Refine your search

23 vulnerabilities found for Cisco Unified Computing System E-Series Software (UCSE) by Cisco

CVE-2026-20090 (GCVE-0-2026-20090)
Vulnerability from cvelistv5
Published
2026-04-01 16:34
Modified
2026-04-01 17:44
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(4j)
Version: 4.0(2m)
Version: 4.0(2k)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3g)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240041)
Version: 4.2(3k)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250039)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20090",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T17:43:50.354293Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-01T17:44:31.903Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240041)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:34:57.753Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-xss-A2tkgVAB",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-A2tkgVAB"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-xss-A2tkgVAB",
        "defects": [
          "CSCwr60948"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20090",
    "datePublished": "2026-04-01T16:34:57.753Z",
    "dateReserved": "2025-10-08T11:59:15.368Z",
    "dateUpdated": "2026-04-01T17:44:31.903Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20089 (GCVE-0-2026-20089)
Vulnerability from cvelistv5
Published
2026-04-01 16:34
Modified
2026-04-01 17:45
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(4j)
Version: 4.0(2m)
Version: 4.0(2k)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3g)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240041)
Version: 4.2(3k)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250039)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20089",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T17:44:47.477553Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-01T17:45:22.998Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240041)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:34:48.793Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-xss-A2tkgVAB",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-A2tkgVAB"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-xss-A2tkgVAB",
        "defects": [
          "CSCwr60944"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20089",
    "datePublished": "2026-04-01T16:34:48.793Z",
    "dateReserved": "2025-10-08T11:59:15.368Z",
    "dateUpdated": "2026-04-01T17:45:22.998Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20087 (GCVE-0-2026-20087)
Vulnerability from cvelistv5
Published
2026-04-01 16:34
Modified
2026-04-01 17:50
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Version: 4.15.5
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(4j)
Version: 4.0(2m)
Version: 4.0(2k)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3g)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240041)
Version: 4.2(3k)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250039)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20087",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T17:50:01.177510Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-01T17:50:56.617Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            },
            {
              "status": "affected",
              "version": "4.15.5"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240041)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:34:40.865Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-xss-A2tkgVAB",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-A2tkgVAB"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-xss-A2tkgVAB",
        "defects": [
          "CSCwr60933"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20087",
    "datePublished": "2026-04-01T16:34:40.865Z",
    "dateReserved": "2025-10-08T11:59:15.367Z",
    "dateUpdated": "2026-04-01T17:50:56.617Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20088 (GCVE-0-2026-20088)
Vulnerability from cvelistv5
Published
2026-04-01 16:34
Modified
2026-04-01 17:55
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(6.250039)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 3.2.15
Version: 3.2.15.3
Version: 3.2.16.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20088",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T17:55:03.494571Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-01T17:55:20.021Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with administrative privileges to conduct a stored XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:34:40.845Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-xss-A2tkgVAB",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-A2tkgVAB"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-xss-A2tkgVAB",
        "defects": [
          "CSCwr60943"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20088",
    "datePublished": "2026-04-01T16:34:40.845Z",
    "dateReserved": "2025-10-08T11:59:15.367Z",
    "dateUpdated": "2026-04-01T17:55:20.021Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20096 (GCVE-0-2026-20096)
Vulnerability from cvelistv5
Published
2026-04-01 16:29
Modified
2026-04-02 03:56
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(4j)
Version: 4.0(2m)
Version: 4.0(2k)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3g)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240041)
Version: 4.2(3k)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250039)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20096",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-02T03:56:17.375Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240041)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and\u0026nbsp;execute arbitrary commands as the root user.\r\n\r\nThis vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:29:03.545Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-cmd-inj-3hKN3bVt",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-cmd-inj-3hKN3bVt",
        "defects": [
          "CSCwr60894"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20096",
    "datePublished": "2026-04-01T16:29:03.545Z",
    "dateReserved": "2025-10-08T11:59:15.369Z",
    "dateUpdated": "2026-04-02T03:56:17.375Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20094 (GCVE-0-2026-20094)
Vulnerability from cvelistv5
Published
2026-04-01 16:28
Modified
2026-04-02 03:56
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with read-only privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(4j)
Version: 4.0(2m)
Version: 4.0(2k)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3g)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240041)
Version: 4.2(3k)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250039)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20094",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-02T03:56:15.176Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240041)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with read-only privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user.\r\n\r\nThis vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:28:50.641Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-cmd-inj-3hKN3bVt",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-cmd-inj-3hKN3bVt",
        "defects": [
          "CSCwr60021"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20094",
    "datePublished": "2026-04-01T16:28:50.641Z",
    "dateReserved": "2025-10-08T11:59:15.369Z",
    "dateUpdated": "2026-04-02T03:56:15.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20095 (GCVE-0-2026-20095)
Vulnerability from cvelistv5
Published
2026-04-01 16:28
Modified
2026-04-02 03:56
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and execute arbitrary commands as the root user. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(4j)
Version: 4.0(2m)
Version: 4.0(2k)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3g)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240041)
Version: 4.2(3k)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250039)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20095",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-02T03:56:14.022Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240041)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to perform command injection attacks on an affected system and\u0026nbsp;execute arbitrary commands as the root user.\r\n\r\nThis vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user. Cisco has assigned this vulnerability a Security Impact Rating (SIR) of High, rather than Medium as the score indicates, because additional security implications could occur once the attacker has become root."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:28:47.898Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-cmd-inj-3hKN3bVt",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-cmd-inj-3hKN3bVt",
        "defects": [
          "CSCwr60889"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20095",
    "datePublished": "2026-04-01T16:28:47.898Z",
    "dateReserved": "2025-10-08T11:59:15.369Z",
    "dateUpdated": "2026-04-02T03:56:14.022Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20093 (GCVE-0-2026-20093)
Vulnerability from cvelistv5
Published
2026-04-01 16:28
Modified
2026-04-02 03:56
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that user.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(6.250039)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 4.3(6.260003)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20093",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-02T03:56:12.925Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as\u0026nbsp;Admin.\r\n\r\nThis vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an\u0026nbsp;Admin user, and gain access to the system as that user."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:28:38.714Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-auth-bypass-AgG2BxTn",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-auth-bypass-AgG2BxTn",
        "defects": [
          "CSCwq55659"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Authentication Bypass Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20093",
    "datePublished": "2026-04-01T16:28:38.714Z",
    "dateReserved": "2025-10-08T11:59:15.368Z",
    "dateUpdated": "2026-04-02T03:56:12.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-20085 (GCVE-0-2026-20085)
Vulnerability from cvelistv5
Published
2026-04-01 16:27
Modified
2026-04-01 18:14
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A vulnerability in the web-based management interface of Cisco IMC could allow an unauthenticated, remote attacker to conduct a reflected XSS attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Enterprise NFV Infrastructure Software Version: 4.1.1
Version: 3.9.1
Version: 3.5.2
Version: 3.12.2
Version: 3.6.2
Version: 3.9.2
Version: 3.11.3
Version: 3.11.1
Version: 3.5.1
Version: 3.3.1
Version: 3.10.2
Version: 3.12.1b
Version: 3.4.1
Version: 3.12.1a
Version: 3.6.3
Version: 3.8.1
Version: 3.11.2
Version: 3.12.1
Version: 3.12.3
Version: 3.10.1
Version: 3.6.1
Version: 3.10.3
Version: 3.7.1
Version: 4.1.2
