CVE-2026-20097
Received Received - Intake
Remote Code Execution via Input Validation Flaw in Cisco IMC

Publication date: 2026-04-01

Last updated on: 2026-04-01

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to execute arbitrary code as the root user. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user. Cisco has assigned this vulnerability a SIR of High rather than Medium as the score indicates because additional security implications could occur when the attacker becomes root.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco imc *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the web-based management interface of Cisco IMC. It allows an authenticated remote attacker who already has admin-level privileges to execute arbitrary code with root user privileges. The root cause is improper validation of user-supplied input to the web interface. An attacker can exploit this by sending specially crafted HTTP requests to the affected device, potentially gaining full control over the underlying operating system.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker to execute arbitrary code as the root user on the affected device. This means the attacker could gain complete control over the system, potentially leading to unauthorized access, data manipulation, disruption of services, or further attacks within the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart