7 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
CVE-2026-20182 is a critical authentication bypass vulnerability affecting Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager.
The vulnerability is caused by improper authentication handling within SD-WAN management and controller infrastructure. An unauthenticated remote attacker may exploit the flaw by sending crafted requests to affected systems.
Successful exploitation may allow attackers to gain unauthorized access to SD-WAN infrastructure, execute administrative actions, manipulate network orchestration functions, and potentially compromise enterprise-wide WAN management operations.
Cisco confirmed limited exploitation of this vulnerability, and it has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Microsoft Exchange Server Spoofing Vulnerability
Identifier: CVE-2026-42897
CVSS Score: 8.1 (High, CVSS v3.1)
PoC or Exploitation:
Update/ Patch:
Affected versions include:Microsoft Exchange Server Subscription EditionMicrosoft Exchange Server 2019Microsoft Exchange Server 2016
Microsoft advisory and mitigation guidance:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
Microsoft Exchange Team guidance:https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498
Mitigation Recommendation: