CRITICAL: Cisco Catalyst SD-WAN CVE-2026-20182 Hits CVSS 10.0 with Active Exploitation by UAT-8616
Cisco patched CVE-2026-20182, a CVSS 10.0 authentication bypass in Catalyst SD-WAN Controller and Manager that lets an unauthenticated remote attacker gain administrative access via the vdaemon peering service on UDP/12346. CISA added the flaw to its Known Exploited Vulnerabilities catalog with a federal remediation deadline of May 17, 2026. Threat cluster UAT-8616 is actively exploiting it. No workarounds, only patches.
There are bad weeks for network engineers, and then there are weeks where Cisco quietly publishes a CVSS 10.0 against your SD-WAN fabric, CISA tacks it onto the Known Exploited Vulnerabilities catalog, and the federal remediation deadline lands forty-eight hours later. CVE-2026-20182 has done exactly that. The advisory dropped on May 14, the catalog entry followed almost immediately, and as of May 17 every Federal Civilian Executive Branch agency running Catalyst SD-WAN is either patched or out of compliance. Private-sector operators do not get the same hard deadline, but they share the same threat model, and the threat model right now is a remote unauthenticated attacker walking straight into administrative control of the box that steers traffic across the entire WAN.
The vulnerability lives in the peering authentication path of Cisco Catalyst SD-WAN Controller, formerly known as vSmart, and Cisco Catalyst SD-WAN Manager, formerly known as vManage. Cisco renamed the products last year, so plenty of runbooks still refer to the old names, but the bug does not care what the device is called. According to advisory cisco-sa-sdwan-rpa2-v69WY2SW, the flaw lets an unauthenticated remote attacker bypass authentication by sending crafted peering requests to the vdaemon service, which listens on UDP port 12346 over DTLS. A successful request hands the caller a high-privileged internal account, full NETCONF access, and the ability to rewrite SD-WAN policy across the fabric. That is not a privilege escalation. That is starting at the top.
Cisco's Product Security Incident Response Team confirmed limited exploitation in May 2026, which is corporate language for "we have hits in the wild and we will not name the victims yet." The attribution sits with a threat cluster Talos tracks as UAT-8616, the same group that weaponized CVE-2026-20127 against SD-WAN controllers as far back as 2023. CVE-2026-20127 was itself a maximum-severity authentication bypass in the same vdaemon networking stack, and Cisco has been clear that the new bug is not a patch bypass of the old one. It is a separate validation failure in a nearby piece of code, which is the kind of finding you get when an attacker who already knows the codebase keeps poking at it after the first fix lands.
Post-exploitation looks about how you would expect from a crew that has spent two years building tooling for this platform. UAT-8616 drops SSH keys for persistence, modifies NETCONF configurations to keep their access alive across reboots, and escalates from the internal non-root account to root using local techniques Cisco has not detailed publicly. Talos and partner research has tracked the group deploying XenShell, a JSP web shell derived from ZeroZenX Labs proof-of-concept code, alongside Godzilla and Behinder variants and a Nim-based backdoor in the NimPlant family. Once a foothold is solid, the secondary payloads start arriving. AdaptixC2 and Sliver give the operators a real command and control framework. KScan handles internal asset mapping. XMRig shows up on a healthy number of compromised controllers because crypto mining is still the easiest way to monetize idle compute when the primary objective is patience. Credential stealers tuned for admin hash dumps, JWT signing keys, and AWS credentials round out the kit, which tells you the attackers are not stopping at the SD-WAN box. The controller is a pivot point into whatever sits behind it.
Affected releases span almost every supported train. Anything earlier than 20.91 needs to migrate forward entirely because it will not receive a backported fix. From there, the patched versions break down by branch. The 20.9 train moves to 20.9.9.1. The 20.10 line jumps to 20.12.7.1 because Cisco is pushing operators off the older branch. The 20.12 train has three landing spots at 20.12.5.4, 20.12.6.2, or 20.12.7.1, depending on which sub-release you are on. The 20.15 train lands at 20.15.4.4 or 20.15.5.2. The 20.18 train moves to 20.18.2.2, and the brand-new 26.1 train fixes at 26.1.1.1. Customers running Cisco-managed SD-WAN Cloud received remediation in release 20.15.506, which Cisco rolled out without operator action. On-premises, SD-WAN Cloud-Pro, and SD-WAN for Government FedRAMP deployments all require manual upgrades. The advisory explicitly states there are no workarounds, which means the only mitigation is the patch.
