Description
A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host.

This vulnerability is due to the unintentional exposure of an internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.
Published: 2026-04-01
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in Cisco Smart Software Manager On-Prem allows an unauthenticated user to send a crafted request to an internal API, resulting in arbitrary command execution on the host operating system with root privileges. The weakness stems from accidental exposure of an internal service, creating a classic privilege escalation scenario where an attacker can compromise the entirety of the affected system.

Affected Systems

The vulnerability affects Cisco Smart Software Manager On-Prem. No specific version information is disclosed, so all installations of this product remain potentially at risk until remediation is applied.

Risk and Exploitability

The flaw carries a CVSS score of 9.8, indicating critical severity, and is not listed in the CISA KEV catalog. Although an EPSS score is unavailable, the remote, unauthenticated nature of the exploit implies that an attacker could reach the vulnerable API from outside the trusted network. Once exploited, the attacker gains root-level access, enabling complete control over the host system. The risk is therefore high for any network exposing this service without proper isolation.

Generated by OpenCVE AI on April 2, 2026 at 02:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco-provided patch or upgrade Cisco Smart Software Manager On-Prem to a version that fixes the exposed internal service.
  • Restrict network access to the internal API service using firewalls or segmentation to prevent unauthenticated traffic.
  • Monitor system logs for unexpected API activity and enforce strict authentication where possible.
  • Reference Cisco’s security advisory at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssm-cli-execution-cHUcWuNr for detailed remediation guidance.

Generated by OpenCVE AI on April 2, 2026 at 02:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco smart Software Manager On-prem
Vendors & Products Cisco
Cisco smart Software Manager On-prem

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This vulnerability is due to the unintentional exposure of an&nbsp;internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.
Title Cisco Smart Software Manager On-Prem Arbitrary Command Execution Vulnerability
Weaknesses CWE-668
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Smart Software Manager On-prem
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-02T03:56:10.746Z

Reserved: 2025-10-08T11:59:15.388Z

Link: CVE-2026-20160

cve-icon Vulnrichment

Updated: 2026-04-01T18:08:32.796Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:31.760

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20160

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:26Z

Weaknesses