Cisco SD-WAN 0-Day Flaw Actively Exploited in Attacks

Share:

CVE-2026-20182 is an authentication bypass vulnerability affecting the core vdaemon service within the Cisco Catalyst SD-WAN architecture. The flaw allows an unauthenticated, remote attacker to bypass cryptographic trust verification during the Datagram Transport Layer Security (DTLS) authentication process. By successfully mimicking a specific device type, an attacker can enroll as a fully trusted control-plane peer, enabling comprehensive control over enterprise wide network operations, routing manipulation, and long-term persistence.

Severity: Critical

Vulnerability Profile

  • CVE ID: CVE-2026-20182
  • CVSS Score: 10.0
  • Class: Authentication Bypass / Missing Verification
  • Affected Component: vdaemon service; function vbond_proc_challenge_ack()
  • Exploit Availability: Public Metasploit auxiliary module exists

Affected Products

All Cisco Catalyst SD-WAN deployment models are affected regardless of configuration, because the flaw is in the core authentication logic:

  • Cisco Catalyst SD-WAN Controller (vSmart)
  • Cisco Catalyst SD-WAN Manager (vManage)
  • Applies to: On-Prem, Cloud-Pro, Cisco-Managed Cloud, and FedRAMP/Government deployments

Attack Flow

  1. Attacker initiates DTLS handshake to vSmart on UDP/12346 using any self-signed certificate (cert validation failure is logged but does not abort the flow).
  2. Controller responds with CHALLENGE (msg_type=8, 256 random bytes + TLVs).
  3. Attacker sends crafted CHALLENGE_ACK (msg_type=9) with device_info upper nibble = 2 (vHub).
  4. Controller sends CHALLENGE_ACK_ACK (msg_type=10); sets peer->authenticated = 1.
  5. Attacker sends Hello (msg_type=5) — passes the secondary auth check since the flag is set.
  6. Peer transitions to state: up — rogue node is now a trusted SD-WAN control-plane peer.

Post-Exploitation Capabilities

Once trusted in the control plane, the attacker can:

  • Persistent SSH key injection via MSG_VMANAGE_TO_PEER (msg_type=14), handled by vbond_proc_vmanage_to_peer().
  • NETCONF access on TCP/830 via the injected vmanage-admin key, yielding privileged management-plane operations.
  • Routing manipulation — inject/modify routes, blackhole or redirect traffic.
  • Segmentation changes — alter or bypass policy boundaries.
  • Configuration push to managed SD-WAN devices.
  • Full SD-WAN fabric compromise — vSmart orchestrates routing, trust, and onboarding enterprise-wide.

vmanage-admin is a high-privilege internal service account used for automation between vManage, vSmart, and vBond, so SSH key injection converts a transient session compromise into persistent, credential-independent privileged access.

Detection Opportunities

Hunt for the following on SD-WAN controllers:

  • Unexpected DTLS connections to UDP/12346 from non-inventoried sources.
  • Peers transitioning to state: up without legitimate onboarding workflow.
  • Anomalous CHALLENGE_ACK activity, especially peers identifying as vHub when the deployment doesn’t use vHubs (or in unexpected quantities/locations).
  • New or recently appended entries in /home/vmanage-admin/.ssh/authorized_keys.
  • Unknown peer serial numbers in active control-plane peer lists.
  • Internal logs showing certificate verification failures that did not abort the session.

Recommendations

  1. Patch immediately all externally reachable vSmart, vBond, and vManage controllers; treat internet-exposed vulnerable nodes as potentially already compromised.
  2. Review DTLS/auth logs for the indicators above.
  3. Rotate trust material if compromise is suspected: SSH keys, certificates, API credentials, controller-to-controller trust.
  4. Preserve forensics before remediation: controller logs, DTLS captures, memory, configuration snapshots, authorized_keys history.

Source:

  • https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa2-v69WY2SW
  • https://www.resecurity.com/blog/article/cve-2026-20182-unauthenticated-cisco-sd-wan-control-plane-compromise-via-vhub-authentication-bypass

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Talk to an expert