Before you click upgrade, run the request admin-tech command on each control component. That command captures forensic state from the device, and if you have been quietly compromised since March, you want that data preserved before a patch overwrites it. Cisco buried this recommendation in the mitigation section of the advisory, but it matters more than the upgrade itself for any organization that suspects prior exposure. Talos research has noted the broader SD-WAN exploitation campaign began in early March 2026, with multiple chained vulnerabilities including CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122 enabling remote unauthenticated device access before CVE-2026-20182 even hit the catalog. If your controllers face the internet and have not been patched on those CVEs either, you have a much bigger investigation than a single upgrade window.
Detection guidance from Cisco focuses on log review. Audit /var/log/auth.log on every control component for accepted publickey authentication events targeting the vmanage-admin account from source IP addresses that do not match your management plane. Look for peering events arriving at unexpected times, from unrecognized peer IPs, or from device types that do not exist in your fabric architecture. The vdaemon service should only see DTLS peering from devices you own, so anything else is signal. Pull NETCONF audit logs if you have them enabled, and compare current configuration state against your last known-good backup, because configuration drift on a controller is often the first sign that someone else has the keys. Threat hunters with EDR coverage on the underlying Viptela operating system should look for unexpected SSH key additions, suspicious cron entries, and outbound connections to AdaptixC2 or Sliver listeners.
There is a reason this campaign rates so much attention beyond the score on the advisory. SD-WAN controllers are not edge devices. They sit at the strategic core of every modern enterprise WAN, including the WANs that connect branch offices to data centers, the WANs that backhaul cloud traffic, and the WANs that carry sensitive operational technology in industries that should not be running anything sensitive over the public internet but are doing it anyway. An attacker with administrative control of the controller can reroute traffic, splice in inspection points, modify QoS to mask exfiltration, or simply sit and watch flow telemetry to build a target map of the entire organization. Two and a half years of dwell time for a group like UAT-8616 produces an intelligence picture that no incident response engagement is going to fully unwind in a single quarter.
For managed service providers, this is the kind of week that justifies a renewed conversation with every client about external attack surface. The first call should go to anyone running Catalyst SD-WAN, the second call to anyone who said no to your network device management offering, and the third call to anyone whose pentest scope skipped infrastructure devices because the budget did not stretch. There is a real upsell sitting inside this advisory for darkweb monitoring, continuous attack surface management, and managed detection and response that actually covers Viptela. Clients respond to deadlines, and CISA just handed every account executive in the channel the strongest deadline of the quarter.
Patch the boxes. Pull admin-tech first. Hunt the logs. Then walk your client list and find the rest of the SD-WAN that nobody told you about, because that one is the box that breaks the rest of the network when this lands again next quarter.
References
- Cisco Security Advisory cisco-sa-sdwan-rpa2-v69WY2SW
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW
- Cisco CSA: SD-WAN Controller Authentication Bypass
https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-sdwan-rpa2-v69WY2SW.html
- The Hacker News: CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV
https://thehackernews.com/2026/05/cisa-adds-cisco-sd-wan-cve-2026-20182.html
- The Hacker News: Cisco Catalyst SD-WAN Controller Auth Bypass
https://thehackernews.com/2026/05/cisco-catalyst-sd-wan-controller-auth.html
- Help Net Security: Cisco patches another actively exploited SD-WAN zero-day
https://www.helpnetsecurity.com/2026/05/15/cisco-sd-wan-zero-day-cve-2026-20182/
- NVD CVE-2026-20182
https://nvd.nist.gov/vuln/detail/CVE-2026-20182
- CISA Known Exploited Vulnerabilities Catalog
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Concerned about this threat?
Our security team can assess your exposure and recommend immediate actions.
Protect Your Organization
Find vulnerabilities like this in your systems before attackers do.
24/7 monitoring to detect and respond to threats like these in real time.
Block phishing and malware delivery targeting your organization.
Map security controls to 26 frameworks including NIST, SOC 2, and HIPAA.