CVE-2026-20160
Remote Code Execution in Cisco SSM On-Prem via Exposed API
Publication date: 2026-04-01
Last updated on: 2026-04-01
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | smart_software_manager_on-prem | * |
| cisco | smart_software_manager_on-prem | From 9-202502 (inc) to 9-202510 (inc) |
| cisco | smart_software_manager_on-prem | From 9-202601 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-668 | The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root-level privileges.
This vulnerability occurs because an internal service within SSM On-Prem is unintentionally exposed. An attacker can exploit this by sending a specially crafted request to the API of the exposed service, which leads to arbitrary command execution on the host.
How can this vulnerability impact me? :
The vulnerability allows an unauthenticated attacker to remotely execute commands with root-level privileges on the affected system.
- Complete compromise of the affected SSM On-Prem host.
- Potential unauthorized access to sensitive data.
- Disruption of system availability and integrity.
- No privileges or user interaction are required to exploit this vulnerability, making it highly dangerous.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or methods provided to identify this vulnerability on your network or system.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to upgrade Cisco Smart Software Manager On-Prem to the fixed release version 9-202601 or later.
No workarounds or other mitigations are available, so upgrading is strongly recommended to fully remediate the vulnerability.
Ensure your devices meet hardware and software requirements before upgrading.
If you do not have a valid service contract or purchased through third parties, contact Cisco TAC for upgrade assistance.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability directly affects compliance with common standards and regulations such as GDPR or HIPAA.