Cisco fixed critical and high-severity flaws
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是Cisco修复了两个关键漏洞和六个高危漏洞。这些漏洞可能导致攻击者绕过认证、执行恶意代码、提升权限以及访问敏感数据。特别是CVE-2026-20093和CVE-2026-20160这两个漏洞,评分都很高,分别是9.8分。前者影响Cisco IMC,后者影响SSM On-Prem。虽然目前没有已知的利用案例,但Cisco强烈建议用户更新补丁。 接下来,我需要将这些信息浓缩到100字以内。要突出修复的关键漏洞数量、可能的影响以及具体的漏洞细节。同时,要提到Cisco的建议和CISA的相关行动。 最后,确保语言简洁明了,不使用复杂的术语,让读者一目了然。 </think> Cisco修复了两个关键漏洞和六个高危漏洞,这些漏洞可能导致攻击者绕过认证、执行恶意代码、提升权限及访问敏感数据。其中CVE-2026-20093和CVE-2026-20160评分均为9.8分,分别影响Cisco IMC和SSM On-Prem系统。 Cisco建议用户尽快更新补丁以应对潜在风险。 2026-4-2 17:4:38 Author: securityaffairs.com(查看原文) 阅读量:3 收藏

Cisco fixed critical and high-severity flaws

Cisco fixed critical flaws that could allow attackers to bypass authentication, run code, and gain access to sensitive data.

Cisco released patches for two critical and six high-severity vulnerabilities. These flaws could let attackers bypass authentication, execute malicious code, escalate privileges, and access sensitive information.

One of these critical flaws is CVE-2026-20093 (CVSS score of 9.8), a flaw in Cisco IMC that lets a remote attacker bypass authentication via a crafted HTTP request. An attacker could change user passwords, including admin, and gain full system access.

Cisco Integrated Management Controller (IMC) is a built-in management system used on Cisco servers. IMC lets administrators control and monitor a server remotely, even if the operating system is off or not working.

Cisco also patched a critical SSM On-Prem flaw, tracked as CVE-2026-20160 (CVSS score of 9.8) that allowed unauthenticated attackers to run commands on the host OS with root privileges via a crafted API request.

Cisco’s PSIRT is not aware of exploits or proof-of-concept code for these vulnerabilities, however the networking giant strongly advises customers to update to the patched software.

In March, the company fixed a critical RCE zero-day, tracked as CVE-2026-20131 (CVSS score of 10.0), in Secure Firewall FMC, exploited by Interlock ransomware. US CISA ordered federal agencies to patch within three days. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities (KEV) catalog.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)




文章来源: https://securityaffairs.com/190295/security/cisco-fixed-critical-and-high-severity-flaws.html
如有侵权请联系:admin#unsafe.sh