Description
A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root. 

This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.
Published: 2026-02-25
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command injection with privilege escalation to root
Action: Apply Patch
AI Analysis

Impact

A local, authenticated attacker with administrative privileges can submit crafted input to the web‑based management interfaces of Cisco FXOS and UCS Manager, triggering execution of arbitrary system commands. The flaw arises from inadequate validation of command arguments, allowing an attacker to gain root‑level access and modify or compromise the underlying operating system.

Affected Systems

The vulnerability affects Cisco FXOS Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Unified Computing System (Managed) devices. No specific version information was provided.

Risk and Exploitability

The flaw carries a CVSS score of 6.7 and an EPSS below 1%, indicating moderate severity but low current exploitation probability. It is not listed in the CISA KEV catalog. Successful exploitation requires valid administrative credentials, limiting the attack surface to authorized users. Once exploited, the attacker can execute any command with root privileges, creating a full compromise of the device.

Generated by OpenCVE AI on April 17, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco firmware patch that addresses the command injection flaw as soon as it is available.
  • Re‑evaluate local administrator accounts and enforce least‑privilege access controls on the management interface.
  • If immediate patch deployment is not possible, isolate or quarantine the affected device and disable the vulnerable command service until the patch is applied.
  • Continue to monitor Cisco security advisories for updates or additional mitigations related to this vulnerability.

Generated by OpenCVE AI on April 17, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco cisco:adaptive Security Appliance Software
Cisco firepower Extensible Operating System
Cisco unified Computing System Manager
Vendors & Products Cisco
Cisco cisco:adaptive Security Appliance Software
Cisco firepower Extensible Operating System
Cisco unified Computing System Manager

Thu, 26 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco&nbsp;UCS Manager Software could allow an authenticated, local attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to&nbsp;root.&nbsp; This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.
Title Cisco UCS Manager and FXOS Software Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Cisco Cisco:adaptive Security Appliance Software Firepower Extensible Operating System Unified Computing System Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-26T14:44:05.716Z

Reserved: 2025-10-08T11:59:15.370Z

Link: CVE-2026-20099

cve-icon Vulnrichment

Updated: 2026-02-25T18:17:46.228Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T17:25:27.357

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses