Critical Cisco IMC auth bypass gives attackers Admin access
嗯,用户让我用中文总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要通读文章内容,抓住主要信息。 文章讲的是Cisco发布了安全更新,修复了几个关键漏洞,特别是IMC的认证绕过漏洞。这个漏洞可以让攻击者获得管理员权限。然后提到了另一个SSM On-Prem的漏洞,可能导致远程代码执行。还有之前修复的FMC漏洞被利用的情况。 我需要把这些要点浓缩到100字以内。先确定主要事件:发布安全更新、修复IMC认证绕过漏洞、SSM On-Prem漏洞、FMC漏洞被利用。 然后组织语言,确保信息准确且简洁。比如,“Cisco发布安全更新修复多个高危漏洞,包括IMC认证绕过和SSM On-Prem远程代码执行问题。”这样既涵盖了主要漏洞,又说明了修复情况。 最后检查字数是否符合要求,并确保没有使用任何不需要的开头词。 </think> Cisco发布安全更新修复多个高危漏洞,包括IMC认证绕过和SSM On-Prem远程代码执行问题。 2026-4-2 11:15:15 Author: www.bleepingcomputer.com(查看原文) 阅读量:3 收藏

Cisco

Cisco has released security updates to address several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that allows attackers to gain Admin access.

Also known as CIMC, Cisco IMC is a hardware module embedded on the motherboard of Cisco servers that provides out-of-band management (even if the operating system is powered off or crashed) for UCS C-Series and E-Series servers via multiple interfaces, including XML API, web (WebUI), and command-line (CLI).

Tracked as CVE-2026-20093, the vulnerability was found in the Cisco IMC password change functionality and can be remotely exploited by unauthenticated attackers to bypass authentication and access unpatched systems with Admin privileges.

"This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device," Cisco explained on Wednesday.

"A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that user."

"Strongly" advised to patch as soon as possible

While Cisco's Product Security Incident Response Team (PSIRT) has yet to find evidence of in-the-wild exploitation or a proof-of-concept exploit code, the company "strongly recommends that customers upgrade to the fixed software" as there are no workarounds to temporarily mitigate this security flaw.

This week, Cisco has also released patches for a critical Smart Software Manager On-Prem (SSM On-Prem) vulnerability (CVE-2026-20160) that could enable threat actors without privileges to gain remote code execution (RCE) on vulnerable SSM On-Prem hosts.

Attackers can exploit the CVE-2026-20160 vulnerability by sending a crafted request to the exposed service's API, allowing them to execute commands on the underlying OS with root-level privileges.

Earlier this month, Cisco patched a maximum-severity RCE vulnerability (CVE-2026-20131) in the Secure Firewall Management Center (FMC) that the Interlock ransomware gang exploited in zero-day attacks. CISA has also added CVE-2026-20131 to its catalog of flaws abused in the wild, ordering federal agencies to secure their systems within three days.

More recently, BleepingComputer reported that Cisco's internal development environment was breached using credentials stolen during the recent Trivy supply chain attack.

tines

Automated Pentesting Covers Only 1 of 6 Surfaces.

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.


文章来源: https://www.bleepingcomputer.com/news/security/critical-cisco-imc-auth-bypass-gives-attackers-admin-access/
如有侵权请联系:admin#unsafe.sh