Cisco Patches Two Critical and Six High-Severity Vulnerabilities

Cisco Patches Two Critical and Six High-Severity Vulnerabilities


Cisco shipped fixes for eight vulnerabilities on Wednesday — two rated critical and six high-severity — spanning multiple products including Integrated Management Controller (IMC), Smart Software Manager On-Prem (SSM On-Prem), and Evolved Programmable Network Manager (EPNM). The bugs could be exploited for authentication bypass, remote code execution, privilege escalation, and information disclosure.

Critical Vulnerabilities

CVE-2026-20093 — Cisco IMC Authentication Bypass (CVSS 9.8)

The vulnerability is rooted in incorrect handling of password change requests. An unauthenticated remote attacker could send a crafted HTTP request to an affected device, bypass authentication, alter the passwords of any user on the system — including an admin — and gain elevated access.  Security researcher “jyh” has been credited with discovering and reporting the vulnerability.

CVE-2026-20160 — Cisco SSM On-Prem RCE (CVSS 9.8)

This flaw stems from the unintentional exposure of an internal service. An attacker could send a crafted request to the API of the exposed service and execute arbitrary commands on the underlying operating system with root-level privileges. The patch is available in Cisco SSM On-Prem version 9-202601. Cisco noted the vulnerability was discovered internally during the resolution of a TAC support case.

High-Severity Vulnerabilities

On the high-severity side, Cisco patched a defect in EPNM that could allow attackers to access sensitive information, and another in SSM On-Prem exploitable for privilege escalation. Additionally, four IMC vulnerabilities were patched — all rooted in insufficient validation of user-supplied input on IMC’s web-based management interface — that could be exploited to execute arbitrary commands and gain root privileges.

More than two dozen enterprise networking products are impacted by the four IMC security defects, including UCS C-series and E-series servers and appliances based on them.

Exploitation Status

Cisco’s PSIRT is not aware of exploits or proof-of-concept code for any of these vulnerabilities, but strongly advises customers to update to patched software.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.