Zero-day vulnerability in Catalyst SD-WAN Controller (formerly SD-WAN vSmart)

Improper authentication
CVE-2026-20127

Vulnerability details

Advisory: SB2026022553 - Authentication Bypass in Cisco Catalyst SD-WAN Controller

Vulnerable component: Catalyst SD-WAN Controller (formerly SD-WAN vSmart)

CVE-ID: CVE-2026-20127

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-287 - Improper Authentication

Description:

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in authentication mechanism. A remote non-authenticated attacker can send specially crafted requests to bypass authentication process and access NETCONF, which would then allow to manipulate network configuration for the SD-WAN fabric.

Note, the vulnerability is being actively exploited in the wild. 

External links:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk