Cisco SD-WAN Controller: Auth Bypass via Peering Auth (CVE-2026-20127)
CVE-2026-20127 Published on February 25, 2026
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability
A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system.
This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.
Known Exploited Vulnerability
This Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affec.
The following remediation steps are recommended / required by February 27, 2026: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (
Vulnerability Analysis
CVE-2026-20127 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. This vulnerability is known to be actively exploited by threat actors in an automatable fashion. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
What is an authentification Vulnerability?
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
CVE-2026-20127 has been classified to as an authentification vulnerability or weakness.
Products Associated with CVE-2026-20127
Want to know whenever a new CVE is published for Cisco Catalyst Sd Wan Manager? stack.watch will email you.
Affected Versions
Cisco Catalyst SD-WAN Manager:- Version 20.1.12 is affected.
- Version 19.2.1 is affected.
- Version 18.4.4 is affected.
- Version 18.4.5 is affected.
- Version 20.1.1.1 is affected.
- Version 20.1.1 is affected.
- Version 19.3.0 is affected.
- Version 19.2.2 is affected.
- Version 19.2.099 is affected.
- Version 18.3.6 is affected.
- Version 18.3.7 is affected.
- Version 19.2.0 is affected.
- Version 18.3.8 is affected.
- Version 19.0.0 is affected.
- Version 19.1.0 is affected.
- Version 18.4.302 is affected.
- Version 18.4.303 is affected.
- Version 19.2.097 is affected.
- Version 19.2.098 is affected.
- Version 17.2.10 is affected.
- Version 18.3.6.1 is affected.
- Version 19.0.1a is affected.
- Version 18.2.0 is affected.
- Version 18.4.3 is affected.
- Version 18.4.1 is affected.
- Version 17.2.8 is affected.
- Version 18.3.3.1 is affected.
- Version 18.4.0 is affected.
- Version 18.3.1 is affected.
- Version 17.2.6 is affected.
- Version 17.2.9 is affected.
- Version 18.3.4 is affected.
- Version 17.2.5 is affected.
- Version 18.3.1.1 is affected.
- Version 18.3.5 is affected.
- Version 18.4.0.1 is affected.
- Version 18.3.3 is affected.
- Version 17.2.7 is affected.
- Version 17.2.4 is affected.
- Version 18.3.0 is affected.
- Version 19.2.3 is affected.
- Version 18.4.501_ES is affected.
- Version 20.3.1 is affected.
- Version 20.1.2 is affected.
- Version 19.2.929 is affected.
- Version 19.2.31 is affected.
- Version 20.3.2 is affected.
- Version 19.2.32 is affected.
- Version 20.3.2_925 is affected.
- Version 20.3.2.1 is affected.
- Version 20.3.2.1_927 is affected.
- Version 18.4.6 is affected.
- Version 20.1.2_937 is affected.
- Version 20.4.1 is affected.
- Version 20.3.2_928 is affected.
- Version 20.3.2_929 is affected.
- Version 20.4.1.0.1 is affected.
- Version 20.3.2.1_930 is affected.
- Version 19.2.4 is affected.
- Version 20.5.0.1.1 is affected.
- Version 20.4.1.1 is affected.
- Version 20.3.3 is affected.
- Version 19.2.4.0.1 is affected.
- Version 20.3.2_937 is affected.
- Version 20.3.3.1 is affected.
- Version 20.5.1 is affected.
- Version 20.1.3 is affected.
- Version 20.3.3.0.4 is affected.
- Version 20.3.3.1.2 is affected.
- Version 20.3.3.1.1 is affected.
- Version 20.4.1.2 is affected.
- Version 20.3.3.0.2 is affected.
- Version 20.4.1.1.5 is affected.
- Version 20.4.1.0.01 is affected.
- Version 20.4.1.0.02 is affected.
- Version 20.3.3.1.7 is affected.
- Version 20.3.3.1.5 is affected.
- Version 20.5.1.0.1 is affected.
