CVE-2026-20095

MEDIUM

Cisco Integrated Management Controller Command Injection Vulnerability

Title source: cna
STIX 2.1

Description

A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root.

Scores

CVSS v3 6.5
EPSS 0.0009
EPSS Percentile 25.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-77
Status published
Products (50)
Cisco/Cisco Enterprise NFV Infrastructure Software 3.10.1
Cisco/Cisco Enterprise NFV Infrastructure Software 3.10.2
Cisco/Cisco Enterprise NFV Infrastructure Software 3.10.3
Cisco/Cisco Enterprise NFV Infrastructure Software 3.11.1
Cisco/Cisco Enterprise NFV Infrastructure Software 3.11.2
Cisco/Cisco Enterprise NFV Infrastructure Software 3.11.3
Cisco/Cisco Enterprise NFV Infrastructure Software 3.12.1
Cisco/Cisco Enterprise NFV Infrastructure Software 3.12.1a
Cisco/Cisco Enterprise NFV Infrastructure Software 3.12.1b
Cisco/Cisco Enterprise NFV Infrastructure Software 3.12.2
... and 40 more
Published Apr 01, 2026
Tracked Since Apr 01, 2026