PT-2026-40959 · Cisco · Catalyst Sd-Wan Manager+1

Published

2026-05-14

·

Updated

2026-05-14

·

CVE-2026-20182

CVSS v3.1

10

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Cisco Catalyst SD-WAN Controller (affected versions not specified) Cisco Catalyst SD-WAN Manager (affected versions not specified)
Description A flaw in the peering authentication mechanism of Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage) allows an unauthenticated remote attacker to bypass authentication. By sending crafted requests, an attacker can obtain administrative privileges, logging into the Controller as an internal, high-privileged, non-root user account. This access enables the manipulation of network configuration for the SD-WAN fabric via NETCONF (Network Configuration Protocol, a protocol used to install, manipulate, and delete the configuration of network devices). There are reports of active exploitation of this issue to gain unauthorized access to management interfaces.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Improper Authentication

Weakness Enumeration

Related Identifiers

CVE-2026-20182

Affected Products

Catalyst Sd-Wan Controller
Catalyst Sd-Wan Manager