Version: 4.2.1
Version: 4.2.2
Version: 4.4.1
Version: 4.4.2
Version: 4.5.1
Version: 4.4.3
Version: 4.6.1
Version: 4.7.1
Version: 4.6.2-FC2
Version: 4.6.2-FC3
Version: 4.6.2
Version: 4.8.1
Version: 4.8.2
Version: 4.9.1
Version: 4.6.3
Version: 4.9.2-FC5
Version: 4.9.2
Version: 4.10.1
Version: 4.9.3
Version: 4.11.1
Version: 4.9.4
Version: 4.12.1
Version: 4.6.4
Version: 4.12.2
Version: 4.13.1
Version: 4.9.4-ES8
Version: 4.9.5
Version: 4.12.3
Version: 4.6.5-ES1
Version: 4.9.4-ES9
Version: 4.14.1
Version: 4.6.3-FC4
Version: 4.9.4-FC3
Version: 4.12.4
Version: 4.15.1
Version: 4.9.6
Version: 4.16.1
Version: 4.15.2
Version: 4.12.5
Version: 4.15.3
Version: 4.15.4
Version: 4.18.1
Version: 4.12.6
Version: 4.18.2
Version: 4.18.2a
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 4.0(2g)
Version: 3.1(2i)
Version: 3.1(1d)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 4.0(2c)
Version: 4.0(1e)
Version: 4.0(2h)
Version: 4.0(4h)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 3.1(3g)
Version: 4.0(1.240)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 4.0(2i)
Version: 3.1(3i)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(5.250001)
Version: 4.2(3o)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(5.250030)
Version: 4.3(2.250022)
Version: 4.3(6.250040)
Version: 4.3(5.250033)
Version: 4.3(6.250044)
Version: 4.3(6.250053)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Version: 4.3(4.252002)
Version: 6.0(1.250127)
Version: 4.2(3p)
Version: 6.0(1.250131)
Version: 4.3(6.250101)
Version: 6.0(1.250174)
Version: 4.3(6.250117)
Version: 4.3(5.250043)
Version: 4.3(6.250039)
Version: 4.3(5.250045)
Version: 4.3(6.250060)
Version: 6.0(1.250130)
Version: 4.3(4.241014)
Version: 4.3(2.250063)
Version: 6.0(1.250192)
Version: 4.3(6.260003)
Version: 6.0(1.250194)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 4.00
Version: 4.15.2
Version: 4.02
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-20085",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-04-01T18:14:21.097192Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-04-01T18:14:27.779Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Enterprise NFV Infrastructure Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.1.1"
            },
            {
              "status": "affected",
              "version": "3.9.1"
            },
            {
              "status": "affected",
              "version": "3.5.2"
            },
            {
              "status": "affected",
              "version": "3.12.2"
            },
            {
              "status": "affected",
              "version": "3.6.2"
            },
            {
              "status": "affected",
              "version": "3.9.2"
            },
            {
              "status": "affected",
              "version": "3.11.3"
            },
            {
              "status": "affected",
              "version": "3.11.1"
            },
            {
              "status": "affected",
              "version": "3.5.1"
            },
            {
              "status": "affected",
              "version": "3.3.1"
            },
            {
              "status": "affected",
              "version": "3.10.2"
            },
            {
              "status": "affected",
              "version": "3.12.1b"
            },
            {
              "status": "affected",
              "version": "3.4.1"
            },
            {
              "status": "affected",
              "version": "3.12.1a"
            },
            {
              "status": "affected",
              "version": "3.6.3"
            },
            {
              "status": "affected",
              "version": "3.8.1"
            },
            {
              "status": "affected",
              "version": "3.11.2"
            },
            {
              "status": "affected",
              "version": "3.12.1"
            },
            {
              "status": "affected",
              "version": "3.12.3"
            },
            {
              "status": "affected",
              "version": "3.10.1"
            },
            {
              "status": "affected",
              "version": "3.6.1"
            },
            {
              "status": "affected",
              "version": "3.10.3"
            },
            {
              "status": "affected",
              "version": "3.7.1"
            },
            {
              "status": "affected",
              "version": "4.1.2"
            },
            {
              "status": "affected",
              "version": "4.2.1"
            },
            {
              "status": "affected",
              "version": "4.2.2"
            },
            {
              "status": "affected",
              "version": "4.4.1"
            },
            {
              "status": "affected",
              "version": "4.4.2"
            },
            {
              "status": "affected",
              "version": "4.5.1"
            },
            {
              "status": "affected",
              "version": "4.4.3"
            },
            {
              "status": "affected",
              "version": "4.6.1"
            },
            {
              "status": "affected",
              "version": "4.7.1"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC2"
            },
            {
              "status": "affected",
              "version": "4.6.2-FC3"
            },
            {
              "status": "affected",
              "version": "4.6.2"
            },
            {
              "status": "affected",
              "version": "4.8.1"
            },
            {
              "status": "affected",
              "version": "4.8.2"
            },
            {
              "status": "affected",
              "version": "4.9.1"
            },
            {
              "status": "affected",
              "version": "4.6.3"
            },
            {
              "status": "affected",
              "version": "4.9.2-FC5"
            },
            {
              "status": "affected",
              "version": "4.9.2"
            },
            {
              "status": "affected",
              "version": "4.10.1"
            },
            {
              "status": "affected",
              "version": "4.9.3"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.9.4"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "4.6.4"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "4.13.1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES8"
            },
            {
              "status": "affected",
              "version": "4.9.5"
            },
            {
              "status": "affected",
              "version": "4.12.3"
            },
            {
              "status": "affected",
              "version": "4.6.5-ES1"
            },
            {
              "status": "affected",
              "version": "4.9.4-ES9"
            },
            {
              "status": "affected",
              "version": "4.14.1"
            },
            {
              "status": "affected",
              "version": "4.6.3-FC4"
            },
            {
              "status": "affected",
              "version": "4.9.4-FC3"
            },
            {
              "status": "affected",
              "version": "4.12.4"
            },
            {
              "status": "affected",
              "version": "4.15.1"
            },
            {
              "status": "affected",
              "version": "4.9.6"
            },
            {
              "status": "affected",
              "version": "4.16.1"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.12.5"
            },
            {
              "status": "affected",
              "version": "4.15.3"
            },
            {
              "status": "affected",
              "version": "4.15.4"
            },
            {
              "status": "affected",
              "version": "4.18.1"
            },
            {
              "status": "affected",
              "version": "4.12.6"
            },
            {
              "status": "affected",
              "version": "4.18.2"
            },
            {
              "status": "affected",
              "version": "4.18.2a"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250001)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250030)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250040)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250033)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250044)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250053)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250127)"
            },
            {
              "status": "affected",
              "version": "4.2(3p)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250131)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250101)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250174)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250117)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250043)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250039)"
            },
            {
              "status": "affected",
              "version": "4.3(5.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(6.250060)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250130)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241014)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250063)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250192)"
            },
            {
              "status": "affected",
              "version": "4.3(6.260003)"
            },
            {
              "status": "affected",
              "version": "6.0(1.250194)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "4.00"
            },
            {
              "status": "affected",
              "version": "4.15.2"
            },
            {
              "status": "affected",
              "version": "4.02"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco IMC could allow an unauthenticated, remote attacker to conduct a reflected XSS attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-04-01T16:27:58.940Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-xss-A2tkgVAB",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-A2tkgVAB"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-xss-A2tkgVAB",
        "defects": [
          "CSCwr60930"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Cisco Integrated Management Controller Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2026-20085",
    "datePublished": "2026-04-01T16:27:58.940Z",
    "dateReserved": "2025-10-08T11:59:15.367Z",
    "dateUpdated": "2026-04-01T18:14:27.779Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-20342 (GCVE-0-2025-20342)
Vulnerability from cvelistv5
Published
2025-08-27 16:23
Modified
2025-08-27 17:38
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with low privileges to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid user credentials with privileges that allow for vKVM access on the affected device. Note: The affected vKVM client is also included in Cisco UCS Manager.
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Managed) Version: 4.0(1a)
Version: 3.2(3n)
Version: 4.1(1a)
Version: 4.1(1b)
Version: 4.0(4h)
Version: 4.1(1c)
Version: 3.2(3k)
Version: 3.2(2c)
Version: 4.0(4e)
Version: 4.0(4g)
Version: 3.2(3i)
Version: 4.0(2e)
Version: 3.2(3g)
Version: 4.0(4a)
Version: 4.0(2d)
Version: 3.2(2d)
Version: 4.0(1b)
Version: 4.0(4f)
Version: 3.2(3h)
Version: 3.2(2f)
Version: 4.0(4c)
Version: 3.2(3a)
Version: 4.0(1c)
Version: 3.2(3d)
Version: 3.2(2b)
Version: 4.0(4b)
Version: 3.2(2e)
Version: 4.0(2b)
Version: 4.0(4d)
Version: 3.2(1d)
Version: 3.2(3e)
Version: 3.2(3l)
Version: 3.2(3b)
Version: 4.0(2a)
Version: 3.2(3j)
Version: 4.0(1d)
Version: 3.2(3o)
Version: 4.0(4i)
Version: 4.1(1d)
Version: 4.1(2a)
Version: 4.1(1e)
Version: 3.2(3p)
Version: 4.1(2b)
Version: 4.0(4k)
Version: 4.1(3a)
Version: 4.1(3b)
Version: 4.1(2c)
Version: 4.0(4l)
Version: 4.1(4a)
Version: 4.1(3c)
Version: 4.1(3d)
Version: 4.2(1c)
Version: 4.2(1d)
Version: 4.0(4m)
Version: 4.1(3e)
Version: 4.2(1f)
Version: 4.1(3f)
Version: 4.2(1i)
Version: 4.1(3h)
Version: 4.2(1k)
Version: 4.2(1l)
Version: 4.0(4n)
Version: 4.2(1m)
Version: 4.1(3i)
Version: 4.2(2a)
Version: 4.2(1n)
Version: 4.1(3j)
Version: 4.2(2c)
Version: 4.2(2d)
Version: 4.2(3b)
Version: 4.1(3k)
Version: 4.0(4o)
Version: 4.2(2e)
Version: 4.2(3d)
Version: 4.2(3e)
Version: 4.2(3g)
Version: 4.1(3l)
Version: 4.3(2b)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2c)
Version: 4.1(3m)
Version: 4.3(2e)
Version: 4.3(3a)
Version: 4.2(3j)
Version: 4.3(3c)
Version: 4.3(4a)
Version: 4.2(3k)
Version: 4.3(4b)
Version: 4.3(4c)
Version: 4.2(3l)
Version: 4.3(4d)
Version: 4.3(2f)
Version: 4.2(3m)
Version: 4.3(5a)
Version: 4.3(4e)
Version: 4.1(3n)
Version: 4.3(4f)
Version: 4.2(3n)
Version: 4.3(5c)
Version: 4.2(3o)
Version: 4.3(5d)
Version: 4.3(5e)
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 2.0(1a)
Version: 4.0(2g)
Version: 2.0(13f)
Version: 3.0(4n)
Version: 2.0(3e)1
Version: 3.0(3e)
Version: 2.0(8h)
Version: 2.0(10g)
Version: 3.1(2i)
Version: 3.0(3c)
Version: 3.0(4m)
Version: 3.1(1d)
Version: 3.0(3a)
Version: 3.0(1d)
Version: 2.0(9o)
Version: 2.0(13n)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 2.0(13q)
Version: 2.0(3j)1
Version: 4.0(2c)
Version: 2.0(9n)
Version: 4.0(1e)
Version: 2.0(13o)
Version: 2.0(6f)
Version: 2.0(10c)
Version: 2.0(8d)
Version: 2.0(9m)
Version: 4.0(2h)
Version: 3.0(4j)
Version: 2.0(10i)
Version: 3.0(3f)
Version: 2.0(10l)
Version: 2.0(12e)
Version: 2.0(12i)
Version: 2.0(10h)
Version: 2.0(13e)
Version: 3.0(4k)
Version: 2.0(10b)
Version: 2.0(6d)
Version: 2.0(12b)
Version: 4.0(4h)
Version: 2.0(12h)
Version: 2.0(10f)
Version: 3.0(4l)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 2.0(3i)
Version: 2.0(3f)3
Version: 3.0(4a)
Version: 2.0(13p)
Version: 2.0(9l)
Version: 2.0(12g)
Version: 2.0(12c)
Version: 2.0(12f)
Version: 2.0(13k)
Version: 3.0(3b)
Version: 2.0(1b)
Version: 3.1(3g)
Version: 2.0(4c)
Version: 4.0(1.240)
Version: 2.0(12d)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 3.0(4d)
Version: 3.0(2b)
Version: 2.0(3d)2
Version: 2.0(3d)1
Version: 2.0(9f)
Version: 2.0(13h)
Version: 3.0(4e)
Version: 2.0(8g)
Version: 4.0(2i)
Version: 2.0(10e)
Version: 2.0(13i)
Version: 2.0(9c)
Version: 2.0(4c)1
Version: 3.0(1c)
Version: 2.0(8e)
Version: 2.0(9e)
Version: 2.0(9p)
Version: 3.1(3i)
Version: 3.0(4i)
Version: 2.0(10k)
Version: 3.0(4o)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 3.0(4p)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 3.0(4q)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 3.0(4r)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 3.0(4s)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(2.250022)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252001)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 2.02
Version: 4.00
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20342",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-27T17:19:43.762688Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T17:38:30.823Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Managed)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "3.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.1(1a)"
            },
            {
              "status": "affected",
              "version": "4.1(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "3.2(3k)"
            },
            {
              "status": "affected",
              "version": "3.2(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "4.0(4g)"
            },
            {
              "status": "affected",
              "version": "3.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(2e)"
            },
            {
              "status": "affected",
              "version": "3.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(4a)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "3.2(2d)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "3.2(3h)"
            },
            {
              "status": "affected",
              "version": "3.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.2(3a)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "3.2(3d)"
            },
            {
              "status": "affected",
              "version": "3.2(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.2(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.2(1d)"
            },
            {
              "status": "affected",
              "version": "3.2(3e)"
            },
            {
              "status": "affected",
              "version": "3.2(3l)"
            },
            {
              "status": "affected",
              "version": "3.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2a)"
            },
            {
              "status": "affected",
              "version": "3.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(1e)"
            },
            {
              "status": "affected",
              "version": "3.2(3p)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "4.1(3a)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(4a)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(1k)"
            },
            {
              "status": "affected",
              "version": "4.2(1l)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.2(1m)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.2(1n)"
            },
            {
              "status": "affected",
              "version": "4.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.2(2c)"
            },
            {
              "status": "affected",
              "version": "4.2(2d)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.0(4o)"
            },
            {
              "status": "affected",
              "version": "4.2(2e)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2b)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2c)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2e)"
            },
            {
              "status": "affected",
              "version": "4.3(3a)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.3(3c)"
            },
            {
              "status": "affected",
              "version": "4.3(4a)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(4b)"
            },
            {
              "status": "affected",
              "version": "4.3(4c)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(4d)"
            },
            {
              "status": "affected",
              "version": "4.3(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(5a)"
            },
            {
              "status": "affected",
              "version": "4.3(4e)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(4f)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5c)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(5d)"
            },
            {
              "status": "affected",
              "version": "4.3(5e)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "2.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "2.0(13f)"
            },
            {
              "status": "affected",
              "version": "3.0(4n)"
            },
            {
              "status": "affected",
              "version": "2.0(3e)1"
            },
            {
              "status": "affected",
              "version": "3.0(3e)"
            },
            {
              "status": "affected",
              "version": "2.0(8h)"
            },
            {
              "status": "affected",
              "version": "2.0(10g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.0(3c)"
            },
            {
              "status": "affected",
              "version": "3.0(4m)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.0(3a)"
            },
            {
              "status": "affected",
              "version": "3.0(1d)"
            },
            {
              "status": "affected",
              "version": "2.0(9o)"
            },
            {
              "status": "affected",
              "version": "2.0(13n)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "2.0(13q)"
            },
            {
              "status": "affected",
              "version": "2.0(3j)1"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "2.0(9n)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "2.0(13o)"
            },
            {
              "status": "affected",
              "version": "2.0(6f)"
            },
            {
              "status": "affected",
              "version": "2.0(10c)"
            },
            {
              "status": "affected",
              "version": "2.0(8d)"
            },
            {
              "status": "affected",
              "version": "2.0(9m)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "3.0(4j)"
            },
            {
              "status": "affected",
              "version": "2.0(10i)"
            },
            {
              "status": "affected",
              "version": "3.0(3f)"
            },
            {
              "status": "affected",
              "version": "2.0(10l)"
            },
            {
              "status": "affected",
              "version": "2.0(12e)"
            },
            {
              "status": "affected",
              "version": "2.0(12i)"
            },
            {
              "status": "affected",
              "version": "2.0(10h)"
            },
            {
              "status": "affected",
              "version": "2.0(13e)"
            },
            {
              "status": "affected",
              "version": "3.0(4k)"
            },
            {
              "status": "affected",
              "version": "2.0(10b)"
            },
            {
              "status": "affected",
              "version": "2.0(6d)"
            },
            {
              "status": "affected",
              "version": "2.0(12b)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "2.0(12h)"
            },
            {
              "status": "affected",
              "version": "2.0(10f)"
            },
            {
              "status": "affected",
              "version": "3.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "2.0(3i)"
            },
            {
              "status": "affected",
              "version": "2.0(3f)3"
            },
            {
              "status": "affected",
              "version": "3.0(4a)"
            },
            {
              "status": "affected",
              "version": "2.0(13p)"
            },
            {
              "status": "affected",
              "version": "2.0(9l)"
            },
            {
              "status": "affected",
              "version": "2.0(12g)"
            },
            {
              "status": "affected",
              "version": "2.0(12c)"
            },
            {
              "status": "affected",
              "version": "2.0(12f)"
            },
            {
              "status": "affected",
              "version": "2.0(13k)"
            },
            {
              "status": "affected",
              "version": "3.0(3b)"
            },
            {
              "status": "affected",
              "version": "2.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "2.0(4c)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "2.0(12d)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "3.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.0(2b)"
            },
            {
              "status": "affected",
              "version": "2.0(3d)2"
            },
            {
              "status": "affected",
              "version": "2.0(3d)1"
            },
            {
              "status": "affected",
              "version": "2.0(9f)"
            },
            {
              "status": "affected",
              "version": "2.0(13h)"
            },
            {
              "status": "affected",
              "version": "3.0(4e)"
            },
            {
              "status": "affected",
              "version": "2.0(8g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "2.0(10e)"
            },
            {
              "status": "affected",
              "version": "2.0(13i)"
            },
            {
              "status": "affected",
              "version": "2.0(9c)"
            },
            {
              "status": "affected",
              "version": "2.0(4c)1"
            },
            {
              "status": "affected",
              "version": "3.0(1c)"
            },
            {
              "status": "affected",
              "version": "2.0(8e)"
            },
            {
              "status": "affected",
              "version": "2.0(9e)"
            },
            {
              "status": "affected",
              "version": "2.0(9p)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "3.0(4i)"
            },
            {
              "status": "affected",
              "version": "2.0(10k)"
            },
            {
              "status": "affected",
              "version": "3.0(4o)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "3.0(4p)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "3.0(4q)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "3.0(4r)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "3.0(4s)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252001)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "2.02"
            },
            {
              "status": "affected",
              "version": "4.00"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with low privileges to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid user credentials with privileges that allow for vKVM access on the affected device.\r\nNote: The affected vKVM client is also included in Cisco UCS Manager."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-27T16:23:18.618Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ucs-kvmsxss-6h7AnUyk",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-kvmsxss-6h7AnUyk"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ucs-kvmsxss-6h7AnUyk",
        "defects": [
          "CSCwm57433"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller Virtual Keyboard Video Monitor (vKVM) Stored Cross-Site Scripting Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20342",
    "datePublished": "2025-08-27T16:23:18.618Z",
    "dateReserved": "2024-10-10T19:15:13.255Z",
    "dateUpdated": "2025-08-27T17:38:30.823Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20317 (GCVE-0-2025-20317)
Vulnerability from cvelistv5
Published
2025-08-27 16:23
Modified
2025-08-27 18:52
CWE
  • CWE-601 - URL Redirection to Untrusted Site ('Open Redirect')
Summary
A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to redirect a user to a malicious website. This vulnerability is due to insufficient verification of vKVM endpoints. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious webpage and potentially capture user credentials. Note: The affected vKVM client is also included in Cisco UCS Manager.
