SEKurity GmbH Logo
CVE Research

InSEKurity of the Week (CW13/2026): Cisco Catalyst SD-WAN Manager Authentication Bypass (CVE-2026-20129)

Critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Manager actively exploited - Unauthenticated access with netadmin privileges possible

SEKurity Team

Offensive Security Experts

7 min read
Share:

This week in our InSEKurity of the Week series: A critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Manager that is already being actively exploited by attackers, enabling unauthenticated access with administrator privileges.

🚨 Summary

  • CVE ID: CVE-2026-20129
  • CVSS 3.1 Score: 9.8 (Critical)
  • CWE: CWE-287 (Improper Authentication)
  • Affected Software: Cisco Catalyst SD-WAN Manager (formerly vManage)
  • Attack Vector: Network (Unauthenticated Remote Attack)
  • Authentication Required: None
  • Impact: Full access with netadmin role
  • Patch Status: βœ… Available (Release 20.18+)
  • Published: March 2026
  • Status: ⚠️ Actively Exploited

🌐 What is Cisco Catalyst SD-WAN Manager?

Cisco Catalyst SD-WAN Manager (formerly Cisco vManage) is the central management and orchestration platform for Cisco’s Software-Defined Wide Area Network (SD-WAN) solution. The platform enables organizations to centrally manage, configure, and monitor their entire WAN network through a single web-based interface.

Typical Use Cases

  • Centralized Network Management: Configuration and management of all SD-WAN devices (vEdge, cEdge routers)
  • Policy Management: Definition and enforcement of network and security policies
  • Traffic Engineering: Control and optimization of network traffic across multiple WAN links
  • Monitoring and Analytics: Real-time monitoring of network health and performance
  • Zero-Touch Provisioning: Automatic deployment of new branch sites

These systems form the nerve center of modern enterprise networks and control all data traffic between sites, cloud services, and data centers.

πŸ” Technical Analysis

Vulnerability Description

CVE-2026-20129 is an authentication bypass vulnerability in the API authentication mechanism of Cisco Catalyst SD-WAN Manager. The vulnerability arises from improper validation of API requests, allowing unauthenticated attackers to bypass the entire authentication mechanism and gain direct access with the netadmin role.

Root Cause Analysis

The vulnerability is based on:

  1. Improper API Authentication: The authentication mechanism fails to correctly validate incoming API requests
  2. Improper Authentication (CWE-287): Specially crafted requests can completely bypass the intended authentication checks
  3. Direct Privilege Escalation: Successful exploitation immediately grants netadmin privileges - no prior authentication or step-by-step escalation required

Attack Vector

A typical attack proceeds as follows:

# Step 1: Attacker identifies a vulnerable SD-WAN Manager instance
# The management interface is accessible via HTTPS (default port 8443)

# Step 2: Attacker sends crafted API requests
# These bypass the authentication mechanism

POST /dataservice/system/device/controllers HTTP/1.1
Host: sdwan-manager.example.com:8443
Content-Type: application/json

# The crafted request bypasses the authentication logic
# and is processed as a netadmin user

# Step 3: Attacker gains full API access
# with netadmin privileges - without any credentials

# Step 4: Attacker can now control the entire SD-WAN network
# Configuration changes, policy manipulation, traffic redirection

Concrete Impacts:

  1. Complete Network Control: Takeover of the entire SD-WAN fabric
  2. Traffic Manipulation: Redirection or interception of all WAN traffic
  3. Configuration Changes: Manipulation of routing policies and security rules
  4. Data Exfiltration: Access to configurations, credentials, and network data
  5. Lateral Movement: Pivot point into all connected branch sites and cloud environments
  6. Persistence: Establishment of backdoors via manipulated device templates

⚠️ Impact Assessment

Immediate Impact

  • Netadmin Compromise: Full control over the SD-WAN infrastructure
  • No Authentication Required: Maximum attack surface for external attackers
  • No Workarounds: Only upgrading to version 20.18+ provides protection
  • Business-Critical: SD-WAN is the backbone of modern enterprise networks

Affected Environments

Particularly at risk:

  • Large Enterprises and Corporations: With distributed sites and centralized SD-WAN management
  • Managed Service Providers: Operating SD-WAN as a service for customers
  • Government and Critical Infrastructure: With sensitive network requirements
  • Financial Services: With strict compliance requirements for network security
  • Healthcare: With regulated data protection requirements

Attacker Profiles

The vulnerability is attractive for:

  • APT Groups: For long-term network infiltration and espionage
  • Ransomware Operators: For maximum reach across all branch sites
  • Nation-State Actors: For strategic network manipulation
  • Cybercriminals: For data theft and extortion

πŸ›‘οΈ Mitigation Strategies

Immediate Actions (Priority 1) ⚑

⚠️ CRITICAL: This vulnerability is being actively exploited - immediate action required!

  1. Check Version:

    # Check SD-WAN Manager version
    show version
    
    # Via Web Interface: Administration > Settings > Controller > Version
    # All versions prior to 20.18 are affected
  2. Perform Upgrade:

    • Upgrade to Cisco Catalyst SD-WAN Manager Release 20.18 or later
    • Download from the Cisco Software Download Center
    • There are no workarounds - only the upgrade protects against exploitation
  3. Restrict Network Access:

    # Make management interface only accessible from trusted networks
    # Configure ACL on the SD-WAN Manager
    
    # Example: Firewall rule for management access
    iptables -A INPUT -p tcp --dport 8443 -s 10.0.0.0/8 -j ACCEPT
    iptables -A INPUT -p tcp --dport 8443 -j DROP
  4. Prepare Incident Response:

    # Check API access logs for suspicious activity
    # Logs are located by default at:
    # /var/log/nms/vmanage-server.log
    
    # Search for unauthenticated API access
    grep -i "authentication\|unauthorized\|dataservice" /var/log/nms/vmanage-server.log
    
    # Verify user accounts and roles
    # Via API: GET /dataservice/admin/user

Detection Measures πŸ”

Indicators of Compromise (IoCs):

# Suspicious API access without prior authentication
grep -E "dataservice" /var/log/nms/vmanage-server.log | grep -v "authenticated"

# New or modified admin accounts
# Check via the vManage API
curl -k https://sdwan-manager:8443/dataservice/admin/user

# Unexpected configuration changes
# Check audit log for device template changes

# Unusual network connections to management port
netstat -antp | grep 8443 | grep ESTABLISHED

SIEM Rules:

  • Monitor API requests to /dataservice/ without prior session authentication
  • Alert on new admin or netadmin accounts
  • Monitor configuration changes to device templates
  • Log unusual access to the management port (8443)
  • Detect mass API calls from unknown IP addresses

Long-term Security Improvements

  1. Patch Management Process: Automated upgrade pipeline for SD-WAN infrastructure
  2. Network Access Control: Zero-trust architecture for management access
  3. API Security: Implementation of additional API gateway controls
  4. Monitoring & Logging: Centralized security monitoring of all SD-WAN components
  5. Segmentation: Strict management plane isolation from data plane

🎯 Why is this Critical?

  1. CVSS 9.8 - Critical: Maximum severity rating
  2. No Authentication Required: Any network participant can attack
  3. Active Exploitation: Attackers are already actively exploiting the vulnerability
  4. Netadmin Access: Full control over the entire SD-WAN network
  5. No Workarounds: Only an upgrade provides protection
  6. Wide Deployment: Cisco is market leader in the SD-WAN segment
  7. Cascade Effect: Compromise of the SD-WAN Manager affects all connected branch sites

πŸš€ Timeline and Disclosure

  • Active Exploitation: Confirmed March 2026
  • Patch Release: Release 20.18
  • CVE Assignment: CVE-2026-20129
  • Public Disclosure: March 2026 (Cisco Security Advisory)
  • Cisco Advisory ID: cisco-sa-sdwan-rpa-EHchtZk

πŸ”— Resources and References

πŸ’Ό SEKurity Supports You

This critical authentication bypass vulnerability impressively demonstrates how quickly central network infrastructure can be compromised. A single unauthenticated API call can be enough to take control of an entire enterprise network.

Our Services

  • Penetration Testing: Web applications, mobile apps (Android & iOS), SAP systems, Active Directory
  • Large-Scale Attacks: Perimeter testing, IT infrastructure testing, Red Team engagements
  • Security Awareness: Phishing campaigns, hacking demonstrations

Act now – before attackers do.


Contact:

🌐 Website: www.sekurity.de

πŸ“§ Inquiries: www.sekurity.de/kontakt

πŸ“± LinkedIn: SEKurity GmbH


Your SEKurity Team – Your Trusted Adversaries

Your network infrastructure security is our drive.


Sources

About the Author

SEKurity Team

Offensive Security Experts

The SEKurity GmbH team consists of experienced penetration testers, security researchers, and cybersecurity consultants. Under the motto 'Your Trusted Adversaries', we support organizations in evaluating their IT security from an attacker's perspective and improving it.

Related Articles