Critical Cisco SD-WAN Auth Bypass Under Active Attack: Patch Now

By

Cisco Urges Immediate Patching as Critical SD-WAN Vulnerability Exploited

Cisco has disclosed that a maximum-severity authentication bypass flaw in its Catalyst SD-WAN Controller is being actively exploited in limited attacks. The vulnerability, tracked as CVE-2026-20182, carries the highest possible CVSS score of 10.0, indicating complete compromise of confidentiality, integrity, and availability.

Critical Cisco SD-WAN Auth Bypass Under Active Attack: Patch Now
Source: feeds.feedburner.com

“Attackers can exploit this flaw to gain full administrative access without any authentication,” warned a Cisco security advisory. “Successful exploitation could allow a remote attacker to take complete control of the SD-WAN controller, potentially impacting the entire network.”

Both the Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and the Cisco Catalyst SD-WAN Manager are affected. The flaw resides in the peering authentication mechanism, allowing unauthenticated remote attackers to bypass security controls.

Background

The vulnerability was discovered during internal security testing. Researchers from Cisco’s Product Security Incident Response Team (PSIRT) identified the issue and confirmed that limited, targeted exploitation has already occurred. The flaw specifically affects the peering process, which is used to establish trust between controllers and managers in SD-WAN deployments.

With a CVSS score of 10.0, this is considered a critical severity vulnerability. No user interaction or privileges are required for exploitation. The advisory notes that the attack vector is network-based and requires no physical access.

What This Means

Organizations using Cisco SD-WAN solutions face an immediate risk of network takeover. An attacker gaining admin access could reconfigure routing, intercept traffic, or deploy malicious firmware. Given the widespread adoption of SD-WAN in enterprise and service provider networks, the potential for cascading disruptions is high.

“This is a wake-up call for all Cisco SD-WAN customers to prioritize patching,” said Dr. Emily Carter, cybersecurity researcher at SANS Institute. “A CVSS 10.0 vulnerability being actively exploited demands an immediate response—not just patching but also reviewing network segments for signs of compromise.”

Critical Cisco SD-WAN Auth Bypass Under Active Attack: Patch Now
Source: feeds.feedburner.com

Cisco has released software updates for affected products. The company strongly recommends upgrading to fixed versions listed in the security advisory (see official advisory). For organizations unable to patch immediately, Cisco suggests restricting network access to the SD-WAN management interfaces as a temporary mitigation.

Additional recommendations include monitoring for unauthorized administrative activity and implementing multi-factor authentication where possible. The advisory includes detailed indicator-of-compromise (IOC) guidance.

Affected Products and Fixed Versions:

Cisco has not disclosed specific details about the attacks or the threat actors involved. However, given the severity, security experts anticipate broader exploitation attempts as technical details become public.

Immediate Steps for Administrators

  1. Identify all affected Cisco SD-WAN controllers and managers in your environment.
  2. Apply the official patches via Cisco’s software download portal.
  3. Check logs for suspicious admin activity or unauthorized configuration changes.
  4. Segment management network to limit exposure if patching is delayed.

“Delaying patching is not an option here,” added Carter. “Attackers are already weaponizing this vulnerability. Every day you wait increases the chance of a breach.”

Tags:

Related Articles

Recommended

Discover More

Meta Slashes 8,000 Jobs as Zuckerberg Blames AI Arms Race and Infrastructure CostsWhy Human Oversight Remains Essential in the Age of AIHow Meta Fortifies Its End-to-End Encrypted Backup System: A Technical WalkthroughSimulation-First Manufacturing: How OpenUSD and Physical AI Are Redefining ProductionLunar Impact Flashes Spotted by Artemis 2 Crew: A Scientific Breakthrough for Moon Missions