{"id":2560,"date":"2026-05-20T07:22:03","date_gmt":"2026-05-20T14:22:03","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=2560"},"modified":"2026-05-20T08:27:50","modified_gmt":"2026-05-20T15:27:50","slug":"emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/","title":{"rendered":"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"854\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1280x854.png\" alt=\"\" class=\"wp-image-2563\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1280x854.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-512x342.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-768x512.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1536x1025.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png 1742w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\"><em>Sample of assets impacted by Cisco SD-WAN Authentication Bypass vulnerability, identified by the CyCognito Platform<\/em><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is CVE-2026-20182?<\/h2>\n\n\n\n<p>CVE-2026-20182 is an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Cisco Catalyst SD-WAN Manager (formerly vManage). The flaw sits in the peering authentication path of the <code>vdaemon<\/code> service running over DTLS on UDP port 12346, the same control-plane service involved in CVE-2026-20127 earlier in 2026. It is not a patch bypass of that earlier issue, but a separate weakness in the device-type handling of the control connection handshake.<\/p>\n\n\n\n<p>The vulnerability carries a CVSS v3.1 base score of 10.0 (Critical). No authentication is required and there is no user interaction. An unauthenticated remote attacker who can reach UDP\/12346 can declare an arbitrary device type during the handshake, skip the certificate validation step, and emerge as a trusted peer of the controller or manager.<\/p>\n\n\n\n<p>Once authenticated as a peer, the attacker can invoke privileged message handlers. Public research describes appending an attacker-controlled SSH public key to <code>\/home\/vmanage-admin\/.ssh\/authorized_keys<\/code>, then logging into the NETCONF service on TCP\/830 as <code>vmanage-admin<\/code> and issuing arbitrary NETCONF commands against the SD-WAN fabric.  Cisco PSIRT has confirmed limited in-the-wild exploitation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by CVE-2026-20182?<\/h2>\n\n\n\n<p>The flaw affects Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager across release trains 20.9, 20.10, 20.11, 20.12, 20.13, 20.14, 20.15, 20.16, 20.18, and 26.1. Cisco states the issue is configuration-independent, meaning vulnerable systems remain exposed regardless of deployment-specific settings. <\/p>\n\n\n\n<p>On-prem deployments, Cisco SD-WAN Cloud-Pro, Cisco-managed SD-WAN Cloud, and Cisco SD-WAN for Government FedRAMP are all in scope.<\/p>\n\n\n\n<p>In practice, an affected asset is a control-plane appliance or virtual machine sitting at the trust center of an SD-WAN overlay. The exploitation primitive depends on reaching the <code>vdaemon<\/code> DTLS service on UDP\/12346, but operational exposure typically goes wider. SD-WAN control components also commonly expose NETCONF on TCP\/830, the management web UI on TCP\/443, and SSH on TCP\/22. <\/p>\n\n\n\n<p>Any of these reachable from untrusted networks expands the attack surface around this CVE, both for the bypass itself and for follow-on persistence steps such as SSH key injection and NETCONF abuse.<\/p>\n\n\n\n<p>These assets tend to be internet-facing because they have to be. SD-WAN controllers coordinate edge routers across geographies and providers, which puts them on public address space by design. They also tend to be long-lived, infrequently re-platformed, and often managed by a small networking team rather than tracked in mainstream asset inventories.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What does our data show about exposure patterns?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"777\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-179-1280x777.png\" alt=\"\" class=\"wp-image-2562\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-179-1280x777.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-179-512x311.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-179-768x466.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-179.png 1335w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p>Exposure in this set is led by Consumer Discretionary at 52.7% of observed assets, with Industrials contributing 16.4% and Communication Services another 10.9%. The pattern is striking: more than half of the observed exposure sits inside one sector.<\/p>\n\n\n\n<p>Consumer Discretionary covers a mix of large hospitality, cruise, automotive, and consumer-services organizations. These are businesses with hundreds of branch sites, distributed retail estates, and partner networks stitched together over WAN. <\/p>\n\n\n\n<p>SD-WAN is a natural fit for that footprint, which is why these organizations are heavy adopters and also why their controllers tend to live in publicly routable space connecting branches, data centers, and clouds. The same operational characteristics that make SD-WAN attractive, namely distributed sites and mixed transports, also make decommissioning and version control harder than in a single-DC environment.<\/p>\n\n\n\n<p>Communication Services and Industrials round out the top three for related reasons. Media and broadcast operators run distributed production and distribution infrastructure with similar WAN topology, and industrial groups with global manufacturing or logistics footprints share the same need for site-to-site overlay networking. <\/p>\n\n\n\n<p>Across all three sectors, the underlying risk driver is the same: control-plane appliances that have been deployed, patched at the front-of-mind moment, and then left running far longer than the threat model around them held still.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?<\/h2>\n\n\n\n<p>Yes. Cisco published fixed releases on May 14 2026, including 20.9.9.1 for the 20.9 train, 20.12.5.4 \/ 20.12.6.2 \/ 20.12.7.1 for 20.12, 20.15.4.4 and 20.15.5.2 for 20.15, 20.18.2.2 for 20.18, and 26.1.1.1 for 26.1. Cisco-managed cloud customers were remediated automatically in cloud release 20.15.506 with no customer action required.<\/p>\n\n\n\n<p>Cisco explicitly states that no workarounds address the vulnerability. The only remediation is upgrading to a fixed software release. Several older trains have reached end of software maintenance, so organizations on those branches should plan a supported migration rather than expect a patch.<\/p>\n\n\n\n<p>One practical note: before upgrading, Cisco advises running the <code>request admin-tech<\/code> command on each SD-WAN control component to preserve forensic data. <\/p>\n\n\n\n<p>A rushed upgrade can overwrite logs that matter if a system has already been compromised, and Cisco&#8217;s advisory provides specific guidance on reviewing <code>auth.log<\/code> for <code>Accepted publickey for vmanage-admin<\/code> entries from unexpected source IPs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other recommended actions to take?<\/h2>\n\n\n\n<p>Beyond patching, defenders should:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Audit existing peering events and <code>authorized_keys<\/code> files for unexpected entries.<\/li>\n\n\n\n<li>Inventory every Catalyst SD-WAN Controller and Manager node, including virtual appliances, lab systems, and disaster-recovery copies.<\/li>\n\n\n\n<li>Confirm which nodes are reachable from untrusted networks on UDP\/12346, TCP\/830, and TCP\/22.<\/li>\n\n\n\n<li>Restrict control-plane reachability to known peer IPs where the architecture allows.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?<\/h2>\n\n\n\n<p>CyCognito published an Emerging Threat Advisory for CVE-2026-20182 in the CyCognito platform and is actively researching enhanced detection capabilities for this vulnerability.<\/p>\n\n\n\n<p>To learn how CyCognito can help your organization reduce external exposure and manage emerging threats more effectively, <a href=\"https:\/\/www.cycognito.com\/demo\/\">contact us to request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A critical authentication bypass in the peering handshake of Cisco Catalyst SD-WAN Controller and Manager lets an unauthenticated remote attacker and issue arbitrary NETCONF commands.<\/p>\n","protected":false},"author":39,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2560","post","type-post","status-publish","format-standard","hentry","category-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"A critical authentication bypass in the peering handshake of Cisco Catalyst SD-WAN Controller and Manager lets an unauthenticated remote attacker and issue arbitrary NETCONF commands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-20T14:22:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-20T15:27:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1742\" \/>\n\t<meta property=\"og:image:height\" content=\"1162\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Igal Zeifman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Igal Zeifman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\"},\"author\":{\"name\":\"Igal Zeifman\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\"},\"headline\":\"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass\",\"datePublished\":\"2026-05-20T14:22:03+00:00\",\"dateModified\":\"2026-05-20T15:27:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\"},\"wordCount\":848,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1280x854.png\",\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\",\"name\":\"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1280x854.png\",\"datePublished\":\"2026-05-20T14:22:03+00:00\",\"dateModified\":\"2026-05-20T15:27:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png\",\"width\":1742,\"height\":1162},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3\",\"name\":\"Igal Zeifman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g\",\"caption\":\"Igal Zeifman\"},\"description\":\"VP of Marketing\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass | CyCognito Blog","og_description":"A critical authentication bypass in the peering handshake of Cisco Catalyst SD-WAN Controller and Manager lets an unauthenticated remote attacker and issue arbitrary NETCONF commands.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/","og_site_name":"CyCognito Blog","article_published_time":"2026-05-20T14:22:03+00:00","article_modified_time":"2026-05-20T15:27:50+00:00","og_image":[{"width":1742,"height":1162,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png","type":"image\/png"}],"author":"Igal Zeifman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Igal Zeifman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/"},"author":{"name":"Igal Zeifman","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3"},"headline":"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass","datePublished":"2026-05-20T14:22:03+00:00","dateModified":"2026-05-20T15:27:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/"},"wordCount":848,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1280x854.png","articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/","name":"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180-1280x854.png","datePublished":"2026-05-20T14:22:03+00:00","dateModified":"2026-05-20T15:27:50+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-180.png","width":1742,"height":1162},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-cve-2026-20182-cisco-catalyst-sd-wan-authentication-bypass\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/79ab10bc35a38aef399f5bbd21d8f1b3","name":"Igal Zeifman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4495bcfbe7465d573c6f7ee3e2a3cab?s=96&d=mm&r=g","caption":"Igal Zeifman"},"description":"VP of Marketing","url":"https:\/\/www.cycognito.com\/blog\/author\/igal-zeifman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=2560"}],"version-history":[{"count":3,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2560\/revisions"}],"predecessor-version":[{"id":2566,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/2560\/revisions\/2566"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=2560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=2560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=2560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}