CVE-2026-20095
Received Received - Intake
Command Injection in Cisco IMC Web Interface Allows Root Access

Publication date: 2026-04-01

Last updated on: 2026-04-01

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco imc *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to execute arbitrary commands as the root user on the affected system. This means the attacker could gain full control over the system, potentially leading to unauthorized access, data manipulation, disruption of services, or further compromise of the network.


Can you explain this vulnerability to me?

This vulnerability exists in the web-based management interface of Cisco IMC. It allows an authenticated remote attacker with admin-level privileges to perform command injection attacks. By exploiting improper validation of user-supplied input, the attacker can send specially crafted commands to the interface, which are then executed on the underlying operating system with root user privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an authenticated attacker with admin-level privileges to execute arbitrary commands as the root user on the affected system. Such unauthorized root access could lead to data breaches or unauthorized data manipulation.

Because of the potential for unauthorized access and control over sensitive systems, exploitation of this vulnerability could impact compliance with standards and regulations that require protection of sensitive data, such as GDPR and HIPAA.

However, the provided information does not explicitly describe the direct effects on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart