PT-2026-40959 · Cisco · Catalyst Sd-Wan Manager+1
Published
2026-05-14
·
Updated
2026-05-14
·
CVE-2026-20182
CVSS v3.1
10
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco Catalyst SD-WAN Controller (affected versions not specified)
Cisco Catalyst SD-WAN Manager (affected versions not specified)
Description
A flaw in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage) allows an unauthenticated remote attacker to bypass authentication. By sending crafted requests, an attacker can obtain administrative privileges, logging into the Controller as an internal, high-privileged, non-root user account. This access enables the manipulation of network configuration for the SD-WAN fabric via NETCONF (Network Configuration Protocol, a protocol used to install, manipulate, and delete the configuration of network devices). There are reports of active exploitation of this issue to gain unauthorized access to management interfaces.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Catalyst Sd-Wan Controller
Catalyst Sd-Wan Manager