10.0
CVSS score for CVE-2026-20182, the maximum possible severity rating, reflecting unauthenticated remote access to SD-WAN fabric control
6th
Actively exploited Cisco SD-WAN zero-day confirmed in 2026 alone, per SecurityWeek, underscoring sustained UAT-8616 targeting of SD-WAN infrastructure
3+ years
Duration of UAT-8616 documented targeting of Cisco SD-WAN infrastructure, with exploitation of related CVE-2026-20127 traced to at least 2023 by Cisco Talos
10
Distinct threat actor clusters exploiting related Cisco SD-WAN vulnerabilities simultaneously in 2026, ranging from credential thieves to cryptocurrency miners

CVE-2026-20182, a maximum-severity authentication bypass in Cisco Catalyst SD-WAN Controller and Manager, was added to the CISA Known Exploited Vulnerabilities catalog on May 14, 2026, with confirmed active exploitation by the nation-state-linked threat actor UAT-8616 — which Cisco Talos has tracked targeting Cisco SD-WAN infrastructure since at least 2023. This is the sixth actively exploited Cisco SD-WAN zero-day confirmed in 2026 alone.

The Cisco SD-WAN authentication bypass vulnerability carries a CVSS score of 10.0, the maximum possible severity. CVE-2026-20182 is an improper authentication flaw (CWE-287) in the "vdaemon" peering service that Cisco Catalyst SD-WAN Controller and Manager use for fabric peer communication over DTLS on UDP port 12346. A remote unauthenticated attacker crafts malicious DTLS requests that cause the authentication handshake to accept the attacker as a trusted fabric peer. The attacker logs in as a high-privileged internal user account with NETCONF access, enabling full SD-WAN fabric reconfiguration. Cisco confirmed no workaround exists — the only fix is upgrading to a patched software release.

Every Cisco Catalyst SD-WAN deployment running an unpatched version is at risk: on-premises, Cloud-Pro, Cisco-managed cloud, and FedRAMP environments are all affected. UAT-8616 previously exploited CVE-2026-20127, a distinct authentication bypass in the same vdaemon service, since at least 2023. CVE-2026-20182 is a new, separate flaw — organizations that patched CVE-2026-20127 remain exposed until they apply the CVE-2026-20182 fixes. Cisco Talos identifies 10 distinct threat clusters targeting related SD-WAN vulnerabilities simultaneously, conducting credential theft, network reconnaissance, and cryptocurrency mining alongside UAT-8616's nation-state espionage operations.

How Does the Cisco SD-WAN Authentication Bypass Work?

The Cisco SD-WAN authentication bypass in CVE-2026-20182 exploits a logic flaw in how the vdaemon service validates trust during the DTLS connection handshake. The vdaemon daemon is responsible for establishing and maintaining peering connections between SD-WAN fabric components — Controllers, Managers, Validators, and Edges. It listens on UDP port 12346 for DTLS-encapsulated peer authentication requests.

During a legitimate peering exchange, the Controller or Manager is expected to verify the cryptographic identity of the requesting peer before granting a trusted session. The flaw (CWE-287: Improper Authentication) exists in how the peering mechanism validates the request. An attacker crafts specific DTLS packets that cause this validation step to fail open, treating the unauthenticated connection as a verified fabric peer. The attacker gains a session equivalent to a high-privileged internal vManage administrator, per the Cisco Security Advisory published at sec.cloudapps.cisco.com.

With that session established, the attacker accesses NETCONF — Cisco SD-WAN's network configuration protocol — and can push arbitrary configuration changes to the entire SD-WAN fabric. In documented UAT-8616 post-compromise activity, Cisco Talos reports attackers inject their own RSA public key into the vmanage-admin authorized_keys file at /home/vmanage-admin/.ssh/authorized_keys, granting persistent SSH access that survives reboots. UAT-8616 also modifies /etc/ssh/sshd_config to set PermitRootLogin to yes. Anti-forensics activity clears syslog, wtmp, lastlog, bash_history, and cli-history files to remove evidence of intrusion.

