Cisco faces critical vulnerabilities in BMI and SSM On Prem that could grant administrator privileges

Published 4 min de lectura 96 reading

This week Cisco has released security updates to correct several critical and high gravity vulnerabilities. Among the most worrying is a failure in the integrated management module of your servers - the well-known Cisco IMC or CIMC - that would allow an attacker to skip authentication and obtain administrator privileges in unpatched systems.

The BMI Cisco is a physical component housed on the base plate of the UCS C-Series and E-Series servers that provides off-band management: it allows you to control the hardware, access the console and manage boot even when the operating system is not available. Its interfaces include an XML API, a web interface and a command line, making it a critical point of control and therefore an attractive target for attackers.

Cisco faces critical vulnerabilities in BMI and SSM On Prem that could grant administrator privileges
Image generated with IA.

Identified as CVE-2026-20093, vulnerability lies in how BMI processes requests to change passwords. A remote attacker, without authentication, could send a manipulated HTTP request to the affected service, cause a failure in the operation flow control and end up modifying the password of any system user. The result could be access to equipment with administrative credentials.

In his technical newsletter, Cisco describes that the root of the problem is the incorrect handling of password requests and warns that, if the explosion is successful, the attacker could establish new credentials for existing accounts and thus access the role of that user. The company has not published, for now, operating tests in real environments or public test code, but urgently recommends updating to the corrected versions Since there are no practical temporary solutions that completely mitigate the failure; the only effective measure is to install the official patches. You can check Cisco's notice here: Cisco Security Advisory.

In addition to this problem in IMC, Cisco has published corrections for another critical vulnerability in Smart Software Manager On-Prem (SSM On-Prem), registered as CVE-2026-20160. In this case, a specially built request to the exposed API could allow an attacker to run code on the affected server with root privileges. The combination of accessible input vector via network and execution with high privileges makes this failure a risk of total platform engagement if it is not patched.

The warning comes in a tense context: at the beginning of the month Cisco had to correct a maximum severity vulnerability in its Secure Firewall Management Center ( CVE-2026-20131) which was exploited in zero-day-type attacks by the Interlock group. The same failure was included by the U.S. agency CISA in its catalogue of vulnerabilities exploited in nature, with instructions for federal agencies to mitigate it as a matter of priority in very short time.

The sum of these incidents highlights two realities: first, that out-of-band management surfaces are critical objectives and, second, that the development chain and internal environments can also be compromised, complicating the response. Subsequent reports have indicated that Cisco's internal development environment suffered unauthorized access by credentials linked to the Trivy supply chain incident, which highlights the need to review both software updates, credentials and access control processes.

Cisco faces critical vulnerabilities in BMI and SSM On Prem that could grant administrator privileges
Image generated with IA.

If you manage infrastructure with affected components, the practical recommendation is clear: plan and install official updates as soon as possible. In addition to the patch, it is appropriate to reduce the exposure of management interfaces: restrict access to management networks, use access control lists, limit authorised IP addresses and place management controls behind VPNs or separate networks. Check access and integrity records to detect unusual activity, change credentials and break keys if there is a suspicion of commitment, and make sure that privileged access policies and audit registration are active and reviewed.

Cisco maintains the technical details and software images affected in its safety notices; it is recommended to follow the manufacturer's specific guides and notes before applying changes in production environments. To deepen, see the NVD input on BMI failure ( CVE-2026-20093), the official notice of Cisco ( Cisco Security Advisory) and the CISA note containing the inclusion of the other exploited vulnerability in its catalogue ( CISA Alert).

In short, we are facing strong reminders: remote management systems should not be exposed without proper protections, critical updates should be applied quickly and the hygiene of credentials and the software supply chain is as important as the quality of the patch itself. Operational security requires combining point patches with design measures and access controls that limit impact when something fails.

Coverage

Related

More news on the same subject.