Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读全文,抓住关键点。 文章主要讲的是思科公司发布了安全更新,修复了两个关键漏洞。第一个漏洞CVE-2026-20093影响集成管理控制器IMC,CVSS评分9.8分。这个漏洞允许未认证的远程攻击者绕过认证,提升权限访问系统。第二个漏洞CVE-2026-20160影响智能软件管理器SSM On-Prem,同样高危,允许攻击者执行任意命令。 然后,文章提到这些漏洞已经被修复,并且没有被公开利用的记录。但最近思科的一些漏洞被武器化了,所以建议用户尽快更新。 接下来,我需要把这些信息浓缩到100字以内。重点包括:思科修复了两个高危漏洞(CVSS 9.8),涉及IMC和SSM On-Prem,可能导致未授权访问和权限提升。建议用户更新补丁以保护系统。 最后,确保语言简洁明了,不使用复杂的术语,并且直接描述内容。 </think> 思科修复了两个高危安全漏洞(CVSS评分9.8),分别影响集成管理控制器(IMC)和智能软件管理器(SSM On-Prem)。攻击者可借此绕过认证、提升权限或执行任意命令。建议用户尽快更新至最新版本以避免潜在风险。 2026-4-2 15:21:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Network Security / Vulnerability

Cisco has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system with elevated privileges.

The vulnerability, tracked as CVE-2026-20093, carries a CVSS score of 9.8 out of a maximum of 10.0.

"This vulnerability is due to incorrect handling of password change requests," Cisco said in an advisory released Wednesday. "An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device."

"A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that user."

Security researcher "jyh" has been credited with discovering and reporting the vulnerability. The shortcoming affects the following products regardless of the device configuration - 

  • 5000 Series Enterprise Network Compute Systems (ENCS) - Fixed in 4.15.5
  • Catalyst 8300 Series Edge uCPE - Fixed in 4.18.3
  • UCS C-Series M5 and M6 Rack Servers in standalone mode - Fixed in 4.3(2.260007), 4.3(6.260017), and 6.0(1.250174)
  • UCS E-Series Servers M3 - Fixed in 3.2.17
  • UCS E-Series Servers M6 - Fixed in 4.15.3

Another critical vulnerability patched by Cisco impacts Smart Software Manager On-Prem (SSM On-Prem), which could enable an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. The vulnerability, CVE-2026-20160 (CVSS score: 9.8), stems from an unintentional exposure of an internal service.

"An attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service," Cisco said. "A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges."

Patches for the flaw have been released in Cisco SSM On-Prem version 9-202601. Cisco said the vulnerability was discovered internally during the resolution of a Cisco Technical Assistance Center (TAC) support case.

While neither of the vulnerabilities has been exploited in the wild, a number ofrecentlydisclosed security flaws in Cisco products have been weaponized by threat actors. In the absence of a workaround, customers are recommended to update to the fixed version for optimal protection.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
如有侵权请联系:admin#unsafe.sh