radar

ONE Sentinel

securitySecurity/THREATS/CRIT

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

sourceThe Hacker News
calendar_todayMay 15, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical Cisco SD-WAN Vulnerability Added to CISA's KEV Catalog

Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Cisco Catalyst SD-WAN Controller to its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies are mandated to address this issue by May 17, 2026.

Key Points

  • CISA added the vulnerability to its KEV catalog on Thursday.
  • The vulnerability is an authentication bypass tracked as CVE-2026-20182.
  • It impacts the Cisco Catalyst SD-WAN Controller.
  • Federal Civilian Executive Branch (FCEB) agencies must remediate the vulnerability by May 17, 2026.

Analysis

The inclusion of CVE-2026-20182 in CISA's KEV catalog underscores the critical nature of this vulnerability, which allows for authentication bypass. This poses a significant risk to organizations using Cisco's SD-WAN solutions, as it could potentially lead to unauthorized access. The directive for federal agencies to address this by a specific deadline highlights the urgency and importance of remediation efforts.

Conclusion

IT professionals should prioritize patching the Cisco Catalyst SD-WAN Controller to mitigate potential exploitation. Regularly reviewing and updating systems in line with CISA's advisories is crucial for maintaining security.