The related prior flaw, CVE-2026-20127, affected the same vdaemon service and was exploited by UAT-8616 since at least 2023. Rapid7 Labs, which discovered CVE-2026-20182 while researching CVE-2026-20127, confirmed this is a distinct flaw requiring separate patching.

1

Exposure identification

Attacker identifies internet-accessible Cisco Catalyst SD-WAN Controller or Manager instances with UDP port 12346 reachable from untrusted networks using Shodan or passive DNS reconnaissance.

2

DTLS handshake bypass

Crafted DTLS packets exploit the vdaemon authentication logic flaw, causing the appliance to accept the connection as a trusted fabric peer without credential verification.

3

Admin session established

Attacker receives a high-privilege vmanage-admin equivalent session with NETCONF access to the SD-WAN Manager or Controller.

4

SSH key injection and persistence

UAT-8616 injects its own RSA public key into /home/vmanage-admin/.ssh/authorized_keys and enables PermitRootLogin to maintain a persistent backdoor that survives patching.

5

Fabric reconfiguration and log clearing

With NETCONF access, the attacker manipulates SD-WAN routing policies and exfiltrates network topology. Syslog, wtmp, lastlog, bash_history, and cli-history are cleared to eliminate forensic evidence.

CVE-2026-20182 Scope: Which Cisco SD-WAN Versions and Deployments Are Affected?

Every Cisco Catalyst SD-WAN deployment running an unpatched version is at risk. Cisco confirmed the vulnerability affects both the Controller component (formerly SD-WAN vSmart) and the Manager component (formerly SD-WAN vManage) across four deployment types: on-premises hardware, Cisco SD-WAN Cloud-Pro, Cisco SD-WAN Cloud (Cisco Managed), and Cisco SD-WAN for Government (FedRAMP). No deployment type is inherently protected until patched.

Patch versions by release branch, per the Cisco Security Advisory: Release 20.9.x is fixed in 20.9.9.1. Release 20.12.x is fixed in 20.12.5.4, 20.12.6.2, or 20.12.7.1. Releases 20.13.x and 20.14.x are fixed in 20.15.5.2. Release 20.15.x is fixed in 20.15.4.4 or 20.15.5.2. Releases 20.16.x and 20.18.x are fixed in 20.18.2.2. Release 26.1.x is fixed in 26.1.1.1. Releases earlier than 20.9 must migrate to a fixed release branch. Cisco-managed cloud deployments (Cloud-Pro and SD-WAN Cloud) received automatic remediation at release 20.15.506.

CISA added CVE-2026-20182 to the Known Exploited Vulnerabilities catalog on May 14, 2026. Binding Operational Directive 22-01 requires Federal Civilian Executive Branch agencies to remediate all KEV entries by their assigned deadlines. SecurityWeek's reporting frames CVE-2026-20182 as the sixth exploited Cisco SD-WAN zero-day in 2026, a pattern that signals sustained, adaptive targeting of SD-WAN infrastructure rather than isolated incidents.

For teams already tracking SD-WAN attack surface, the Cisco SD-WAN CVE-2026-20133 credential chain attack analysis on Decryption Digest provides broader context on how UAT-8616 and related actors have progressively escalated their access techniques across successive SD-WAN CVEs.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Who Is UAT-8616? Nation-State Actor Behind Active CVE-2026-20182 Exploitation

UAT-8616 is a highly sophisticated cyber threat actor tracked by Cisco Talos with high confidence as the primary actor actively exploiting CVE-2026-20182. Talos assesses UAT-8616 at the nation-state level based on its operational security, multi-year persistence on targeted infrastructure, and sustained focus on enterprise SD-WAN control plane access.

