{"id":479,"date":"2026-04-02T16:38:10","date_gmt":"2026-04-02T16:38:10","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=479"},"modified":"2026-04-02T16:38:10","modified_gmt":"2026-04-02T16:38:10","slug":"cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=479","title":{"rendered":"Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 02, 2026<\/span><\/span><span class=\"p-tags\">Network Security \/ Vulnerability<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjH6wuST9R8voZTpCC-v5LSwd4O7vlbuRDhXMzcSw9iu0k2JvFOao-3Jr2o9iCs0jqX3pIqHvcYo_n-5Ad80WXeQXKV_DTgJUN0A6nl9f73BA1U0wRoZBqgySfDR6Uk7KD8jXzw2BFLGvusf-96qsINw9jT4PnglZohYM2VhSsdHcpw-cl6vwAekfE-KD_H\/s1700-e365\/cisco-exploit.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cisco\u00a0has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system with elevated privileges.<\/p>\n<p>The\u00a0vulnerability, tracked as CVE-2026-20093, carries a CVSS score of 9.8\u00a0out of a maximum of\u00a010.0.<\/p>\n<p>\u00abThis vulnerability is due to incorrect handling of password change requests,\u00bb\u00a0Cisco <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cimc-auth-bypass-AgG2BxTn\">said<\/a> in an advisory released Wednesday. \u00abAn attacker could exploit this vulnerability by sending a crafted HTTP request to an affected\u00a0device.\u00bb<\/p>\n<p>\u00abA successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that\u00a0user.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Security researcher \u00abjyh\u00bb has been credited with discovering and reporting the vulnerability. The\u00a0shortcoming affects the following products regardless of the device configuration\u00a0&#8211;\u00a0<\/p>\n<ul>\n<li>5000 Series Enterprise Network Compute Systems (ENCS) &#8211; Fixed in 4.15.5<\/li>\n<li>Catalyst 8300 Series Edge uCPE &#8211; Fixed in 4.18.3<\/li>\n<li>UCS C-Series M5 and M6 Rack Servers in standalone mode &#8211; Fixed in 4.3(2.260007), 4.3(6.260017), and 6.0(1.250174)<\/li>\n<li>UCS E-Series Servers M3 &#8211; Fixed in 3.2.17<\/li>\n<li>UCS E-Series Servers M6 &#8211; Fixed in 4.15.3<\/li>\n<\/ul>\n<p>Another critical vulnerability patched by Cisco impacts Smart Software Manager On-Prem (SSM On-Prem), which could enable an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. The\u00a0vulnerability, CVE-2026-20160 (CVSS score: 9.8), stems from an unintentional exposure of an internal\u00a0service.<\/p>\n<p>\u00abAn attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service,\u00bb\u00a0Cisco <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ssm-cli-execution-cHUcWuNr\">said<\/a>. \u00abA successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Patches for the flaw\u00a0have been\u00a0released in Cisco SSM On-Prem version 9-202601. Cisco\u00a0said the vulnerability was discovered internally during the resolution of a Cisco Technical Assistance Center (TAC) support\u00a0case.<\/p>\n<p>While\u00a0neither of the vulnerabilities\u00a0has been\u00a0exploited in the\u00a0wild, a number\u00a0ofrecentlydisclosed security flaws in Cisco products\u00a0have been weaponized by threat actors. In\u00a0the absence of a workaround,\u00a0customers are recommended to update to the fixed version for optimal protection.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 02, 2026Network Security \/ Vulnerability Cisco\u00a0has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":480,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[60,124,869,497,11,1043,57,12,1044,1045],"class_list":["post-479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-allowing","tag-cisco","tag-compromise","tag-cvss","tag-flaws","tag-imc","tag-patches","tag-remote","tag-ssm","tag-system"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=479"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/479\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/480"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}