Description
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to execute arbitrary code as the root user. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.

Cisco has assigned this vulnerability a SIR of High rather than Medium as the score indicates because additional security implications could occur when the attacker becomes root.
Published: 2026-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is caused by incorrect input validation in the web‑based management interface of Cisco IMC. An attacker who is authenticated and holds administrator‑level privileges can send specially crafted HTTP requests that result in arbitrary code execution as the root operating system user. This allows the attacker to modify system files, install malicious payloads, or disrupt services, thereby compromising confidentiality, integrity and availability of the affected device.

Affected Systems

The impact reaches Cisco Unified Computing System devices running in standalone mode. No specific firmware or software version is mentioned, so any device of this type that has not been updated to receive the fix remains vulnerable.

Risk and Exploitability

The CVSS base score of 6.5 places the vulnerability in the medium severity range according to NIST guidelines. Because no EPSS score is provided, the current likelihood of exploitation is unclear, and it is not listed in the CISA KEV catalog. Exploitation requires remote access to the management interface and valid administrator credentials, which limits the attack surface but still presents a significant risk if privileged accounts are compromised or poorly secured.

Generated by OpenCVE AI on April 2, 2026 at 03:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco‑issued firmware update that addresses the CIMC input validation flaw.
  • If an update is unavailable, upgrade the CIMC firmware to a version that includes the fix or replace the device.
  • Restrict access to the web‑based management interface to a trusted network segment or VPN and enforce strong password policies for administrator accounts.
  • Monitor for anomalous HTTP requests or failed authentication attempts that may indicate exploitation attempts.

Generated by OpenCVE AI on April 2, 2026 at 03:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco unified Computing System
Vendors & Products Cisco
Cisco unified Computing System

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to execute arbitrary code as the root user.&nbsp;This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user. Cisco has assigned this vulnerability a SIR of High rather than Medium as the score indicates because additional security implications could occur when the attacker becomes root.
Title Cisco Integrated Management Controller Remote Code Execution Vulnerability
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Unified Computing System
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-22T19:09:30.232Z

Reserved: 2025-10-08T11:59:15.369Z

Link: CVE-2026-20097

cve-icon Vulnrichment

Updated: 2026-04-01T18:18:19.592Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:30.733

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20097

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:31Z

Weaknesses