UAT-8616 has targeted Cisco SD-WAN infrastructure since at least 2023, first through CVE-2026-20127 — the prior authentication bypass in the same vdaemon service — and now through the new CVE-2026-20182 flaw. Cisco Talos's May 2026 report on SD-WAN ongoing exploitation documents that the actor's infrastructure overlaps with monitored Operational Relay Box (ORB) networks, an anonymization and relay infrastructure pattern consistently associated with nation-state intrusion sets. The Cisco PSIRT confirmed exploitation began as "limited exploitation" in May 2026, consistent with early-stage targeted operations against specific high-value organizations rather than broad opportunistic scanning.

Post-compromise techniques documented by Cisco Talos for UAT-8616 include SSH public key injection into authorized_keys files, enabling PermitRootLogin in the SSH daemon, NETCONF-based SD-WAN fabric configuration access, and anti-forensics cleanup that clears syslog, wtmp, lastlog, bash_history, and cli-history. These patterns indicate an actor prioritizing long-term stealth persistence over disruptive impact — characteristics consistent with espionage operations targeting distributed enterprise and government networks.

UAT-8616's three-year sustained focus on Cisco SD-WAN control plane access, using new CVEs each time prior flaws are patched, demonstrates deliberate investment in maintaining this access vector.

Cisco PSIRT became aware of limited exploitation of this vulnerability in May 2026. Cisco Talos clusters this activity under UAT-8616 with high confidence, whom Talos assesses is a highly sophisticated cyber threat actor.

Cisco Security Advisory — cisco-sa-sdwan-rpa2-v69WY2SW

CVE-2026-20182 IOCs: Detecting Compromise on Cisco SD-WAN Controllers

Cisco provides specific detection guidance and post-compromise indicators for CVE-2026-20182. Security teams should perform forensic checks on all Cisco Catalyst SD-WAN Controller and Manager components before upgrading to preserve evidence of potential exploitation. Cisco explicitly recommends running the request admin-tech command from each control component before applying patches.

Log-based detection: Examine /var/log/auth.log on each Controller and Manager for entries containing "Accepted publickey for vmanage-admin from" followed by an IP address not in the documented peer list. Cross-reference every source IP against authorized system IPs configured in the SD-WAN web UI. Cisco Talos reports that UAT-8616 modifies or truncates this log file as part of anti-forensics operations — an absent or abnormally short auth.log is itself a high-fidelity indicator of compromise.

Configuration-based detection: Run show control connections detail or show control connections-history detail on each control component. Flag any peer showing state:up with challenge-ack 0 and a system IP not present in the documented topology. Inspect /home/vmanage-admin/.ssh/authorized_keys against known organizational SSH public keys. Any unrecognized key is a direct IOC. Check /etc/ssh/sshd_config for PermitRootLogin yes — this value is not set by Cisco in any legitimate configuration and indicates attacker modification.

For a parallel detection methodology covering network edge firewall compromise indicators, see the Palo Alto PAN-OS CVE-2026-0300 firewall RCE mitigation guide on Decryption Digest, which covers analogous forensic artifact review processes for perimeter devices.

Subscribe to unlock Indicators of Compromise

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

How to Patch Cisco Catalyst SD-WAN for CVE-2026-20182

Cisco has released fixed software for CVE-2026-20182 across all active release branches. No workaround exists. Organizations must upgrade Cisco Catalyst SD-WAN Controller and Manager to a fixed release. Before upgrading, Cisco strongly recommends running request admin-tech from every control component to capture forensic state. If auth.log evidence or unauthorized authorized_keys entries are found, contact Cisco TAC at Severity 3 before completing the upgrade to preserve incident response evidence.

Fixed release versions by branch per the Cisco Security Advisory at sec.cloudapps.cisco.com: 20.9.x upgrades to 20.9.9.1; 20.12.x upgrades to 20.12.5.4, 20.12.6.2, or 20.12.7.1; 20.13.x and 20.14.x upgrade to 20.15.5.2; 20.15.x upgrades to 20.15.4.4 or 20.15.5.2; 20.16.x and 20.18.x upgrade to 20.18.2.2; 26.1.x upgrades to 26.1.1.1. Releases prior to 20.9 require migration to a supported fixed branch. Cisco-managed cloud deployments should confirm automatic remediation has been applied at release 20.15.506. Qualys customers can use QID 317854 to detect vulnerable SD-WAN instances. Cisco published Snort rule IDs 66468-66483 and ClamAV signatures for broader SD-WAN exploitation detection.

Subscribe to unlock Remediation & Mitigation steps

Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.

Why Cisco SD-WAN Authentication Bypass CVE-2026-20182 Matters for Your Network

The strategic value of Cisco Catalyst SD-WAN Controller compromise exceeds most single-device vulnerabilities by an order of magnitude. The Controller is the central policy engine for the SD-WAN fabric: it determines routing decisions, topology configuration, and path selection for every connected branch office, data center, and cloud edge. An attacker with NETCONF access to the Controller can read and manipulate traffic routing for every site in the organization's SD-WAN deployment simultaneously. This is not a single host compromise — it is control-plane-level access to the entire wide-area network.

UAT-8616's three-year sustained focus on Cisco SD-WAN infrastructure confirms that nation-state actors have specifically prioritized this access path. The actor developed and deployed authentication bypass exploits against the same vdaemon service across two successive CVEs: CVE-2026-20127 since 2023, and now CVE-2026-20182 in May 2026. Organizations that patched prior SD-WAN CVEs and did not establish ongoing monitoring face the same actor on a new entry path.

The broader 2026 exploitation wave documented by Cisco Talos, with 10 distinct threat clusters simultaneously targeting related Cisco SD-WAN vulnerabilities using tools ranging from XMRig cryptocurrency miners to Godzilla and Behinder web backdoors to AdaptixC2 red-team frameworks, confirms that SD-WAN control plane infrastructure has become a primary target class. The CVSS 10.0 score and CISA KEV listing for CVE-2026-20182 reflect a real-world exploitation pattern that has been active for years and shows no sign of stopping with a single patch.

Network segmentation that blocks external access to UDP port 12346 reduces exposure for internet-facing deployments but is not an official workaround and does not protect against attackers already positioned inside trusted network segments.

The bottom line

Cisco SD-WAN authentication bypass CVE-2026-20182 has earned a CVSS 10.0 score and CISA KEV status because an unauthenticated remote attacker can take full administrative control of an organization's entire SD-WAN fabric with no credentials and no workaround available. Three critical takeaways: this is the sixth Cisco SD-WAN zero-day exploited in 2026 by the same sustained nation-state threat actor (UAT-8616); post-exploitation artifacts include SSH key injection and log clearing that persist through reboots; and all deployment modes including FedRAMP and Cisco-managed cloud are affected. Run request admin-tech now to preserve forensic state, check auth.log for unauthorized vmanage-admin publickey logins, then upgrade to the fixed release for your branch before end of business today.

Frequently asked questions

What is CVE-2026-20182 in Cisco Catalyst SD-WAN?

CVE-2026-20182 is a CVSS 10.0 authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Manager (formerly vManage). The flaw exists in the vdaemon peering service operating over DTLS on UDP port 12346. An unauthenticated remote attacker exploits improper authentication logic in the DTLS handshake to gain administrative access to the SD-WAN fabric, which controls routing policy and network topology for every connected site.

How does the CVE-2026-20182 Cisco SD-WAN authentication bypass work technically?

The vdaemon service authenticates SD-WAN fabric peers over DTLS on UDP port 12346. CVE-2026-20182 is a logic failure in how vdaemon validates trust during the DTLS handshake. An attacker sends crafted DTLS packets that cause the handshake to accept the connection as a verified fabric peer without checking cryptographic identity. The attacker receives an administrative session with NETCONF access, enabling full SD-WAN fabric configuration manipulation.

