Description
A vulnerability in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with valid administrative privileges to execute arbitrary commands on the underlying operating system of an affected device. 
 
This vulnerability is due to insufficient input validation of command arguments that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device with root-level privileges.
Published: 2026-02-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

A vulnerability in the CLI and web-based management interface of Cisco UCS Manager Software allows an authenticated remote attacker with administrative privileges to execute arbitrary commands with root‑level privileges due to insufficient input validation of command arguments. The resulting Remote Code Execution compromises confidentiality, integrity, and availability of the affected device. This weakness is classified as CWE‑78.

Affected Systems

The affected product is Cisco Unified Computing System (Managed) using UCS Manager Software. Specific version information is not supplied in the advisory.

Risk and Exploitability

The CVSS v3 base score is 6.5, indicating a medium severity. The EPSS score is below 1 % indicating a low probability of exploitation; the vulnerability is not listed in the CISA KEV catalog. Because exploitation requires valid administrative credentials, the attack surface is limited to trusted users, but the impact of a successful exploit is critical. Organizations should treat this as a moderate risk that warrants timely mitigation.

Generated by OpenCVE AI on April 17, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy Cisco’s latest UCS Manager Software patch that fixes the command injection flaw.
  • Restrict administrative access to the UCS Manager interface to trusted IP ranges or enforce multi‑factor authentication to limit the attack surface.
  • Audit and monitor command‑execution logs for suspicious activity, and consider disabling or limiting web‑based CLI access for non‑administrator accounts.

Generated by OpenCVE AI on April 17, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco unified Computing System Manager
Vendors & Products Cisco
Cisco unified Computing System Manager

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with valid administrative privileges to execute arbitrary commands on the underlying operating system of an affected device.&nbsp; &nbsp; This vulnerability is due to insufficient input validation of command arguments that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device with root-level privileges.
Title Cisco UCS Manager Software Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Cisco Unified Computing System Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-26T14:44:05.885Z

Reserved: 2025-10-08T11:59:15.353Z

Link: CVE-2026-20036

cve-icon Vulnrichment

Updated: 2026-02-25T18:11:09.484Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T17:25:24.833

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20036

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses