Broken vdaemon Peering Authentication Enables Unauthenticated Admin Access
On May 15, 2026, cybersecurity experts reported a critical vulnerability affecting the Cisco Catalyst SD-WAN Controller, which is presently being exploited by threat actors. This flaw allows unauthorized administrative access, enabling attackers to gain administrative privileges without going through proper authentication protocols.
The vulnerability, designated as CVE-2026-20182, has been assessed with a maximum CVSS score of 10, highlighting its severity. This significant risk arises from a vulnerability in the peering authentication mechanism associated with the vdaemon service. This compromised mechanism permits attackers to manipulate the network configuration of SD-WAN, potentially leading to further exploitation and damage.
In response to the heightened alert, the U.S. Cybersecurity and Infrastructure Agency (CISA) included this vulnerability in its catalog of known exploited vulnerabilities, demanding federal agencies to implement fixes by the approaching Sunday. This urgency reflects a growing concern over the implications of such vulnerabilities on national security, given the critical role that SD-WAN technology plays in managing vast network infrastructures.
According to Cisco, the exploits are linked to a threat actor monitored under the designation UAT-8616. This group has previously engaged in similar attacks on the SD-WAN ecosystem as far back as 2023. While the recent vulnerability involves a different aspect of the networking service, the executive steps taken by the attackers appear to follow a familiar pattern of exploitation observed in earlier incidents.
Cisco’s threat intelligence team, Talos, asserted that the UAT-8616 group had attempted several malicious actions, including the addition of SSH keys, modifications to NETCONF configurations, and escalation to root privileges. This indicates a deliberate and calculated strategy aimed at gaining deeper access to critical network systems.
The implications of this vulnerability extend beyond individual companies; UAT-8616 is known to target critical infrastructure sectors, raising alarms about its potential consequences. Notably, their operational infrastructure overlaps with the operational relay box (ORB) networks, which are monitored by Cisco Talos. These ORB networks consist of servers and compromised internet-connected devices linked to broader surveillance or espionage efforts, often attributed to state-sponsored actors.
Cybersecurity firm Rapid7 uncovered the current exploit while proactively investigating prior vulnerabilities associated with Cisco’s SD-WAN technology. They highlighted that multiple ports are exposed due to this flaw, particularly UDP port 12346. This port serves as the control-plane peering channel utilized by vdaemon, which facilitates trusted communication between controllers and edge devices within the network.
Researchers Jonah Burgess and Stephen Fewer from Rapid7 elaborated on the gravity of the situation, explaining that UDP port 12346 is essential for carrying Overlay Management Protocol (OMP) messages, including crucial data such as route advertisements and Transport Locations (TLOC) tables. They conveyed that compromising this service equates to compromising the entire network landscape, which can have far-reaching consequences for organizations reliant on this technology.
In light of the exploit’s discovery, Cisco confirmed that there has been limited exploitation of the vulnerability so far, advising customers to upgrade to secure software releases to mitigate risks. This ongoing exploit saga unfolds amid Cisco’s recent announcements of significant company changes, including a workforce reduction of 4,000 employees. The timing raises questions about the management of cybersecurity threats, demonstrating the precarious balance companies must maintain while navigating economic challenges.
Furthermore, Cisco identifies other vulnerabilities tied to SD-WAN, such as CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122. These vulnerabilities have also been exploited since March, particularly following the release of public proof-of-concept (PoC) code. The company stated that these issues could allow attackers to breach affected systems, elevate privileges to root, access sensitive information, and overwrite arbitrary files.
This situation underscores the critical need for organizations to remain vigilant, continually update their security protocols, and promptly address emerging vulnerabilities. In an era where cybersecurity threats are both sophisticated and widespread, the implications of unpatched vulnerabilities can be catastrophic, not only for businesses but also for broader societal infrastructure. The urgency surrounding CVE-2026-20182 reflects this pressing reality as organizations rush to fortify their defenses against an ever-evolving threat landscape.
