Forwarded from Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) Security Advisory TWCERTCC-200-202605-00000011
Cisco Catalyst SD-WAN is Cisco's cloud-centric software-defined wide area network architecture that provides centralized management, secure encryption, and application performance optimization to ensure reliable connectivity across multi-cloud environments. Cisco has recently released a critical security advisory.
【CVE-2026-20182, CVSS: 10.0】 This vulnerability exists in the Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly vManage). It allows a remote attacker to send crafted requests to bypass authentication and obtain internal high-privileged accounts (non-root).
Attackers can subsequently leverage these high-privileged accounts to access NETCONF, modify the SD-WAN network architecture configuration, establish malicious network nodes, and conduct further deep attacks on enterprise/organizational networks.
Note: Active exploitation in the wild has been observed targeting Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage). Please take immediate response measures.