Cisco Fixes Critical Security Flaws in IMC and SSM On-Prem; Urges Immediate Updates

Cisco Addresses Critical Security Vulnerabilities in IMC and SSM On-Prem

Cisco has recently released critical security updates to address significant vulnerabilities in its Integrated Management Controller (IMC) and Smart Software Manager On-Prem (SSM On-Prem) products. These vulnerabilities, if exploited, could allow unauthorized remote attackers to gain elevated privileges and execute arbitrary commands on affected systems.

Integrated Management Controller (IMC) Vulnerability

The vulnerability in Cisco’s IMC, identified as CVE-2026-20093, has been assigned a CVSS score of 9.8 out of 10, indicating its severity. This flaw arises from improper handling of password change requests, enabling an unauthenticated remote attacker to bypass authentication mechanisms. By sending a specially crafted HTTP request to a vulnerable device, an attacker could alter user passwords, including those of administrative accounts, thereby gaining unauthorized access with elevated privileges.

The affected products include:

– 5000 Series Enterprise Network Compute Systems (ENCS) – Fixed in version 4.15.5
– Catalyst 8300 Series Edge uCPE – Fixed in version 4.18.3
– UCS C-Series M5 and M6 Rack Servers in standalone mode – Fixed in versions 4.3(2.260007), 4.3(6.260017), and 6.0(1.250174)
– UCS E-Series Servers M3 – Fixed in version 3.2.17
– UCS E-Series Servers M6 – Fixed in version 4.15.3

Cisco has addressed this vulnerability in the specified software versions. Users are strongly advised to update their systems promptly to mitigate potential risks.

Smart Software Manager On-Prem (SSM On-Prem) Vulnerability

Another critical vulnerability, CVE-2026-20160, with a CVSS score of 9.8, affects Cisco’s SSM On-Prem. This flaw results from the unintended exposure of an internal service, which could allow an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system. By sending a crafted request to the API of the exposed service, an attacker could gain root-level privileges.

The vulnerability has been addressed in Cisco SSM On-Prem version 9-202601. Cisco discovered this issue internally during the resolution of a Technical Assistance Center (TAC) support case. Users are urged to update to the fixed version to ensure system security.

Broader Context and Recommendations

While there is no evidence that these vulnerabilities have been exploited in the wild, the potential impact underscores the importance of timely software updates. Cisco has a history of addressing critical vulnerabilities across its product lines. For instance, in May 2025, Cisco patched a maximum-severity flaw in its IOS XE Wireless Controller (CVE-2025-20188) that could allow unauthenticated remote attackers to upload arbitrary files and execute commands with root privileges. Similarly, in February 2025, Cisco addressed critical vulnerabilities in its Identity Services Engine (ISE) that could enable remote attackers to execute arbitrary commands and elevate privileges.

Given the recurring nature of such vulnerabilities, organizations must adopt proactive security measures:

1. Regular Software Updates: Ensure that all Cisco products are updated to the latest software versions to benefit from security patches.

2. Network Monitoring: Implement continuous monitoring to detect and respond to unusual activities promptly.

3. Access Controls: Enforce strict access controls and authentication mechanisms to limit potential attack vectors.

4. Incident Response Planning: Develop and regularly update incident response plans to address potential security breaches effectively.

By adhering to these practices, organizations can enhance their security posture and mitigate risks associated with software vulnerabilities.