Skip to main content
See every side of every news story
Published loading...Updated

Patch Time for Cisco SD-WAN Admins as Vendor Drops yet Another Make-Me-Admin Zero-Day

Cisco says the flaw has a severity score of 10 and is being exploited to gain administrative access and register rogue peers.

  • On Thursday, Cisco released security updates for CVE-2026-20182, a critical authentication bypass vulnerability with a severity score of 10. The Cybersecurity and Infrastructure Security Agency added the flaw to its Known Exploited Vulnerabilities Catalog, ordering federal agencies to patch by May 17, 2026.
  • Researchers at Rapid7 discovered this vulnerability while investigating CVE-2026-20127, a flaw previously exploited by threat actor UAT-8616. The new vulnerability affects the vdaemon service over DTLS, the same component that contained the earlier security issue.
  • "This vulnerability exists because the peering authentication mechanism in an affected system is not working properly," Cisco said. Attackers can access the Cisco Catalyst SD-WAN Controller as a high-privileged user and use NETCONF to manipulate network configuration.
  • Administrators must upgrade to a fixed software release, as no workarounds fully mitigate the flaw. Organizations should review logs for entries showing "Accepted publickey for vmanage-admin" from unknown IP addresses to identify potential compromise.
  • Attackers may attempt to register rogue devices within the SD-WAN fabric to establish encrypted connections and move deeper into networks. These malicious peers could advertise networks under attacker control, necessitating careful monitoring of all unauthorized peering events.
Insights by Ground AI

17 Articles

Global Security Mag OnlineGlobal Security Mag Online
Reposted by
Global Security Mag OnlineGlobal Security Mag Online

Multiple vulnerabilities have been discovered in Cisco products. They allow an attacker to cause an increase in privileges, a breach of data confidentiality and a circumvention of security policy. Cisco indicates that the vulnerability CVE-2026-20182 is... See online: https://www.cert.ssi.gouv.fr/avis/C...

Cisco has just released a fix for CVE-2026-20182, a fault noted 10 out of 10 in Catalyst SD-WAN Controller and Manager. An unauthenticated remote attacker gets an internal administrator account on the controllers. CISA ranks the flaw in its KEV catalog and imposes the patch within three days on federal agencies.

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news on Thursday, May 14, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal