Cisco emits critical patches for IMC and SSM On-Prem before CVE-2026-20093 and CVE-2026-20160 that allow remote control taking without authentication

Published 4 min de lectura 135 reading

Cisco has published patches for two critical vulnerabilities that can allow a remote and unauthenticated attacker to take control of equipment if they are successfully exploited. The most serious of them, registered as CVE-2026-20093 and qualified with a CVSS score of 9.8 out of 10, affects the Integrated Management Controller component (IMC) and would allow, according to Cisco's own notice, to avoid authentication mechanisms by handling HTTP requests.

In simple terms, the BMI failure is due to incorrect request management to change passwords: an attacker who sends a specially built HTTP request could modify the credentials of any system account, including that of the administrator, and then access with those privileges. Cisco recognizes the researcher known as "jyh" for having detected and reported vulnerability. The incidence affects several product models and families independent of device configuration, and the corrected versions published by Cisco are as follows: 5000 Series Enterprise Network Compute Systems (ENCS) corrected in 4.15.5; Catalyst 8300 Series Edge UCPE corrected in 4.18.3; UCS C-Series M5 and M6 in standalone mode corrected in 4.3 (2.260007), 4.3 (6.260017) and 6.0 (1.250174); UCS E-Series M3 corrected in 3.2.17; and UCS E-Series M6 corrected in 4.15.3. For official details, see the list of Cisco security notices on your PSIRT portal: https: / / sec.cloud and entry into the national vulnerability database: https: / / nvd.nist.gov / vuln / detail / CVE-2026-20093.

Cisco emits critical patches for IMC and SSM On-Prem before CVE-2026-20093 and CVE-2026-20160 that allow remote control taking without authentication
Image generated with IA.

The second critical failure detected, CVE-2026-20160- also with CVSS 9.8 score - affects Smart Software Manager On-Prem (SSM On-Prem) and is of a different nature: the accidental exposure of an internal service leaves an accessible API that, with a manipulated request, can allow the execution of arbitrary commands in the underlying operating system with root privileges. Cisco has included correction in the version 9-202601 SSM On-Prem notes that this vulnerability was discovered internally during the resolution of a case of TAC support. The corresponding entry in the NVD provides additional technical information: https: / / nvd.nist.gov / vuln / detail / CVE-2026-20160.

For now, Cisco indicates that there is no public evidence of active exploitation of these two failures, but the context matters: in recent months, there have been failures in network products that have been widely exploited by malicious actors. This recent experience underlines that a vulnerability with a score of about 10 should not be left unpatched. The authorities and response teams recommend prioritizing critical updates, and resources such as the Cybersecurity and Infrastructure Security Agency (CISA) insist on the need for proactive patch and mitigation management: https: / / www.cisa.gov / knowledge-exploited-vulnerabilities-catalog.

Cisco emits critical patches for IMC and SSM On-Prem before CVE-2026-20093 and CVE-2026-20160 that allow remote control taking without authentication
Image generated with IA.

For infrastructure and operations managers, the recommendation is clear and practical: apply the patches published by Cisco as soon as possible as there are no official alternative solutions to replace correction. In addition to updating the above versions, it is appropriate to review recent records and accesses in the affected systems, to change critical credentials if it has not been possible to ensure full traceability of access, to segment and isolate remote management equipment on the network and to monitor commitment indicators that may indicate attempts to operate. If a heterogeneous park is managed, planning maintenance windows and previous tests will help to minimize interruptions.

Disclosure and response speed are essential: manufacturers often publish technical notices and update guides on their portals, and security teams should integrate such information into their vulnerability management processes. For official notices and mitigation information, it is recommended to go to the manufacturer's source and to public databases such as NVD: Cisco ad portal and National Vulnerability Database.

In short, these two corrections are a priority: if your environment uses BMI or SSM On-Prem, now update and verify digital detection and hygiene measures to reduce the risk of intrusion and exposure of administrative accounts.

Coverage

Related

More news on the same subject.