InSEKurity of the Week (CW13/2026): Cisco Catalyst SD-WAN Manager Authentication Bypass (CVE-2026-20129)
Critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Manager actively exploited - Unauthenticated access with netadmin privileges possible
This week in our InSEKurity of the Week series: A critical authentication bypass vulnerability in Cisco Catalyst SD-WAN Manager that is already being actively exploited by attackers, enabling unauthenticated access with administrator privileges.
π¨ Summary
- CVE ID: CVE-2026-20129
- CVSS 3.1 Score: 9.8 (Critical)
- CWE: CWE-287 (Improper Authentication)
- Affected Software: Cisco Catalyst SD-WAN Manager (formerly vManage)
- Attack Vector: Network (Unauthenticated Remote Attack)
- Authentication Required: None
- Impact: Full access with netadmin role
- Patch Status: β Available (Release 20.18+)
- Published: March 2026
- Status: β οΈ Actively Exploited
π What is Cisco Catalyst SD-WAN Manager?
Cisco Catalyst SD-WAN Manager (formerly Cisco vManage) is the central management and orchestration platform for Ciscoβs Software-Defined Wide Area Network (SD-WAN) solution. The platform enables organizations to centrally manage, configure, and monitor their entire WAN network through a single web-based interface.
Typical Use Cases
- Centralized Network Management: Configuration and management of all SD-WAN devices (vEdge, cEdge routers)
- Policy Management: Definition and enforcement of network and security policies
- Traffic Engineering: Control and optimization of network traffic across multiple WAN links
- Monitoring and Analytics: Real-time monitoring of network health and performance
- Zero-Touch Provisioning: Automatic deployment of new branch sites
These systems form the nerve center of modern enterprise networks and control all data traffic between sites, cloud services, and data centers.
π Technical Analysis
Vulnerability Description
CVE-2026-20129 is an authentication bypass vulnerability in the API authentication mechanism of Cisco Catalyst SD-WAN Manager. The vulnerability arises from improper validation of API requests, allowing unauthenticated attackers to bypass the entire authentication mechanism and gain direct access with the netadmin role.
Root Cause Analysis
The vulnerability is based on:
- Improper API Authentication: The authentication mechanism fails to correctly validate incoming API requests
- Improper Authentication (CWE-287): Specially crafted requests can completely bypass the intended authentication checks
- Direct Privilege Escalation: Successful exploitation immediately grants netadmin privileges - no prior authentication or step-by-step escalation required
Attack Vector
A typical attack proceeds as follows:
# Step 1: Attacker identifies a vulnerable SD-WAN Manager instance
# The management interface is accessible via HTTPS (default port 8443)
# Step 2: Attacker sends crafted API requests
# These bypass the authentication mechanism
POST /dataservice/system/device/controllers HTTP/1.1
Host: sdwan-manager.example.com:8443
Content-Type: application/json
# The crafted request bypasses the authentication logic
# and is processed as a netadmin user
# Step 3: Attacker gains full API access
# with netadmin privileges - without any credentials
# Step 4: Attacker can now control the entire SD-WAN network
# Configuration changes, policy manipulation, traffic redirection
Concrete Impacts:
- Complete Network Control: Takeover of the entire SD-WAN fabric
- Traffic Manipulation: Redirection or interception of all WAN traffic
- Configuration Changes: Manipulation of routing policies and security rules
- Data Exfiltration: Access to configurations, credentials, and network data
- Lateral Movement: Pivot point into all connected branch sites and cloud environments
- Persistence: Establishment of backdoors via manipulated device templates
β οΈ Impact Assessment
Immediate Impact
- Netadmin Compromise: Full control over the SD-WAN infrastructure
- No Authentication Required: Maximum attack surface for external attackers
- No Workarounds: Only upgrading to version 20.18+ provides protection
- Business-Critical: SD-WAN is the backbone of modern enterprise networks
Affected Environments
Particularly at risk:
- Large Enterprises and Corporations: With distributed sites and centralized SD-WAN management
- Managed Service Providers: Operating SD-WAN as a service for customers
- Government and Critical Infrastructure: With sensitive network requirements
- Financial Services: With strict compliance requirements for network security
- Healthcare: With regulated data protection requirements
Attacker Profiles
The vulnerability is attractive for:
- APT Groups: For long-term network infiltration and espionage
- Ransomware Operators: For maximum reach across all branch sites
- Nation-State Actors: For strategic network manipulation
- Cybercriminals: For data theft and extortion
π‘οΈ Mitigation Strategies
Immediate Actions (Priority 1) β‘
β οΈ CRITICAL: This vulnerability is being actively exploited - immediate action required!
