
CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits
CISA has added CVE-2026-20182, a critical authentication bypass in Cisco Catalyst SD-WAN Controller, to its Known Exploited Vulnerabilities (KEV) catalog, mandating remediation due to active exploitation.
Technical Breakdown
- Vulnerability: CVE-2026-20182, a critical authentication bypass flaw in Cisco Catalyst SD-WAN Controller.
- Impact: Exploitation grants unauthenticated attackers administrative access to the controller.
- Affected Product: Cisco Catalyst SD-WAN Controller.
- TTPs: Active exploitation indicates threat actors are leveraging this bypass to gain initial access or escalate privileges, effectively bypassing standard authentication mechanisms (MITRE ATT&CK: T1078.004 - Exploitation of Remote Services, T1190 - Exploit Public-Facing Application).
Defense
Federal Civilian Executive Branch (FCEB) agencies are required to remediate this vulnerability by May 17, 2026. All organizations utilizing Cisco Catalyst SD-WAN Controller should prioritize applying available patches or implementing mitigation strategies immediately to prevent unauthorized administrative access.
Source: https://thehackernews.com/2026/05/cisa-adds-cisco-sd-wan-cve-2026-20182.html