CVE-2026-20151
Received Received - Intake
Privilege Escalation via Sensitive Data Exposure in Cisco SSM On-Prem

Publication date: 2026-04-01

Last updated on: 2026-04-01

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges on an affected system. This vulnerability is due to the improper transmission of sensitive user information. An attacker could exploit this vulnerability by sending a crafted message to an affected Cisco SSM On-Prem host and retrieving session credentials from subsequent status messages. A successful exploit could allow the attacker to elevate privileges on the affected system from low to administrative. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of System User. Note: This vulnerability exposes information only about users who logged in to the Cisco SSM On-Prem host using the web interface and who are currently logged in. SSH sessions are not affected.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
cisco smart_software_manager_on-prem *
cisco smart_software_manager_on-prem to 9-202601 (exc)
cisco smart_software_manager_on-prem From 9-202601 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-201 The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability involves the improper transmission of sensitive user information and the potential exposure of session credentials, which could lead to unauthorized privilege escalation on the affected system.

Such exposure of sensitive user information and unauthorized access could negatively impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive data.

However, the provided information does not explicitly state the direct impact on compliance with these standards or any specific regulatory implications.


Can you explain this vulnerability to me?

CVE-2026-20151 is a high-severity privilege escalation vulnerability in the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem).

It allows an authenticated remote attacker with valid credentials (at least System User role) to elevate privileges from low-level to administrative on the affected system.

The root cause is the improper transmission of sensitive user information, which enables an attacker to send crafted messages to the Cisco SSM On-Prem host and retrieve session credentials from subsequent status messages.

This vulnerability only exposes information about users currently logged into the web interface; SSH sessions are not affected.


How can this vulnerability impact me? :

A successful exploit of this vulnerability could allow an attacker to elevate their privileges on the affected system from a low-level user to an administrative user.

This means the attacker could gain administrative control over the Cisco SSM On-Prem system, potentially allowing them to perform unauthorized actions, access sensitive data, or disrupt system operations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or methods provided to identify this vulnerability on your network or system.

The vulnerability requires an authenticated user with at least System User role to exploit it via the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem).

Since the vulnerability involves improper transmission of sensitive user information in status messages, monitoring for unusual crafted messages or session credential leaks might be relevant, but no explicit detection commands are given.


What immediate steps should I take to mitigate this vulnerability?

Cisco strongly recommends upgrading to the fixed software release 9-202601 or later to fully remediate this vulnerability.

No workarounds or mitigations are available for this vulnerability.

Ensure you obtain the fixed software through Cisco or authorized resellers and verify compatibility with your hardware and software environment before upgrading.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart