Critical alert: CVE-2026-20182 allows to supplant peers and take administrative control at Catalyst SD-WAN

Published 4 min de lectura 37 reading

Cisco has confirmed that a critical vulnerability is being exploited in active attacks at Catalyst SD-WAN Controller, registered as CVE-2026-20182 (CVSS 10.0) which allows to skip the matching authentication (peering) and to achieve administrative access to affected devices. According to Cisco's official notice, the problem is that the authentication mechanism between peers "does not work properly," so an attacker can send manipulated requests to register as a legitimate pair and obtain an internal account with high privileges that allows access to NETCONF and manipulation of the SD-WAN fabric configuration. More technical details and Cisco's notice are available on the company's own page: Cisco CVE-2026-20182 advisory.

The discovery was attributed by Cisco to analytical work that also linked research to a previous vulnerability (CVE-2026-20127) found by Rapid7; Rapid7 has published an analysis that contextualizes how bypass was detected and why the failure allows to create false "peers" within the SD-WAN mesh: Rapid7: report and context. CISA has included vulnerability in its Known Exploited Vulnerabilities Catalog and has given immediate patch instructions for federal agencies, which highlights the gravity and potential operational impact: CISA KEV catalog.

Critical alert: CVE-2026-20182 allows to supplant peers and take administrative control at Catalyst SD-WAN
Image generated with IA.

The attack vector is especially dangerous because, by adding a malicious peer, the actor can set up encrypted tunnels that seem legitimate within SD-WAN and announce routes under its control. With NETCONF available, an intruder can change routing policies, redirect traffic, open side access to data centres or clouds and persist in infrastructure without direct root access. Although the account obtained by exploitation is "no-root," its internal privileges allow alterations with impact on the availability, confidentiality and integrity of the corporate network.

Cisco has published commitment indicators (IOCs) and tactical recommendations: review authentication records (e.g. / var / log / auth.log) on Internet exposed drivers looking for public login for the manager's administrative account, and compare IP addresses with the "IP system" configured in the SD-WAN IU to detect unauthorized peers. It also recommends reviewing the driver's peering logs by looking for peer registration events that do not correspond to the known topology. Since Cisco claims that there are no complete alternative mitigation, the only definitive remedy is to apply the corrected versions published by Cisco.

If you manage Catalyst SD-WAN, the first action should be to assume the possibility of commitment if the computer was accessible from the Internet and any unknown IP appears in the authentication or peering logs. In this case, Cisco advises to open a case with TAC; from the practice of incident response, in addition to contact support, it is appropriate to isolate the affected controller from the network, take forensic overturn of logs and configurations, rotate keys and certificates used for matching and management, and consider the complete reconstruction of the device with patched software if there is evidence of unauthorized access.

Critical alert: CVE-2026-20182 allows to supplant peers and take administrative control at Catalyst SD-WAN
Image generated with IA.

In parallel with the patch, reduce the attack surface: restrict access to management interfaces and control plane to internal trust networks or authorized IP addresses, implement access control lists at edge level, limit the scope of NETCONF access and implement least-privileged policies in the management of SD-WAN. Implement continuous detection for unexpected changes in the configuration and check BGP / telemetric routes and ads to detect injections of malicious routes. These measures help to mitigate the risk while the patch is deployed, but do not replace it.

In terms of governance and continuity, this episode requires a review of confidence practices between devices in SD-WAN architectures: use second checks on the validity of certificates and keys, keep inventory and white list of System IPs and approved peers, and run regular audits of control-plane telemetry. For organizations with regulatory compliance or support critical services, support actions with forensic records and notify stakeholders and regulators as appropriate.

The reported operating speed and the entry into the CISA catalogue involve a real and time-bound risk window: Plot immediately, check logs and make commitments when there are authentication records from unrecognized PIs. If you need specific technical guidance or support with an ongoing incident, document log dates and samples before making changes, and consider climbing professional response services or Cisco's own TAC to preserve evidence and accelerate containment.

Coverage

Related

More news on the same subject.