You are currently viewing Critical Infrastructure Alert: Patch Cisco IMC and SSM On-Prem Now!

Critical Infrastructure Alert: Patch Cisco IMC and SSM On-Prem Now!

  • Post author:
  • Reading time:4 mins read

A pair of critical vulnerabilities in Cisco server and license-management technologies, CVE-2026-20093 and CVE-2026-20160. These flaws allow attackers to bypass authentication or execute commands at the highest privilege level. Both flaws have been assigned a CVSS score of 9.8. Exploitation could result in full administrative control of the affected system and compromise of sensitive infrastructure management functions.


Background on the Affected Technology

Cisco Integrated Management Controller (IMC)

Cisco IMC is an out-of-band management interface embedded in Cisco UCS servers and other appliances. It is used for remote platform management, including power control, BIOS configuration, and hardware health monitoring. IMC runs independently of the host operating system and has full control over the underlying hardware.

Because of its privileged position, vulnerabilities in IMC can provide attackers with complete access to server systems and the ability to manipulate hardware controls.

Cisco Smart Software Manager On-Prem (SSM On-Prem)

Cisco Smart Software Manager On-Prem provides license management and entitlement tracking for Cisco products. It includes a command-line interface (CLI) and backend services that interact with licensing data and APIs.

Although intended as an internal administrative component, certain services are exposed in ways that affect command execution security.


Vulnerability Details

CVE-2026-20093

CVSS Score: 9.8 (Critical)
Vulnerability Type: Authentication Bypass
Affected Product: Cisco Integrated Management Controller (IMC)

CVE-2026-20093 exists due to improper handling of password change requests in IMC . An unauthenticated remote attacker can send a specially crafted HTTP request to bypass authentication controls entirely.
Discovered by: Security researcher “jyh.”


CVE-2026-20160

CVSS Score: 9.8 (Critical)
Vulnerability Type: Command Injection
Affected Product: Cisco Smart Software Manager On-Prem (SSM On-Prem)

CVE-2026-20160 stems from the unintended exposure of an internal service. By sending a specially crafted request to the API of this exposed service, an attacker can trigger command execution. A successful exploit would allow the attacker to run operating system commands with root-level privileges, potentially resulting in full system compromise.

This vulnerability was identified internally while Cisco was addressing a Technical Assistance Center (TAC) support case.


Tactics and Techniques

Attackers may leverage these flaws using tactics aligned with MITRE ATT&CK:

  • TA0001 – Initial Access – Exploit Public-Facing Application(T1190)
    Targeting the exposed IMC web interface.
  • TA0005 – Defense Evasion – Bypass Authentication(T1556)
    Bypassing IMC login controls via crafted requests.
  • TA0004 – Privilege Escalation – Exploitation for Privilege Escalation(T1068)
    Using command injection to gain root command execution.
  • TA0003 – Persistence – Create or Modify Accounts(T1136)

Potential Impact

If exploited, these vulnerabilities may lead to:

  • Full Administrative Access: Unauthorized control of the IMC interface (CVE-2026-20093)
  • Root Execution: Arbitrary OS command execution with complete privileges (CVE-2026-20160)
  • Configuration Tampering: Hardware and system configuration manipulation
  • Persistence: Altered administrative accounts.

Mitigation Steps

CVE-2026-20093 affects the below mentioned products and Cisco urges to apply patches immediately.

Note: To address this issue on Cisco 5000 Series ENCS and Cisco Catalyst 8300 Series Edge uCPE platforms, it is necessary to upgrade the Cisco Enterprise NFV Infrastructure Software (NFVIS). The Cisco IMC software is automatically updated as part of the NFVIS firmware upgrade process.

5000 Series ENCS and Catalyst 8300 Series Edge uCPE

Product / Software ComponentAffected ReleasesFirst Fixed Release
Cisco NFVIS (for 5000 Series ENCS)4.15 and earlier4.15.5
Cisco NFVIS (for Catalyst 8300 Series Edge uCPE)4.16 and earlierMigrate to a fixed release
Cisco NFVIS (for Catalyst 8300 Series Edge uCPE)4.184.18.3 (Apr 2026)

UCS C-Series Rack Servers

Server ModelAffected IMC ReleaseFirst Fixed IMC Release
UCS C-Series M54.2 and earlierMigrate to a fixed release
UCS C-Series M54.34.3(2.260007)
UCS C-Series M64.2 and earlierMigrate to a fixed release
UCS C-Series M64.34.3(6.260017)
UCS C-Series M66.06.0(1.250174)

UCS E-Series Servers

Server ModelAffected IMC ReleaseFirst Fixed IMC Release
UCS E-Series M33.2 and earlier3.2.17
UCS E-Series M64.15 and earlier4.15.3

CVE-2026-20160 affects Cisco Smart Software Manager On-Prem installations running the vulnerable releases listed below. Immediate patching is critical to prevent arbitrary command execution.

Cisco SSM On-Prem ReleaseFirst Fixed Release
9-202502 to 9-202510Fixed in 9-202601

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.