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Managed) Version: 4.0(1a)
Version: 3.2(3n)
Version: 4.1(1a)
Version: 4.1(1b)
Version: 4.0(4h)
Version: 4.1(1c)
Version: 3.2(3k)
Version: 3.2(2c)
Version: 4.0(4e)
Version: 4.0(4g)
Version: 3.2(3i)
Version: 4.0(2e)
Version: 3.2(3g)
Version: 4.0(4a)
Version: 4.0(2d)
Version: 3.2(2d)
Version: 4.0(1b)
Version: 4.0(4f)
Version: 3.2(3h)
Version: 3.2(2f)
Version: 4.0(4c)
Version: 3.2(3a)
Version: 4.0(1c)
Version: 3.2(3d)
Version: 3.2(2b)
Version: 4.0(4b)
Version: 3.2(2e)
Version: 4.0(2b)
Version: 4.0(4d)
Version: 3.2(1d)
Version: 3.2(3e)
Version: 3.2(3l)
Version: 3.2(3b)
Version: 4.0(2a)
Version: 3.2(3j)
Version: 4.0(1d)
Version: 3.2(3o)
Version: 4.0(4i)
Version: 4.1(1d)
Version: 4.1(2a)
Version: 4.1(1e)
Version: 3.2(3p)
Version: 4.1(2b)
Version: 4.0(4k)
Version: 4.1(3a)
Version: 4.1(3b)
Version: 4.1(2c)
Version: 4.0(4l)
Version: 4.1(4a)
Version: 4.1(3c)
Version: 4.1(3d)
Version: 4.2(1c)
Version: 4.2(1d)
Version: 4.0(4m)
Version: 4.1(3e)
Version: 4.2(1f)
Version: 4.1(3f)
Version: 4.2(1i)
Version: 4.1(3h)
Version: 4.2(1k)
Version: 4.2(1l)
Version: 4.0(4n)
Version: 4.2(1m)
Version: 4.1(3i)
Version: 4.2(2a)
Version: 4.2(1n)
Version: 4.1(3j)
Version: 4.2(2c)
Version: 4.2(2d)
Version: 4.2(3b)
Version: 4.1(3k)
Version: 4.0(4o)
Version: 4.2(2e)
Version: 4.2(3d)
Version: 4.2(3e)
Version: 4.2(3g)
Version: 4.1(3l)
Version: 4.3(2b)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2c)
Version: 4.1(3m)
Version: 4.3(2e)
Version: 4.3(3a)
Version: 4.2(3j)
Version: 4.3(3c)
Version: 4.3(4a)
Version: 4.2(3k)
Version: 4.3(4b)
Version: 4.3(4c)
Version: 4.2(3l)
Version: 4.3(4d)
Version: 4.3(2f)
Version: 4.2(3m)
Version: 4.3(5a)
Version: 4.3(4e)
Version: 4.1(3n)
Version: 4.3(4f)
Version: 4.2(3n)
Version: 4.3(5c)
Version: 4.2(3o)
Version: 4.3(5d)
Version: 4.3(5e)
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 2.0(1a)
Version: 4.0(2g)
Version: 2.0(13f)
Version: 3.0(4n)
Version: 2.0(3e)1
Version: 3.0(3e)
Version: 2.0(8h)
Version: 2.0(10g)
Version: 3.1(2i)
Version: 3.0(3c)
Version: 3.0(4m)
Version: 3.1(1d)
Version: 3.0(3a)
Version: 3.0(1d)
Version: 2.0(9o)
Version: 2.0(13n)
Version: 4.0(4i)
Version: 4.1(1c)
Version: 2.0(13q)
Version: 2.0(3j)1
Version: 4.0(2c)
Version: 2.0(9n)
Version: 4.0(1e)
Version: 2.0(13o)
Version: 2.0(6f)
Version: 2.0(10c)
Version: 2.0(8d)
Version: 2.0(9m)
Version: 4.0(2h)
Version: 3.0(4j)
Version: 2.0(10i)
Version: 3.0(3f)
Version: 2.0(10l)
Version: 2.0(12e)
Version: 2.0(12i)
Version: 2.0(10h)
Version: 2.0(13e)
Version: 3.0(4k)
Version: 2.0(10b)
Version: 2.0(6d)
Version: 2.0(12b)
Version: 4.0(4h)
Version: 2.0(12h)
Version: 2.0(10f)
Version: 3.0(4l)
Version: 4.0(1h)
Version: 4.0(2l)
Version: 2.0(3i)
Version: 2.0(3f)3
Version: 3.0(4a)
Version: 2.0(13p)
Version: 2.0(9l)
Version: 2.0(12g)
Version: 2.0(12c)
Version: 2.0(12f)
Version: 2.0(13k)
Version: 3.0(3b)
Version: 2.0(1b)
Version: 3.1(3g)
Version: 2.0(4c)
Version: 4.0(1.240)
Version: 2.0(12d)
Version: 4.0(2f)
Version: 4.0(1g)
Version: 3.0(4d)
Version: 3.0(2b)
Version: 2.0(3d)2
Version: 2.0(3d)1
Version: 2.0(9f)
Version: 2.0(13h)
Version: 3.0(4e)
Version: 2.0(8g)
Version: 4.0(2i)
Version: 2.0(10e)
Version: 2.0(13i)
Version: 2.0(9c)
Version: 2.0(4c)1
Version: 3.0(1c)
Version: 2.0(8e)
Version: 2.0(9e)
Version: 2.0(9p)
Version: 3.1(3i)
Version: 3.0(4i)
Version: 2.0(10k)
Version: 3.0(4o)
Version: 4.0(4d)
Version: 4.1(1d)
Version: 3.1(3c)
Version: 4.0(4k)
Version: 3.1(2d)
Version: 3.1(3a)
Version: 3.1(3j)
Version: 4.0(2d)
Version: 4.1(1f)
Version: 3.0(4p)
Version: 4.0(1c)
Version: 4.0(4f)
Version: 4.0(4c)
Version: 3.1(3d)
Version: 3.1(2g)
Version: 3.1(2c)
Version: 4.0(1d)
Version: 3.1(2e)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 3.1(3b)
Version: 4.0(4b)
Version: 3.1(2b)
Version: 4.0(4e)
Version: 3.1(3h)
Version: 3.0(4q)
Version: 4.0(4l)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 3.0(4r)
Version: 4.0(2n)
Version: 4.1(1h)
Version: 3.1(3k)
Version: 4.1(2b)
Version: 4.0(2o)
Version: 4.0(4m)
Version: 4.1(2d)
Version: 4.1(3b)
Version: 4.0(2p)
Version: 4.1(2e)
Version: 4.1(2f)
Version: 3.0(4s)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.1(3c)
Version: 4.0(2r)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(2h)
Version: 4.1(3f)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(3h)
Version: 4.2(2a)
Version: 4.1(3i)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.1(3l)
Version: 4.2(3d)
Version: 4.3(1.230097)
Version: 4.2(1e)
Version: 4.2(1b)
Version: 4.2(1j)
Version: 4.2(1i)
Version: 4.2(1f)
Version: 4.2(1a)
Version: 4.2(1c)
Version: 4.2(1g)
Version: 4.3(1.230124)
Version: 4.1(2l)
Version: 4.2(3e)
Version: 4.3(1.230138)
Version: 4.2(3g)
Version: 4.3(2.230207)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(2.230270)
Version: 4.1(3m)
Version: 4.1(2m)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Version: 4.2(3j)
Version: 4.1(3n)
Version: 4.3(2.240009)
Version: 4.3(3.240043)
Version: 4.3(4.240142)
Version: 4.3(2.240037)
Version: 4.3(2.240053)
Version: 4.3(4.240152)
Version: 4.2(3l)
Version: 4.3(2.240077)
Version: 4.3(4.242028)
Version: 4.3(4.241063)
Version: 4.3(4.242038)
Version: 4.2(3m)
Version: 4.3(2.240090)
Version: 4.3(5.240021)
Version: 4.3(2.240107)
Version: 4.3(4.242066)
Version: 4.2(3n)
Version: 4.3(2.250016)
Version: 4.3(2.250021)
Version: 4.3(2.250022)
Version: 4.3(2.250037)
Version: 4.3(2.250045)
Version: 4.3(4.252002)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 3.2.7
Version: 3.2.6
Version: 3.2.4
Version: 3.2.10
Version: 3.2.2
Version: 3.2.3
Version: 2.4.0
Version: 3.2.1
Version: 3.2.11.1
Version: 3.2.8
Version: 3.1.1
Version: 3.0.2
Version: 2.1.0
Version: 2.2.2
Version: 3.1.2
Version: 3.0.1
Version: 2.3.2
Version: 2.3.5
Version: 2.2.1
Version: 3.1.4
Version: 2.4.1
Version: 2.3.1
Version: 3.1.3
Version: 2.3.3
Version: 2.4.2
Version: 3.1.5
Version: 3.1.0
Version: 2.0.0
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 4.11.1
Version: 3.2.15
Version: 4.12.1
Version: 3.2.15.3
Version: 4.12.2
Version: 3.2.16.1
Version: 2.02
Version: 4.00
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20317",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-27T18:51:46.552039Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T18:52:07.395Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Managed)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "3.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.1(1a)"
            },
            {
              "status": "affected",
              "version": "4.1(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "3.2(3k)"
            },
            {
              "status": "affected",
              "version": "3.2(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "4.0(4g)"
            },
            {
              "status": "affected",
              "version": "3.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.0(2e)"
            },
            {
              "status": "affected",
              "version": "3.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.0(4a)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "3.2(2d)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "3.2(3h)"
            },
            {
              "status": "affected",
              "version": "3.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.2(3a)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "3.2(3d)"
            },
            {
              "status": "affected",
              "version": "3.2(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.2(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.2(1d)"
            },
            {
              "status": "affected",