- Version 20.3.3.1.10 is affected.
- Version 20.3.3.0.8 is affected.
- Version 20.4.2 is affected.
- Version 20.4.2.0.1 is affected.
- Version 20.3.4 is affected.
- Version 20.3.3.0.14 is affected.
- Version 19.2.4.0.8 is affected.
- Version 19.2.4.0.9 is affected.
- Version 20.3.4.0.1 is affected.
- Version 20.3.2.0.5 is affected.
- Version 20.6.1 is affected.
- Version 20.5.1.0.2 is affected.
- Version 20.3.3.0.17 is affected.
- Version 20.6.1.1 is affected.
- Version 20.6.0.18.3 is affected.
- Version 20.3.2.0.6 is affected.
- Version 20.6.0.18.4 is affected.
- Version 20.4.2.0.2 is affected.
- Version 20.3.3.0.16 is affected.
- Version 20.3.4.0.5 is affected.
- Version 20.6.1.0.1 is affected.
- Version 20.3.4.0.6 is affected.
- Version 20.6.2 is affected.
- Version 20.7.1EFT2 is affected.
- Version 20.3.4.0.9 is affected.
- Version 20.3.4.0.11 is affected.
- Version 20.4.2.0.4 is affected.
- Version 20.3.3.0.18 is affected.
- Version 20.7.1 is affected.
- Version 20.6.2.1 is affected.
- Version 20.3.4.1 is affected.
- Version 20.5.1.1 is affected.
- Version 20.4.2.1 is affected.
- Version 20.4.2.1.1 is affected.
- Version 20.3.4.1.1 is affected.
- Version 20.3.813 is affected.
- Version 20.3.4.0.19 is affected.
- Version 20.4.2.2.1 is affected.
- Version 20.5.1.2 is affected.
- Version 20.3.4.2 is affected.
- Version 20.3.814 is affected.
- Version 20.4.2.2 is affected.
- Version 20.6.2.2 is affected.
- Version 20.3.4.2.1 is affected.
- Version 20.7.1.1 is affected.
- Version 20.3.4.1.2 is affected.
- Version 20.6.2.2.2 is affected.
- Version 20.3.4.0.20 is affected.
- Version 20.6.2.2.3 is affected.
- Version 20.4.2.2.2 is affected.
- Version 20.3.5 is affected.
- Version 20.6.2.0.4 is affected.
- Version 20.4.2.2.3 is affected.
- Version 20.3.4.0.24 is affected.
- Version 20.6.2.2.7 is affected.
- Version 20.6.3 is affected.
- Version 20.3.4.2.2 is affected.
- Version 20.4.2.2.4 is affected.
- Version 20.7.1.0.2 is affected.
- Version 20.8.1 is affected.
- Version 20.3.5.0.8 is affected.
- Version 20.3.5.0.9 is affected.
- Version 20.4.2.2.8 is affected.
- Version 20.3.5.0.7 is affected.
- Version 20.6.3.0.7 is affected.
- Version 20.6.3.0.5 is affected.
- Version 20.6.3.0.10 is affected.
- Version 20.6.3.0.2 is affected.
- Version 20.7.2 is affected.
- Version 20.9.1EFT2 is affected.
- Version 20.6.3.0.11 is affected.
- Version 20.6.3.1 is affected.
- Version 20.6.3.0.14 is affected.
- Version 20.6.4 is affected.
- Version 20.9.1 is affected.
- Version 20.6.3.0.19 is affected.
- Version 20.6.3.0.18 is affected.
- Version 20.3.6 is affected.
- Version 20.9.1.1 is affected.
- Version 20.6.3.0.23 is affected.
- Version 20.6.4.0.4 is affected.
- Version 20.6.3.0.25 is affected.
- Version 20.6.5 is affected.
- Version 20.6.3.0.27 is affected.
- Version 20.9.2 is affected.
- Version 20.9.2.1 is affected.
