Forum Discussion
FAQ about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182)
Multiple critical authentication bypass vulnerabilities in Cisco Catalyst SD-WAN Controller and Manager are under active exploitation. A sophisticated threat actor tracked as UAT-8616 has been exploiting these systems since at least 2023, and 10 additional threat clusters began exploiting a chain of vulnerabilities in March 2026 after proof-of-concept code was published. CISA issued Emergency Directive 26-03 and added CVE-2026-20182 to the KEV catalog on May 14 with a 3-day remediation deadline.
| CVE | Description | CVSSv3 |
|
Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass |
10.0 | |
|
Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass |
10.0 | |
|
Cisco Catalyst SD-WAN Manager Information Disclosure |
7.5 | |
|
Cisco Catalyst SD-WAN Manager Credential Access |
7.5 | |
|
Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite |
5.4 |
For more information about the vulnerabilities, including the availability of patches and Tenable product coverage, please visit our blog.