Which versions of Cisco SD-WAN are affected by CVE-2026-20182?

All versions prior to the following fixed releases are affected. By branch: 20.9.x is fixed in 20.9.9.1; 20.12.x in 20.12.5.4, 20.12.6.2, or 20.12.7.1; 20.13.x and 20.14.x in 20.15.5.2; 20.15.x in 20.15.4.4 or 20.15.5.2; 20.16.x and 20.18.x in 20.18.2.2; 26.1.x in 26.1.1.1. Releases earlier than 20.9 must migrate to a fixed branch. Cisco-managed cloud was automatically remediated at release 20.15.506.

Is there a workaround for CVE-2026-20182 if patching is not immediately possible?

Cisco confirmed no official workaround exists for CVE-2026-20182. Restricting external network access to UDP port 12346 and limiting vdaemon reachability to trusted internal peers reduces attack surface for internet-exposed controllers but does not eliminate risk from adversaries already on internal segments. Patching is the only complete remediation. Organizations should treat this as an emergency patch scenario given CISA KEV status and confirmed exploitation.

How do I detect if my Cisco SD-WAN was compromised via CVE-2026-20182?

Check /var/log/auth.log for entries containing 'Accepted publickey for vmanage-admin from' any unauthorized IP. Review /home/vmanage-admin/.ssh/authorized_keys for unknown RSA keys. Run show control connections detail and flag peers with challenge-ack 0 or unrecognized system IPs. Check /etc/ssh/sshd_config for PermitRootLogin yes. A truncated or absent auth.log, wtmp, lastlog, bash_history, or cli-history file is itself a high-fidelity IOC indicating UAT-8616 anti-forensics activity.

Who is UAT-8616 and what is their connection to Cisco SD-WAN attacks?

UAT-8616 is a highly sophisticated nation-state-level threat actor tracked by Cisco Talos since at least 2023, when the group began exploiting CVE-2026-20127, a prior authentication bypass in the same Cisco SD-WAN vdaemon service. Talos assesses UAT-8616 with high confidence as the primary actor exploiting CVE-2026-20182 in May 2026. Infrastructure overlaps with Operational Relay Box networks associated with nation-state intrusion sets. Post-compromise activity focuses on persistent access and log clearing, consistent with long-term espionage objectives.

Does patching CVE-2026-20127 also protect against CVE-2026-20182?

No. CVE-2026-20182 is a distinct, separate flaw in the vdaemon service. Rapid7 Labs discovered CVE-2026-20182 while researching CVE-2026-20127 and confirmed they are different vulnerabilities requiring separate patches. Organizations that applied CVE-2026-20127 fixes remain fully vulnerable to CVE-2026-20182 until upgrading to a release that includes the new fix. Verify your installed version against the fixed release table in the Cisco Security Advisory.

What can an attacker do after exploiting CVE-2026-20182?

An attacker with admin access via CVE-2026-20182 can use NETCONF to read and modify routing policies and topology for every site in the SD-WAN fabric. Documented UAT-8616 post-exploitation includes injecting SSH public keys for persistent backdoor access, enabling root SSH login, and clearing system logs. Other clusters exploiting related SD-WAN CVEs have deployed web shells, run XMRig cryptocurrency miners, launched KScan and QScan network reconnaissance, exfiltrated SD-WAN topology data, and deployed Cobalt Strike and Sliver command-and-control implants on downstream hosts.

Sources & references

  1. Cisco Security Advisory — CVE-2026-20182
  2. CISA Known Exploited Vulnerabilities Catalog
  3. Cisco Talos — SD-WAN Ongoing Exploitation by UAT-8616
  4. The Hacker News — CVE-2026-20182 Actively Exploited
  5. Rapid7 — CVE-2026-20182 Critical Authentication Bypass Fixed

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.