CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added˙one˙new vulnerability˙to its˙Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.˙
CVE-2026-20182˙Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability˙
This˙type of vulnerability is a˙frequent attack vector for malicious cyber actors and poses˙significant risks to the federal enterprise.
Note: Please adhere to CISA?s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlined in˙Emergency Directive 26-03:˙Mitigate Vulnerabilities in Cisco SD-WAN Systems˙and˙Supplemental Direction ED 26-03: Hunt and Hardening Guidance for Cisco SD-WAN Systems. Adhere to the applicable˙Binding Operational Directive (BOD) 22-01˙guidance for cloud services or˙discontinue˙use of the product if mitigations are not available.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities˙established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the˙BOD 22-01 Fact Sheet˙for more information.˙
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing˙timely˙remediation of˙KEV Catalog vulnerabilities˙as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the˙specified criteria.
https://www.cisa.gov/news-events/alerts/2026/05/14/cisa-adds-one-known-exploited-vulnerability-catalog
2026-05-14 12:00 UTC
--- FMail-lnx 2.3.2.6-B20251227
* Origin: TCOB1 A Mail Only System (2:263/1)