              "version": "3.2(3e)"
            },
            {
              "status": "affected",
              "version": "3.2(3l)"
            },
            {
              "status": "affected",
              "version": "3.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2a)"
            },
            {
              "status": "affected",
              "version": "3.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(1e)"
            },
            {
              "status": "affected",
              "version": "3.2(3p)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "4.1(3a)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(4a)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(1k)"
            },
            {
              "status": "affected",
              "version": "4.2(1l)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.2(1m)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.2(1n)"
            },
            {
              "status": "affected",
              "version": "4.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.2(2c)"
            },
            {
              "status": "affected",
              "version": "4.2(2d)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.0(4o)"
            },
            {
              "status": "affected",
              "version": "4.2(2e)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2b)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2c)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2e)"
            },
            {
              "status": "affected",
              "version": "4.3(3a)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.3(3c)"
            },
            {
              "status": "affected",
              "version": "4.3(4a)"
            },
            {
              "status": "affected",
              "version": "4.2(3k)"
            },
            {
              "status": "affected",
              "version": "4.3(4b)"
            },
            {
              "status": "affected",
              "version": "4.3(4c)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(4d)"
            },
            {
              "status": "affected",
              "version": "4.3(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(5a)"
            },
            {
              "status": "affected",
              "version": "4.3(4e)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(4f)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(5c)"
            },
            {
              "status": "affected",
              "version": "4.2(3o)"
            },
            {
              "status": "affected",
              "version": "4.3(5d)"
            },
            {
              "status": "affected",
              "version": "4.3(5e)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "2.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "2.0(13f)"
            },
            {
              "status": "affected",
              "version": "3.0(4n)"
            },
            {
              "status": "affected",
              "version": "2.0(3e)1"
            },
            {
              "status": "affected",
              "version": "3.0(3e)"
            },
            {
              "status": "affected",
              "version": "2.0(8h)"
            },
            {
              "status": "affected",
              "version": "2.0(10g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.0(3c)"
            },
            {
              "status": "affected",
              "version": "3.0(4m)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.0(3a)"
            },
            {
              "status": "affected",
              "version": "3.0(1d)"
            },
            {
              "status": "affected",
              "version": "2.0(9o)"
            },
            {
              "status": "affected",
              "version": "2.0(13n)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "2.0(13q)"
            },
            {
              "status": "affected",
              "version": "2.0(3j)1"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "2.0(9n)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "2.0(13o)"
            },
            {
              "status": "affected",
              "version": "2.0(6f)"
            },
            {
              "status": "affected",
              "version": "2.0(10c)"
            },
            {
              "status": "affected",
              "version": "2.0(8d)"
            },
            {
              "status": "affected",
              "version": "2.0(9m)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "3.0(4j)"
            },
            {
              "status": "affected",
              "version": "2.0(10i)"
            },
            {
              "status": "affected",
              "version": "3.0(3f)"
            },
            {
              "status": "affected",
              "version": "2.0(10l)"
            },
            {
              "status": "affected",
              "version": "2.0(12e)"
            },
            {
              "status": "affected",
              "version": "2.0(12i)"
            },
            {
              "status": "affected",
              "version": "2.0(10h)"
            },
            {
              "status": "affected",
              "version": "2.0(13e)"
            },
            {
              "status": "affected",
              "version": "3.0(4k)"
            },
            {
              "status": "affected",
              "version": "2.0(10b)"
            },
            {
              "status": "affected",
              "version": "2.0(6d)"
            },
            {
              "status": "affected",
              "version": "2.0(12b)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "2.0(12h)"
            },
            {
              "status": "affected",
              "version": "2.0(10f)"
            },
            {
              "status": "affected",
              "version": "3.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "2.0(3i)"
            },
            {
              "status": "affected",
              "version": "2.0(3f)3"
            },
            {
              "status": "affected",
              "version": "3.0(4a)"
            },
            {
              "status": "affected",
              "version": "2.0(13p)"
            },
            {
              "status": "affected",
              "version": "2.0(9l)"
            },
            {
              "status": "affected",
              "version": "2.0(12g)"
            },
            {
              "status": "affected",
              "version": "2.0(12c)"
            },
            {
              "status": "affected",
              "version": "2.0(12f)"
            },
            {
              "status": "affected",
              "version": "2.0(13k)"
            },
            {
              "status": "affected",
              "version": "3.0(3b)"
            },
            {
              "status": "affected",
              "version": "2.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "2.0(4c)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "2.0(12d)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "3.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.0(2b)"
            },
            {
              "status": "affected",
              "version": "2.0(3d)2"
            },
            {
              "status": "affected",
              "version": "2.0(3d)1"
            },
            {
              "status": "affected",
              "version": "2.0(9f)"
            },
            {
              "status": "affected",
              "version": "2.0(13h)"
            },
            {
              "status": "affected",
              "version": "3.0(4e)"
            },
            {
              "status": "affected",
              "version": "2.0(8g)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "2.0(10e)"
            },
            {
              "status": "affected",
              "version": "2.0(13i)"
            },
            {
              "status": "affected",
              "version": "2.0(9c)"
            },
            {
              "status": "affected",
              "version": "2.0(4c)1"
            },
            {
              "status": "affected",
              "version": "3.0(1c)"
            },
            {
              "status": "affected",
              "version": "2.0(8e)"
            },
            {
              "status": "affected",
              "version": "2.0(9e)"
            },
            {
              "status": "affected",
              "version": "2.0(9p)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "3.0(4i)"
            },
            {
              "status": "affected",
              "version": "2.0(10k)"
            },
            {
              "status": "affected",
              "version": "3.0(4o)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "3.0(4p)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "3.0(4q)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "3.0(4r)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "3.0(4s)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.1(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240009)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240043)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240142)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240053)"
            },
            {
              "status": "affected",
              "version": "4.3(4.240152)"
            },
            {
              "status": "affected",
              "version": "4.2(3l)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240077)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242028)"
            },
            {
              "status": "affected",
              "version": "4.3(4.241063)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242038)"
            },
            {
              "status": "affected",
              "version": "4.2(3m)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240090)"
            },
            {
              "status": "affected",
              "version": "4.3(5.240021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240107)"
            },
            {
              "status": "affected",
              "version": "4.3(4.242066)"
            },
            {
              "status": "affected",
              "version": "4.2(3n)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250016)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250021)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250022)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250037)"
            },
            {
              "status": "affected",
              "version": "4.3(2.250045)"
            },
            {
              "status": "affected",
              "version": "4.3(4.252002)"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            },
            {
              "status": "affected",
              "version": "3.2.15.3"
            },
            {
              "status": "affected",
              "version": "4.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.16.1"
            },
            {
              "status": "affected",
              "version": "2.02"
            },
            {
              "status": "affected",
              "version": "4.00"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to redirect a user to a malicious website.\r\n\r\nThis vulnerability is due to insufficient verification of vKVM endpoints. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious webpage and potentially capture user credentials.\r\nNote: The affected vKVM client is also included in Cisco UCS Manager."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-27T16:23:18.607Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ucs-vkvmorv-CnKrV7HK",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-vkvmorv-CnKrV7HK"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ucs-vkvmorv-CnKrV7HK",
        "defects": [
          "CSCwm57436"
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco UCS Virtual Keyboard Video Monitor (vKVM) Open Redirect Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20317",
    "datePublished": "2025-08-27T16:23:18.607Z",
    "dateReserved": "2024-10-10T19:15:13.253Z",
    "dateUpdated": "2025-08-27T18:52:07.395Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20295 (GCVE-0-2024-20295)
Vulnerability from cvelistv5
Published
2024-04-24 19:41
Modified
2024-08-01 21:59
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Standalone) Version: 3.0(1c)
Version: 3.0(1d)
Version: 3.0(2b)
Version: 3.0(3a)
Version: 3.0(3b)
Version: 3.0(3c)
Version: 3.0(3e)
Version: 3.0(3f)
Version: 3.0(4a)
Version: 3.0(4d)
Version: 3.0(4e)
Version: 3.0(4i)
Version: 3.0(4j)
Version: 3.0(4k)
Version: 3.0(4l)
Version: 3.0(4m)
Version: 3.0(4n)
Version: 3.0(4o)
Version: 3.0(4p)
Version: 3.0(4q)
Version: 3.0(4r)
Version: 3.0(4s)
Version: 2.0(10b)
Version: 2.0(10c)
Version: 2.0(10e)
Version: 2.0(10f)
Version: 2.0(10g)
Version: 2.0(10h)
Version: 2.0(10i)
Version: 2.0(10k)
Version: 2.0(10l)
Version: 2.0(12b)
Version: 2.0(12c)
Version: 2.0(12d)
Version: 2.0(12e)
Version: 2.0(12f)
Version: 2.0(12g)
Version: 2.0(12h)
Version: 2.0(12i)
Version: 2.0(13e)
Version: 2.0(13f)
Version: 2.0(13h)
Version: 2.0(13i)
Version: 2.0(13k)
Version: 2.0(13n)
Version: 2.0(13o)
Version: 2.0(13p)
Version: 2.0(13q)
Version: 2.0(1a)
Version: 2.0(1b)
Version: 2.0(3d)1
Version: 2.0(3d)2
Version: 2.0(3e)1
Version: 2.0(3f)3
Version: 2.0(3i)
Version: 2.0(3j)1
Version: 2.0(4c)
Version: 2.0(4c)1
Version: 2.0(6d)
Version: 2.0(6f)
Version: 2.0(8d)
Version: 2.0(8e)
Version: 2.0(8g)
Version: 2.0(8h)
Version: 2.0(9c)
Version: 2.0(9e)
Version: 2.0(9f)
Version: 2.0(9l)
Version: 2.0(9m)
Version: 2.0(9n)
Version: 2.0(9o)
Version: 2.0(9p)
Version: 3.1(1d)
Version: 3.1(2b)
Version: 3.1(2c)
Version: 3.1(2d)
Version: 3.1(2e)
Version: 3.1(2g)
Version: 3.1(2i)
Version: 3.1(3a)
Version: 3.1(3b)
Version: 3.1(3c)
Version: 3.1(3d)
Version: 3.1(3g)
Version: 3.1(3h)
Version: 3.1(3i)
Version: 3.1(3j)
Version: 3.1(3k)
Version: 4.0(1.240)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 4.0(1c)
Version: 4.0(1d)
Version: 4.0(1e)
Version: 4.0(1g)
Version: 4.0(1h)
Version: 4.0(2c)
Version: 4.0(2d)
Version: 4.0(2f)
Version: 4.0(2g)
Version: 4.0(2h)
Version: 4.0(2i)
Version: 4.0(2l)
Version: 4.0(2n)
Version: 4.0(4b)
Version: 4.0(4c)
Version: 4.0(4d)
Version: 4.0(4e)
Version: 4.0(4f)
Version: 4.0(4h)
Version: 4.0(4i)
Version: 4.0(4k)
Version: 4.0(4l)
Version: 4.0(4m)
Version: 4.0(2o)
Version: 4.0(2p)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.0(2r)
Version: 4.1(1c)
Version: 4.1(1d)
Version: 4.1(1f)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.1(1h)
Version: 4.1(2b)
Version: 4.1(2f)
Version: 4.1(2e)
Version: 4.1(3b)
Version: 4.1(2d)
Version: 4.1(3c)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(3f)
Version: 4.1(2h)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(2l)
Version: 4.1(3h)
Version: 4.1(3i)
Version: 4.1(3l)
Version: 4.2(1a)
Version: 4.2(1b)
Version: 4.2(1c)
Version: 4.2(1e)
