Summary
Cisco Catalyst SD-WAN Controller and Manager’s vdaemon DTLS control-plane handshake fails to verify a peer’s claimed device type. An unauthenticated remote attacker can send crafted DTLS requests on UDP 12346, be accepted as a trusted peer, inject an SSH key for vmanage-admin, and then use NETCONF over SSH on TCP 830 to issue privileged configuration commands. Cisco says the flaw affects all deployment types and has seen limited in-the-wild exploitation.
Why Emergency Fix?
6/6Exploitation Details
Gain administrative control of the SD-WAN controller, inject SSH keys, and alter network configuration.
Full System CompromiseAffected Software
| Product | Affected Versions |
|---|---|
| Cisco Catalyst SD-WAN Controller | All versions prior to Cisco's fixed releases listed in the advisory. |
| Cisco Catalyst SD-WAN Manager | All versions prior to Cisco's fixed releases listed in the advisory. |
Central control-plane and management software used to orchestrate Cisco SD-WAN peers, routing policy, and branch connectivity from a single controller and manager.
Affected Componentvdaemon DTLS peering authentication and CHALLENGE_ACK handling for control connections.
vdaemon DTLS peering authentication and CHALLENGE_ACK handling for control connections.
Not available
Not available
Upgrade Cisco Catalyst SD-WAN Controller/Manager to the first fixed release for your train (for example 20.9.9.1, 20.12.5.4/20.12.6.2/20.12.7.1, 20.15.4.4/20.15.5.2, 20.18.2.2, or 26.1.1.1; Cisco also fixed cloud-managed 20.15.506).
Upgrade Cisco Catalyst SD-WAN Controller/Manager to the first fixed release for your train (for example 20.9.9.1, 20.12.5.4/20.12.6.2/20.12.7.1, 20.15.4.4/20.15.5.2, 20.18.2.2, or 26.1.1.1; Cisco also fixed cloud-managed 20.15.506).
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Affected Software (CPE) (4)
- •cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
- •cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.7:*:*:*:*:*:*:*
- •cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*
- •cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.12.7:*:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| www.cisco.com | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability |
| www.cisco.com | Remediate Catalyst SD-WAN Security Advisory - May 2026 |
| blog.talosintelligence.com | Ongoing exploitation of Cisco Catalyst SD-WAN vulnerabilities |
| www.rapid7.com | CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller |
| www.tenable.com | CVE-2026-20182 |
| www.cisa.gov | Known Exploited Vulnerabilities Catalog |
Priority History
Initial analysis
Elevated — all critical conditions met