CVE-2026-20151
Privilege Escalation via Sensitive Data Exposure in Cisco SSM On-Prem
Publication date: 2026-04-01
Last updated on: 2026-04-01
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | smart_software_manager_on-prem | * |
| cisco | smart_software_manager_on-prem | to 9-202601 (exc) |
| cisco | smart_software_manager_on-prem | From 9-202601 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-201 | The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability involves the improper transmission of sensitive user information and the potential exposure of session credentials, which could lead to unauthorized privilege escalation on the affected system.
Such exposure of sensitive user information and unauthorized access could negatively impact compliance with data protection regulations like GDPR and HIPAA, which require strict controls over access to personal and sensitive data.
However, the provided information does not explicitly state the direct impact on compliance with these standards or any specific regulatory implications.
Can you explain this vulnerability to me?
CVE-2026-20151 is a high-severity privilege escalation vulnerability in the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem).
It allows an authenticated remote attacker with valid credentials (at least System User role) to elevate privileges from low-level to administrative on the affected system.
The root cause is the improper transmission of sensitive user information, which enables an attacker to send crafted messages to the Cisco SSM On-Prem host and retrieve session credentials from subsequent status messages.
This vulnerability only exposes information about users currently logged into the web interface; SSH sessions are not affected.
How can this vulnerability impact me? :
A successful exploit of this vulnerability could allow an attacker to elevate their privileges on the affected system from a low-level user to an administrative user.
This means the attacker could gain administrative control over the Cisco SSM On-Prem system, potentially allowing them to perform unauthorized actions, access sensitive data, or disrupt system operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or methods provided to identify this vulnerability on your network or system.
The vulnerability requires an authenticated user with at least System User role to exploit it via the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem).
Since the vulnerability involves improper transmission of sensitive user information in status messages, monitoring for unusual crafted messages or session credential leaks might be relevant, but no explicit detection commands are given.
What immediate steps should I take to mitigate this vulnerability?
Cisco strongly recommends upgrading to the fixed software release 9-202601 or later to fully remediate this vulnerability.
No workarounds or mitigations are available for this vulnerability.
Ensure you obtain the fixed software through Cisco or authorized resellers and verify compatibility with your hardware and software environment before upgrading.