CISA Adds Critical Cisco SD-WAN Vulnerability to KEV Catalog: Urgent Remediation Required
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN systems to its Known Exploited Vulnerabilities (KEV) catalog. This move signals that the flaw is being actively exploited in the wild, prompting an immediate mandate for Federal Civilian Executive Branch (FCEB) agencies to remediate the issue by May 17, 2026.
The vulnerability, tracked as CVE-2026-20182, carries a maximum severity rating of 10.0 on the CVSS scoring system. This score reflects the extreme risk posed to organizations using affected Cisco Catalyst SD-WAN Controllers and Managers, as it allows unauthorized actors to seize complete administrative control over the system.
Understanding CVE-2026-20182: The Authentication Bypass
At its core, CVE-2026-20182 is an authentication bypass vulnerability. In a secure system, authentication acts as a gatekeeper, ensuring only verified users can access sensitive settings. This flaw effectively removes that gate, allowing a remote, unauthenticated attacker to bypass security checks and obtain full administrative privileges.

Because the SD-WAN Controller and Manager act as the “brains” of a software-defined network, gaining administrative access here is catastrophic. An attacker with these privileges can monitor traffic, redirect data, or disable security protocols across the entire network infrastructure.
Threat Actor Profile: The Role of UAT-8616
Cisco has attributed the active exploitation of this vulnerability to a threat cluster known as UAT-8616. This is not the first time this group has targeted SD-WAN systems; Cisco Talos noted that UAT-8616 previously weaponized CVE-2026-20127 to achieve similar unauthorized access.
Once UAT-8616 gains entry via CVE-2026-20182, they follow a specific post-compromise playbook to maintain persistence and deepen their control:
- SSH Key Injection: The attackers attempt to add their own SSH keys to ensure they can return to the system even if passwords are changed.
- Configuration Manipulation: They modify NETCONF configurations to alter how the network operates.
- Privilege Escalation: The group works to escalate their access to root privileges, the highest level of control possible on a Linux-based system.
Further analysis indicates that the infrastructure used by UAT-8616 overlaps with Operational Relay Box (ORB) networks, which are often used by sophisticated actors to mask their true origin and evade detection.
The Danger of “Vulnerability Chaining”
While CVE-2026-20182 is the current focus, it is part of a broader pattern of attacks. Since March 2026, cybersecurity researchers have observed multiple threat clusters exploiting a series of other vulnerabilities, including CVE-2026-20133, CVE-2026-20128, and CVE-2026-20122.
These vulnerabilities are particularly dangerous when “chained” together. Vulnerability chaining occurs when an attacker uses one flaw to get a foot in the door and then uses subsequent flaws to move laterally or escalate privileges. In this case, chaining these specific vulnerabilities allows a remote, unauthenticated attacker to gain full unauthorized access to the device.
Key Takeaways for Network Administrators
- Immediate Deadline: FCEB agencies must remediate the flaw by May 17, 2026. Private sector organizations should treat this as an urgent priority.
- Maximum Severity: The CVSS 10.0 score indicates that the vulnerability is uncomplicated to exploit and has a devastating impact.
- Targeted Systems: The flaw specifically impacts the Cisco Catalyst SD-WAN Controller, and Manager.
- Indicator of Compromise: Monitor for unauthorized SSH key additions or unexpected changes to NETCONF configurations.
Frequently Asked Questions
What is the KEV catalog?
The Known Exploited Vulnerabilities (KEV) catalog is a list maintained by CISA that tracks vulnerabilities that have been confirmed as exploited in the wild. When a flaw is added to this list, it often triggers mandatory patching deadlines for government agencies.

Why is a 10.0 CVSS score significant?
The Common Vulnerability Scoring System (CVSS) ranges from 0 to 10. A 10.0 is the highest possible score, meaning the vulnerability is critical, can be exploited remotely without user interaction, and provides the attacker with full control over the affected system.
How does UAT-8616 differ from other threat actors?
UAT-8616 is characterized by its focus on SD-WAN infrastructure and its use of ORB networks to hide its activity. Their methodical approach to adding SSH keys and modifying NETCONF configurations shows a high level of sophistication and a goal of long-term persistence.