Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI is reportedly preparing legal action against Apple. This isn’t the first time my partner has been burned.

Clawdmeter turns your Clawd code usage statistics into a small desktop dashboard

Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access
Identity

Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access

By May 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 14, 2026Vulnerability/Network Security

Cisco has released an update that addresses a maximum severity authentication bypass flaw in Catalyst SD-WAN controllers that it announced was exploited in a limited attack.

This vulnerability is tracked as CVE-2026-20182 and has a CVSS score of 10.0.

“A vulnerability in peering authentication for Cisco Catalyst SD-WAN Controller (formerly SD-WAN vSmart) and Cisco Catalyst SD-WAN Manager (formerly SD-WAN vManage) could allow an unauthenticated, remote attacker to bypass authentication and gain administrative privileges on an affected system,” Cisco said.

The networking equipment giant said the flaw is due to a malfunction in the peering authentication mechanism and could be exploited by an attacker by sending a crafted request to an affected system.

A successful exploit could allow the attacker to log in to a Cisco Catalyst SD-WAN controller as an internal, highly privileged non-root user account and use it as a weapon to access NETCONF and manipulate network settings in the SD-WAN fabric.

This vulnerability affects the following deployments:

On-premises deployments Cisco SD-WAN Cloud-Pro Cisco SD-WAN Cloud (Cisco Managed) Cisco SD-WAN for Government (FedRAMP)

According to Rapid7, which discovered CVE-2026-20182, this flaw is also reflected in another critical authentication bypass that affects the same component, CVE-2026-20127 (CVSS score: 10.0). The latter has reportedly been exploited by a threat actor known as UAT-8616 since at least 2023.

“This new authentication bypass vulnerability affects the ‘vdaemon’ service (UDP port 12346) over DTLS, the same service that was vulnerable to CVE-2026-20127,” said Rapid7 researchers Jonah Burgess and Stephen Fewer. “The new vulnerability is not a patch bypass for CVE-2026-20127. It is a separate issue in a similar part of the ‘vdaemon’ network stack.”

However, the end result is the same. CVE-2026-20182 could allow a remote unauthenticated attacker to become an authenticated peer of a target appliance and perform privileged operations.

In an advisory, Cisco said it became aware of “limited exploitation” of the flaw in May 2026 and urged customers to apply the latest update as soon as possible.

The company also said Catalyst SD-WAN controller systems that are accessible over the internet and have exposed ports are at high risk of being compromised. Customers are encouraged to audit the “/var/log/auth.log” file for entries related to accepted public keys for vmanage-admin from unknown or unauthorized IP addresses.

Another indicator is the presence of suspicious peering events in the logs. This includes unauthorized peer connections that occur at unexpected times, originate from unrecognized IP addresses, or involve device types that are inconsistent with the environment’s architecture.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleStealer backdoor targeting developer secrets found in three node IPC versions
Next Article Clawdmeter turns your Clawd code usage statistics into a small desktop dashboard

Related Posts

Stealer backdoor targeting developer secrets found in three node IPC versions

May 14, 2026

PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

May 14, 2026

Ghostwriter, geofenced PDF phishing, and Cobalt Strike target Ukrainian government

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI is reportedly preparing legal action against Apple. This isn’t the first time my partner has been burned.

Clawdmeter turns your Clawd code usage statistics into a small desktop dashboard

Cisco Catalyst SD-WAN Controller Authentication Bypass Is Actively Abused to Gain Administrative Access

Stealer backdoor targeting developer secrets found in three node IPC versions

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.