Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-20182— Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

CVSS 10.0 · Critical KEV EPSS 37.95% · P97

Public Exploits 1

Affected Version Matrix 34

VendorProductVersion RangeStatus
CiscoCisco Catalyst SD-WAN Manager20.1.12affected
19.2.1affected
18.4.4affected
18.4.5affected
20.1.1.1affected
20.1.1affected
19.2.099affected
18.3.6affected
… +26 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-20182

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Catalyst SD-WAN Manager 20.1.12 -

II. Public POCs for CVE-2026-20182

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-20182

登录查看更多情报信息。

Same Patch Batch · Cisco · 2026-05-14 · 4 CVEs total

CVE-2026-202248.6 HIGHCisco Catalyst SD-WAN Manager XML External Entity Injection Vulnerability
CVE-2026-202105.4 MEDIUMCisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability
CVE-2026-202095.4 MEDIUMCisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2026-20182

No comments yet


Leave a comment