DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-20093: CVE-2026-20093: Authentication Bypass in Cisco IMC Management Interface

CVE-2026-20093: Authentication Bypass in Cisco IMC Management Interface

Vulnerability ID: CVE-2026-20093
CVSS Score: 9.8
Published: 2026-04-01

A critical authentication bypass vulnerability in the Cisco Integrated Management Controller (IMC) allows an unauthenticated, remote attacker to reset administrative passwords. The flaw exists due to improper input validation in the user credential update process within the XML API and web management interface.

TL;DR

An unauthenticated remote attacker can gain administrative access to Cisco IMC servers by sending a crafted HTTP POST request that bypasses authorization checks and modifies the administrator password.


⚠️ Exploit Status: POC

Technical Details

  • CVSS v3.1: 9.8 (CRITICAL)
  • CWE ID: CWE-20: Improper Input Validation
  • Attack Vector: Network
  • Authentication: None Required
  • EPSS Score: 0.00031 (8.76th percentile)
  • Exploit Status: PoC Available
  • CISA KEV: Not Listed

Affected Systems

  • Cisco Unified Computing System (Standalone)
  • Cisco UCS E-Series Software (UCSE)
  • Cisco Enterprise NFV Infrastructure Software
  • Cisco Unified Computing System (Standalone): <= 4.2(3p) (Fixed in: 4.3(x))
  • Cisco UCS E-Series Software: <= 3.2.16.1 (Fixed in: Platform Dependent)
  • Cisco Enterprise NFV Infrastructure Software: <= 4.18.2a (Fixed in: Platform Dependent)

Exploit Details

Mitigation Strategies

  • Apply official vendor firmware updates immediately.
  • Restrict network access to management interfaces using strict ACLs.
  • Isolate management networks from production and public internet traffic.

Remediation Steps:

  1. Identify all deployed Cisco Unified Computing System and E-Series devices.
  2. Verify the current firmware version running on the IMC.
  3. Download the appropriate patch (4.3(x) or higher for C-Series) from the Cisco Software portal.
  4. Apply the firmware update during a scheduled maintenance window.
  5. Verify that the IMC is accessible and functioning correctly post-update.

References


Read the full report for CVE-2026-20093 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)