Home Cisco CVE-2026-20086
Back to Cisco

CVE-2026-20086

Cisco IOS XE Wireless Controller Software - Catalyst CW9800 Family

Cisco CVSS 8.6 Updated March 31, 2026

Executive Risk Summary

"A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of a malformed CAPWAP packet."

Anticipated Attack Path

  1. 1. Attacker sends a malformed CAPWAP packet to the affected device
  2. 2. The device improperly handles the packet, leading to a crash
  3. 3. The device reloads unexpectedly, causing a denial of service condition

Am I Vulnerable?

  • Is the Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family in use?
  • Is the device exposed to untrusted networks or the internet?
  • Have the latest security patches been applied to the device?

Operational Audit Arsenal

Target Type Wireless Controller
Target Asset Catalyst CW9800 Family
Standard Path Management Plane / CAPWAP

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential network disruption during patching and reboot

Internal Work Notes

CVE-2026-20086: Potential DoS vulnerability in Cisco IOS XE Wireless Controller Software for Catalyst CW9800 Family, recommend patching and rebooting affected devices

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.