication in the peering authentication mechanism when handling control connection handshaking requests. A remote attacker can send crafted requests to bypass authentication and obtain administrative privileges.

A successful exploit could allow access as an internal, high-privileged, non-root user account and subsequent access to NETCONF to manipulate SD-WAN fabric configuration.

Note, the vulnerability is being actively exploited in the wild.


How to mitigate CVE-2026-20182

Install security update from vendor's website.

Sources