A maximum-severity authentication bypass in Cisco Catalyst SD-WAN Controller is under active exploitation, and organizations running Cisco’s SD-WAN fabric have no workaround — only a patch stands between attackers and full administrative control of their network orchestration layer.
What Happened
Cisco disclosed CVE-2026-20182 on May 14, 2026, assigning it a CVSS score of 10.0. The flaw resides in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage). An unauthenticated remote attacker sends crafted requests to the vdaemon service on DTLS UDP port 12346 to bypass authentication entirely.
Successful exploitation allows an attacker to authenticate as a high-privileged internal user account and inject an attacker-controlled SSH public key into the vmanage-admin user’s authorized_keys file. From there, the attacker gains persistent, privileged SSH access to the SD-WAN Controller — and the ability to manipulate network configuration across the entire SD-WAN fabric via NETCONF.
Cisco Talos attributed limited in-the-wild exploitation to UAT-8616, a threat cluster Talos tracks with high confidence. Rapid7 discovered and reported the vulnerability. Cisco released software patches and confirmed no workarounds exist.
Why This Matters for Canadian Organizations
Cisco Catalyst SD-WAN is widely deployed across Canadian federal departments, provincial governments, financial institutions, telecommunications providers, and enterprise networks. The SD-WAN Controller sits at the heart of WAN fabric management — compromising it gives an attacker full visibility into and control of branch-to-branch and branch-to-data-centre traffic across the entire organization.
This is not a hypothetical risk. UAT-8616 has been conducting active exploitation since Cisco’s disclosure. Organizations with internet-exposed SD-WAN Controller or Manager interfaces face immediate risk. Under Canada’s PIPEDA and the proposed Bill C-26 Critical Cyber Systems framework, a compromise of network orchestration infrastructure constitutes a breach of significant systems — triggering reporting obligations and requiring immediate containment steps.
Canadian organizations using Cisco SD-WAN should treat CVE-2026-20182 as a patch-or-isolate situation. The CVSS 10.0 score is not theoretical — the absence of any workaround means the only protection is running patched software or taking the Controller off internet-accessible networks while patching is prepared.
What to Do
Apply Cisco’s patches immediately. Cisco’s security advisory at Cisco Security Advisory cisco-sa-sdwan-rpa-EHchtZk provides patch versions for affected releases of Cisco Catalyst SD-WAN Controller and Manager. If patching is not immediately possible, restrict access to DTLS UDP port 12346 at network perimeter controls to limit the attack surface. Audit vmanage-admin authorized_keys files for unauthorized entries — an injected key is the primary indicator of post-exploitation access. Review NETCONF access logs for unauthorized configuration changes. Organizations running managed SD-WAN services should confirm with their provider the patch has been applied.
Source: The Hacker News | Rapid7






