Critical Vulnerabilities in Cisco Products
Summary
CSA Singapore issued an alert about critical CVSS 9.8 vulnerabilities in Cisco products affecting IMC and SSM On-Prem systems. CVE-2026-20093 allows authentication bypass enabling password alteration, while CVE-2026-20160 permits remote root command execution. Organizations using affected Cisco products must update immediately.
What changed
CSA Singapore published a critical security alert identifying two CVEs with CVSS v3.1 scores of 9.8 out of 10 in Cisco products. CVE-2026-20093 is an authentication bypass vulnerability in Cisco Integrated Management Controller affecting 5000 Series Enterprise Network Compute Systems, Catalyst 8300 Series Edge uCPE, and UCS C-Series M5/M6 and E-Series Servers. CVE-2026-20160 is a command execution vulnerability in Cisco Smart Software Manager On-Prem arising from unintentional exposure of an internal service that can be abused via crafted API requests.
Users and administrators of affected products must identify their current versions against the listed affected versions and update to the patched versions immediately. For Cisco IMC: update to 4.15.5, 4.18.3, 4.3(2.260007), 4.3(6.260017), 6.0(1.250174), or 3.2.17/4.15.3 for E-Series. For SSM On-Prem: update to Release 9-202601 or later. Failure to patch leaves systems vulnerable to unauthenticated remote attacks enabling complete system compromise.
What to do next
- Identify all Cisco IMC and SSM On-Prem installations in your environment
- Upgrade affected products to patched versions: IMC 4.15.5/4.18.3/4.3(2.260007)/4.3(6.260017)/6.0(1.250174)/3.2.17/4.15.3; SSM On-Prem 9-202601
- Review access logs for signs of exploitation and reset credentials on affected systems
Source document (simplified)
Alerts
Critical Vulnerabilities in Cisco Products
6 April 2026
Cisco has released security updates to address multiple security vulnerabilities in their products. Users and administrators of affected products are advised to update to the latest versions immediately.
Background
Cisco has released security updates to address security vulnerabilities in Cisco Integrated Management Controller (IMC) (CVE-2026-20093) and Cisco Smart Software Manager On-Prem (SSM On-Prem) (CVE-2026-20160). Both vulnerabilities have a Common Vulnerability Scoring System (CVSS v3.1) score of 9.8 out of 10.
Impact
Successful exploitation of the vulnerabilities could lead to the following:
CVE-2026-20093: Successful exploitation of this authentication bypass vulnerability in Cisco IMC could allow an unauthenticated remote attacker to bypass authentication by sending crafted HTTP requests. This could enable the attacker to alter the passwords of any user, including admin accounts, and gain elevated access to the system.
CVE-2026-20160: Successful exploitation of this vulnerability in Cisco SSM On-Prem could allow an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system with root‑level privileges. The flaw arises from unintentional exposure of an internal service, which can be abused via crafted API requests.
Affected Products
The following product versions are affected by the vulnerabilities.
For CVE-2026-20093:
Cisco 5000 Series Enterprise Network Compute Systems versions prior to 4.15.5
Cisco Catalyst 8300 Series Edge uCPE versions prior to 4.18.3
Cisco UCS C‑Series M5 and M6 Rack Servers versions prior to 4.3(2.260007), 4.3(6.260017), and 6.0(1.250174)
Cisco UCS E‑Series Servers M3 versions prior to 3.2.17
Cisco UCS E‑Series Servers M6 versions prior to 4.15.3
For CVE-2026-20160:Cisco SSM On-Prem Release versions prior to 9‑202601
Mitigation
Users and administrators of affected products are advised to update to the latest versions immediately.
For additional details and guidance, please refer to Cisco’s official advisories for CVE-2026-20093 and CVE-2026-20160 respectively.
References
https://thehackernews.com/2026/04/cisco-patches-98-cvss-imc-and-ssm-flaws.html
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.