CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits — Ravie LakshmananMay 15, 2026Vulnerability / Credential Theft [https://blogger.goo

cisa-adds-cisco-sd-wan-cve-2026-20182-to-kev-after-admin-access-exploits

What’s new: CISA has added CVE-2026-20182, a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller, to its Known Exploited Vulnerabilities (KEV) catalog. This vulnerability allows unauthenticated remote attackers to gain administrative access. It has a CVSS score of 10.0, indicating maximum severity. Federal agencies are required to remediate this issue by May 17, 2026.

Who’s affected

Organizations using Cisco Catalyst SD-WAN Controller and Manager are at risk, particularly those within the Federal Civilian Executive Branch (FCEB) that must comply with CISA’s remediation deadline.

What to do

  • Immediately assess your environment for the presence of Cisco Catalyst SD-WAN Controller and Manager.
  • Apply patches or mitigations as recommended by Cisco to address CVE-2026-20182.
  • Monitor for signs of exploitation, including unauthorized access attempts and modifications to configurations.

Sources