Impact
A flaw in Cisco Smart Software Manager On-Prem allows an unauthenticated user to send a crafted request to an internal API, resulting in arbitrary command execution on the host operating system with root privileges. The weakness stems from accidental exposure of an internal service, creating a classic privilege escalation scenario where an attacker can compromise the entirety of the affected system.
Affected Systems
The vulnerability affects Cisco Smart Software Manager On-Prem. No specific version information is disclosed, so all installations of this product remain potentially at risk until remediation is applied.
Risk and Exploitability
The flaw carries a CVSS score of 9.8, indicating critical severity, and is not listed in the CISA KEV catalog. Although an EPSS score is unavailable, the remote, unauthenticated nature of the exploit implies that an attacker could reach the vulnerable API from outside the trusted network. Once exploited, the attacker gains root-level access, enabling complete control over the host system. The risk is therefore high for any network exposing this service without proper isolation.
OpenCVE Enrichment