Description
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user.

This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root.
Published: 2026-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the web‑based management interface of Cisco Integrated Management Controller allows an authenticated remote attacker with administrative privileges to inject and execute arbitrary commands as the system’s root user. The vulnerability arises from improper validation of user supplied input, enabling command injection that can compromise system confidentiality, integrity, and availability.

Affected Systems

Affected vendors include Cisco Enterprise NFV Infrastructure Software, Cisco Unified Computing System (Standalone), and Cisco Unified Computing System E‑Series Software. Specific product versions are not listed in the advisory, so any release of these products may be impacted until a patch is applied.

Risk and Exploitability

The CVSS score of 6.5 reflects the severity of this remote code execution risk. The EPSS score is not available, and the vulnerability is not in the CISA KEV catalog. Exploitation requires network access to the web interface and valid administrator credentials, after which the attacker can run shell commands with root privileges, potentially leading to full system compromise.

Generated by OpenCVE AI on April 2, 2026 at 02:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco security advisory update that addresses the command injection vulnerability.
  • Verify that the patch has been deployed on all affected systems.
  • Restrict remote administrative access to trusted networks or VPNs.
  • Enforce strong authentication and limit administrative privileges to the minimum necessary.

Generated by OpenCVE AI on April 2, 2026 at 02:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System
Cisco unified Computing System Software
Vendors & Products Cisco
Cisco enterprise Nfv Infrastructure Software
Cisco unified Computing System
Cisco unified Computing System Software

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and&nbsp;execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root.
Title Cisco Integrated Management Controller Command Injection Vulnerability
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Enterprise Nfv Infrastructure Software Unified Computing System Unified Computing System Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-22T19:09:41.775Z

Reserved: 2025-10-08T11:59:15.369Z

Link: CVE-2026-20095

cve-icon Vulnrichment

Updated: 2026-04-01T18:16:40.974Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:29.670

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20095

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:33Z

Weaknesses