- Version 20.6.3.0.29 is affected.
- Version 20.6.3.0.31 is affected.
- Version 20.6.3.0.32 is affected.
- Version 20.10.1 is affected.
- Version 20.6.3.0.33 is affected.
- Version 20.9.2.0.01 is affected.
- Version 20.9.1_LI_Images is affected.
- Version 20.10.1_LI_Images is affected.
- Version 20.9.2_LI_Images is affected.
- Version 20.3.7 is affected.
- Version 20.9.3 is affected.
- Version 20.6.5.1 is affected.
- Version 20.11.1 is affected.
- Version 20.11.1_LI_Images is affected.
- Version 20.9.3_LI_ Images is affected.
- Version 20.6.3.1.1 is affected.
- Version 20.9.3.0.2 is affected.
- Version 20.6.5.1.2 is affected.
- Version 20.9.3.0.3 is affected.
- Version 20.4.2.3 is affected.
- Version 20.6.3.2 is affected.
- Version 20.6.4.1 is affected.
- Version 20.6.3.0.38 is affected.
- Version 20.6.3.0.39 is affected.
- Version 20.3.5.1 is affected.
- Version 20.3.4.3 is affected.
- Version 20.9.3.1 is affected.
- Version 20.3.3.2 is affected.
- Version 20.6.5.2 is affected.
- Version 20.3.7.1 is affected.
- Version 20.10.1.1 is affected.
- Version 20.6.5.2.1 is affected.
- Version 20.3.4.0.25 is affected.
- Version 20.6.2.2.4 is affected.
- Version 20.6.1.2 is affected.
- Version 20.11.1.1 is affected.
- Version 20.9.3.0.5 is affected.
- Version 20.3.4.0.26 is affected.
- Version 20.6.5.1.3 is affected.
- Version 20.6.3.0.40 is affected.
- Version 20.1.3.1 is affected.
- Version 20.9.2.2 is affected.
- Version 20.6.5.2.3 is affected.
- Version 20.6.5.1.4 is affected.
- Version 20.6.5.3 is affected.
- Version 20.6.3.0.41 is affected.
- Version 20.9.3.0.7 is affected.
- Version 20.6.5.1.5 is affected.
- Version 20.9.3.0.4 is affected.
- Version 20.6.4.0.19 is affected.
- Version 20.6.5.1.6 is affected.
- Version 20.9.3.0.8 is affected.
- Version 20.6.3.3 is affected.
- Version 20.3.7.2 is affected.
- Version 20.6.5.4 is affected.
- Version 20.6.5.1.7 is affected.
- Version 20.9.3.0.12 is affected.
- Version 20.6.4.2 is affected.
- Version 20.6.5.5 is affected.
- Version 20.9.3.2 is affected.
- Version 20.11.1.2 is affected.
- Version 20.6.3.4 is affected.
- Version 20.10.1.2 is affected.
- Version 20.6.5.1.9 is affected.
- Version 20.9.3.0.16 is affected.
- Version 20.6.3.0.45 is affected.
- Version 20.6.5.1.10 is affected.
- Version 20.9.3.0.17 is affected.
- Version 20.6.5.2.4 is affected.
- Version 20.6.4.0.21 is affected.
- Version 20.9.3.0.18 is affected.
- Version 20.6.3.0.46 is affected.
- Version 20.6.3.0.47 is affected.
- Version 20.9.2.3 is affected.
- Version 20.9.3.2_LI_Images is affected.
- Version 20.9.3.0.21 is affected.
- Version 20.9.3.0.20 is affected.
- Version 20.9.4_LI_Images is affected.
- Version 20.9.4 is affected.
- Version 20.6.5.1.11 is affected.
- Version 20.12.1 is affected.
- Version 20.12.1_LI_Images is affected.
- Version 20.6.5.1.13 is affected.
- Version 20.9.3.0.23 is affected.
- Version 20.6.5.2.8 is affected.
- Version 20.9.4.1 is affected.
- Version 20.9.4.1_LI_Images is affected.
- Version 20.9.3.0.25 is affected.
- Version 20.9.3.0.24 is affected.
- Version 20.6.5.1.14 is affected.
- Version 20.3.8 is affected.
- Version 20.6.6 is affected.
- Version 20.9.3.0.26 is affected.
- Version 20.6.3.0.51 is affected.
- Version 20.9.3.0.29 is affected.
- Version 20.12.2 is affected.
- Version 20.12.2_LI_Images is affected.
- Version 20.6.6.0.1 is affected.
- Version 20.13.1_LI_Images is affected.
- Version 20.9.4.0.4 is affected.
- Version 20.13.1 is affected.
- Version 20.9.4.1.1 is affected.
- Version 20.9.5 is affected.
- Version 20.9.5_LI_Images is affected.
- Version 20.12.3_LI_Images is affected.
- Version 20.12.3 is affected.
- Version 20.9.4.1.3 is affected.
- Version 20.6.7 is affected.
- Version 20.9.5.1 is affected.
- Version 20.9.5.1_LI_Images is affected.
- Version 20.9.4.1.6 is affected.
- Version 20.14.1 is affected.
- Version 20.14.1_LI_Images is affected.
- Version 20.9.5.2 is affected.
- Version 20.9.5.2.1 is affected.
- Version 20.9.5.2_LI_Images is affected.
- Version 20.12.3.1 is affected.
- Version 20.12.4 is affected.
- Version 20.15.1_LI_Images is affected.
- Version 20.15.1 is affected.
- Version 20.9.5.1.4 is affected.
- Version 20.9.5.2.7 is affected.
- Version 20.9.5.2.13 is affected.
- Version 20.9.6 is affected.
- Version 20.9.6_LI_Images is affected.
- Version 20.9.5.2.14 is affected.
- Version 20.6.8 is affected.
- Version 20.12.4.0.03 is affected.
- Version 20.16.1 is affected.
- Version 20.16.1_LI_Images is affected.
- Version 20.12.4_LI_Images is affected.
- Version 20.9.5.2.16 is affected.
- Version 20.12.4.0.4 is affected.
- Version 20.12.401 is affected.
- Version 20.9.5.3 is affected.
- Version 20.9.5.3_LI_Images is affected.
- Version 20.12.4.1_LI_Images is affected.
- Version 20.12.4.1 is affected.
- Version 20.9.5.2.21 is affected.
- Version 20.9.6.0.3 is affected.
- Version 20.12.4.0.6 is affected.
- Version 20.15.2_LI_Images is affected.
- Version 20.15.2 is affected.
- Version 20.12.4_Monthly_ES5 is affected.
- Version 20.12.5 is affected.
- Version 20.12.5_LI_Images is affected.
- Version 20.9.7_LI _Images is affected.
- Version 20.9.7 is affected.
- Version 20.15.3 is affected.
- Version 20.15.3_ LI _Images is affected.
- Version 20.12.501 is affected.
- Version 20.12.5.1_LI_Images is affected.
- Version 20.12.5.1 is affected.
- Version 20.12.5.2_LI_Images is affected.
- Version 20.12.5.2 is affected.
- Version 20.15.3.1 is affected.
- Version 20.15.4_LI_Images is affected.
- Version 20.15.4 is affected.
- Version 20.9.7.1_LI _Images is affected.
- Version 20.9.7.1 is affected.
- Version 20.18.1 is affected.
- Version 20.18.1_LI_Images is affected.
- Version 20.12.6_LI_Images is affected.
- Version 20.12.6 is affected.
- Version 20.12.5.1.01 is affected.
- Version 20.9.8 is affected.
- Version 20.9.8_LI_Images is affected.
- Version 20.18.2 is affected.
- Version 20.15.4.1_LI_Images is affected.
- Version 20.15.4.1 is affected.
- Version 20.18.2_LI_Images is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.