All posts
Cybersecurity

Cisco SD-WAN Zero-Day Exploited: CISA Orders Patch by May 17

Huma Shazia15 May 2026 at 2:13 am4 min read
Cisco SD-WAN Zero-Day Exploited: CISA Orders Patch by May 17

Key Takeaways

Cisco SD-WAN Zero-Day Exploited: CISA Orders Patch by May 17
Source: BleepingComputer
  • CVE-2026-20182 has a maximum severity score of 10.0 and allows attackers to bypass authentication and gain admin privileges
  • Attackers can insert rogue devices into SD-WAN environments and manipulate network configurations
  • CISA has ordered federal agencies to patch by May 17, 2026, just three days after disclosure

What Happened

Cisco published an advisory on May 14 warning that attackers are actively exploiting a critical flaw in its Catalyst SD-WAN Controller. The vulnerability, tracked as CVE-2026-20182, carries the maximum CVSS severity score of 10.0.

The flaw affects both Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager across on-premises and cloud deployments. The company says it detected exploitation attempts in May but has not shared details about specific attacks or victims.

10.0
CVSS severity score for CVE-2026-20182, the maximum possible rating

How the Attack Works

The vulnerability exists in the peering authentication mechanism. According to Cisco's advisory, the mechanism is "not working properly," which allows attackers to send crafted requests that bypass authentication entirely.

A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

— Cisco security advisory

For context, Cisco Catalyst SD-WAN is a software-based networking platform that connects branch offices, data centers, and cloud environments through a centrally managed system. The controller routes traffic between sites over encrypted connections.

The real danger is what comes after initial access. Cisco's indicators of compromise warn administrators to look for unauthorized peering events in controller logs. These events could signal attempts to register rogue devices within the SD-WAN fabric.

By adding a rogue peer, an attacker can insert a malicious device that appears legitimate. That device establishes encrypted connections and advertises networks under the attacker's control. From there, lateral movement deeper into the organization becomes possible.

Connection to Earlier SD-WAN Flaw

Security firm Rapid7 discovered CVE-2026-20182 while researching a different Cisco SD-WAN vulnerability, CVE-2026-20127, which Cisco patched in February.

That earlier flaw was also exploited as a zero-day. A threat actor tracked as UAT-8616 has been using it since 2023 to create rogue peers in target organizations. Whether the same group is behind the new attacks remains unclear.

What You Should Do

Cisco has released security updates. There are no workarounds that fully mitigate the issue, which means patching is the only complete fix.

The company recommends two immediate steps while preparing to patch:

  • Restrict access to SD-WAN management and control-plane interfaces to trusted internal networks or authorized IP addresses only
  • Review authentication logs for suspicious login activity

CISA has added CVE-2026-20182 to its Known Exploited Vulnerabilities Catalog. Federal agencies must patch affected devices by May 17, 2026, just three days after the disclosure. Private organizations should treat this timeline as a signal of urgency.

Why SD-WAN Flaws Matter

SD-WAN controllers sit at the center of enterprise network architecture. They manage routing decisions across every connected branch, data center, and cloud environment. Compromising one gives attackers visibility into traffic patterns and the ability to redirect or intercept communications.

The rogue peer attack pattern is especially concerning. A malicious device that looks legitimate to the SD-WAN fabric can persist undetected. It appears as just another branch office or cloud connection.

ℹ️

Logicity's Take

FAQ

Frequently Asked Questions

What is CVE-2026-20182?

It's a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller and SD-WAN Manager that allows attackers to gain administrative privileges and manipulate network configurations.

Is CVE-2026-20182 being actively exploited?

Yes. Cisco confirmed it detected attackers exploiting the flaw in May 2026, though the company has not disclosed details about specific victims or attack campaigns.

What products are affected by this Cisco SD-WAN vulnerability?

Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager are affected in both on-premises and cloud deployments.

Is there a workaround for CVE-2026-20182?

No. Cisco says there are no workarounds that fully mitigate the issue. Patching is required. In the meantime, restrict access to management interfaces and monitor authentication logs.

When must federal agencies patch this vulnerability?

CISA has ordered federal agencies to patch by May 17, 2026. Private organizations should treat this accelerated timeline as guidance for their own response.

ℹ️

Need Help Implementing This?

Source: BleepingComputer

H

Huma Shazia

Senior AI & Tech Writer

Related Articles