-
Check Version:
# Check SD-WAN Manager version show version # Via Web Interface: Administration > Settings > Controller > Version # All versions prior to 20.18 are affected -
Perform Upgrade:
- Upgrade to Cisco Catalyst SD-WAN Manager Release 20.18 or later
- Download from the Cisco Software Download Center
- There are no workarounds - only the upgrade protects against exploitation
-
Restrict Network Access:
# Make management interface only accessible from trusted networks # Configure ACL on the SD-WAN Manager # Example: Firewall rule for management access iptables -A INPUT -p tcp --dport 8443 -s 10.0.0.0/8 -j ACCEPT iptables -A INPUT -p tcp --dport 8443 -j DROP -
Prepare Incident Response:
# Check API access logs for suspicious activity # Logs are located by default at: # /var/log/nms/vmanage-server.log # Search for unauthenticated API access grep -i "authentication\|unauthorized\|dataservice" /var/log/nms/vmanage-server.log # Verify user accounts and roles # Via API: GET /dataservice/admin/user
Detection Measures π
Indicators of Compromise (IoCs):
# Suspicious API access without prior authentication
grep -E "dataservice" /var/log/nms/vmanage-server.log | grep -v "authenticated"
# New or modified admin accounts
# Check via the vManage API
curl -k https://sdwan-manager:8443/dataservice/admin/user
# Unexpected configuration changes
# Check audit log for device template changes
# Unusual network connections to management port
netstat -antp | grep 8443 | grep ESTABLISHED
SIEM Rules:
- Monitor API requests to
/dataservice/without prior session authentication - Alert on new admin or netadmin accounts
- Monitor configuration changes to device templates
- Log unusual access to the management port (8443)
- Detect mass API calls from unknown IP addresses
Long-term Security Improvements
- Patch Management Process: Automated upgrade pipeline for SD-WAN infrastructure
- Network Access Control: Zero-trust architecture for management access
- API Security: Implementation of additional API gateway controls
- Monitoring & Logging: Centralized security monitoring of all SD-WAN components
- Segmentation: Strict management plane isolation from data plane
π― Why is this Critical?
- CVSS 9.8 - Critical: Maximum severity rating
- No Authentication Required: Any network participant can attack
- Active Exploitation: Attackers are already actively exploiting the vulnerability
- Netadmin Access: Full control over the entire SD-WAN network
- No Workarounds: Only an upgrade provides protection
- Wide Deployment: Cisco is market leader in the SD-WAN segment
- Cascade Effect: Compromise of the SD-WAN Manager affects all connected branch sites
π Timeline and Disclosure
- Active Exploitation: Confirmed March 2026
- Patch Release: Release 20.18
- CVE Assignment: CVE-2026-20129
- Public Disclosure: March 2026 (Cisco Security Advisory)
- Cisco Advisory ID: cisco-sa-sdwan-rpa-EHchtZk
π Resources and References
- CVE: CVE-2026-20129
- NVD: CVE-2026-20129
- Cisco Security Advisory: cisco-sa-sdwan-rpa-EHchtZk
- CWE: CWE-287: Improper Authentication
- Cisco PSIRT: Product Security Incident Response Team
πΌ SEKurity Supports You
This critical authentication bypass vulnerability impressively demonstrates how quickly central network infrastructure can be compromised. A single unauthenticated API call can be enough to take control of an entire enterprise network.
Our Services
- Penetration Testing: Web applications, mobile apps (Android & iOS), SAP systems, Active Directory
- Large-Scale Attacks: Perimeter testing, IT infrastructure testing, Red Team engagements
- Security Awareness: Phishing campaigns, hacking demonstrations
Act now β before attackers do.
Contact:
π Website: www.sekurity.de
π§ Inquiries: www.sekurity.de/kontakt
π± LinkedIn: SEKurity GmbH
Your SEKurity Team β Your Trusted Adversaries
Your network infrastructure security is our drive.
Sources
- Cisco Security Advisory: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability
- CVE-2026-20129: Cisco SD-WAN Auth Bypass Vulnerability - SentinelOne
- Cisco Catalyst SD-WAN Manager API Auth Bypass (CVE-2026-20129) - TheHackerWire
- Multiple Vulnerabilities in Cisco Catalyst SD-WAN Products - CIS Advisory
- Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities - The Hacker News
About the Author
SEKurity Team
Offensive Security Experts
The SEKurity GmbH team consists of experienced penetration testers, security researchers, and cybersecurity consultants. Under the motto 'Your Trusted Adversaries', we support organizations in evaluating their IT security from an attacker's perspective and improving it.
Related Articles
InSEKurity of the Week (CW04/2026): Cisco Unified Communications Manager Zero-Day (CVE-2026-20045)
Critical zero-day vulnerability in Cisco Unified Communications Manager and Webex actively exploited - Root access via code injection possible
InSEKurity of the Week (CW07/2026): Windows Shell SmartScreen Bypass Zero-Day (CVE-2026-21510)
Critical zero-day vulnerability in Windows Shell allows attackers to bypass SmartScreen and Mark of the Web protections through a single malicious click
InSEKurity of the Week (CW06/2026): OpenClaw AI Agent 1-Click RCE (CVE-2026-25253)
Critical vulnerability in OpenClaw AI Agent enables Remote Code Execution with just one click - Authentication token exfiltration through manipulated URLs