Version: 4.2(1f)
Version: 4.2(1g)
Version: 4.2(1i)
Version: 4.2(1j)
Version: 4.2(2a)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.2(3d)
Version: 4.2(3e)
Version: 4.2(3g)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.3(1.230097)
Version: 4.3(1.230124)
Version: 4.3(1.230138)
Version: 4.3(2.230207)
Version: 4.3(2.230270)
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:unified_computing_system:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "unified_computing_system",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "4.3",
                "status": "affected",
                "version": "2",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20295",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-25T18:37:12.600877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:08.364Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.494Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-cimc-cmd-inj-mUx4c5AJ",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0(1c)"
            },
            {
              "status": "affected",
              "version": "3.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.0(2b)"
            },
            {
              "status": "affected",
              "version": "3.0(3a)"
            },
            {
              "status": "affected",
              "version": "3.0(3b)"
            },
            {
              "status": "affected",
              "version": "3.0(3c)"
            },
            {
              "status": "affected",
              "version": "3.0(3e)"
            },
            {
              "status": "affected",
              "version": "3.0(3f)"
            },
            {
              "status": "affected",
              "version": "3.0(4a)"
            },
            {
              "status": "affected",
              "version": "3.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.0(4i)"
            },
            {
              "status": "affected",
              "version": "3.0(4j)"
            },
            {
              "status": "affected",
              "version": "3.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.0(4l)"
            },
            {
              "status": "affected",
              "version": "3.0(4m)"
            },
            {
              "status": "affected",
              "version": "3.0(4n)"
            },
            {
              "status": "affected",
              "version": "3.0(4o)"
            },
            {
              "status": "affected",
              "version": "3.0(4p)"
            },
            {
              "status": "affected",
              "version": "3.0(4q)"
            },
            {
              "status": "affected",
              "version": "3.0(4r)"
            },
            {
              "status": "affected",
              "version": "3.0(4s)"
            },
            {
              "status": "affected",
              "version": "2.0(10b)"
            },
            {
              "status": "affected",
              "version": "2.0(10c)"
            },
            {
              "status": "affected",
              "version": "2.0(10e)"
            },
            {
              "status": "affected",
              "version": "2.0(10f)"
            },
            {
              "status": "affected",
              "version": "2.0(10g)"
            },
            {
              "status": "affected",
              "version": "2.0(10h)"
            },
            {
              "status": "affected",
              "version": "2.0(10i)"
            },
            {
              "status": "affected",
              "version": "2.0(10k)"
            },
            {
              "status": "affected",
              "version": "2.0(10l)"
            },
            {
              "status": "affected",
              "version": "2.0(12b)"
            },
            {
              "status": "affected",
              "version": "2.0(12c)"
            },
            {
              "status": "affected",
              "version": "2.0(12d)"
            },
            {
              "status": "affected",
              "version": "2.0(12e)"
            },
            {
              "status": "affected",
              "version": "2.0(12f)"
            },
            {
              "status": "affected",
              "version": "2.0(12g)"
            },
            {
              "status": "affected",
              "version": "2.0(12h)"
            },
            {
              "status": "affected",
              "version": "2.0(12i)"
            },
            {
              "status": "affected",
              "version": "2.0(13e)"
            },
            {
              "status": "affected",
              "version": "2.0(13f)"
            },
            {
              "status": "affected",
              "version": "2.0(13h)"
            },
            {
              "status": "affected",
              "version": "2.0(13i)"
            },
            {
              "status": "affected",
              "version": "2.0(13k)"
            },
            {
              "status": "affected",
              "version": "2.0(13n)"
            },
            {
              "status": "affected",
              "version": "2.0(13o)"
            },
            {
              "status": "affected",
              "version": "2.0(13p)"
            },
            {
              "status": "affected",
              "version": "2.0(13q)"
            },
            {
              "status": "affected",
              "version": "2.0(1a)"
            },
            {
              "status": "affected",
              "version": "2.0(1b)"
            },
            {
              "status": "affected",
              "version": "2.0(3d)1"
            },
            {
              "status": "affected",
              "version": "2.0(3d)2"
            },
            {
              "status": "affected",
              "version": "2.0(3e)1"
            },
            {
              "status": "affected",
              "version": "2.0(3f)3"
            },
            {
              "status": "affected",
              "version": "2.0(3i)"
            },
            {
              "status": "affected",
              "version": "2.0(3j)1"
            },
            {
              "status": "affected",
              "version": "2.0(4c)"
            },
            {
              "status": "affected",
              "version": "2.0(4c)1"
            },
            {
              "status": "affected",
              "version": "2.0(6d)"
            },
            {
              "status": "affected",
              "version": "2.0(6f)"
            },
            {
              "status": "affected",
              "version": "2.0(8d)"
            },
            {
              "status": "affected",
              "version": "2.0(8e)"
            },
            {
              "status": "affected",
              "version": "2.0(8g)"
            },
            {
              "status": "affected",
              "version": "2.0(8h)"
            },
            {
              "status": "affected",
              "version": "2.0(9c)"
            },
            {
              "status": "affected",
              "version": "2.0(9e)"
            },
            {
              "status": "affected",
              "version": "2.0(9f)"
            },
            {
              "status": "affected",
              "version": "2.0(9l)"
            },
            {
              "status": "affected",
              "version": "2.0(9m)"
            },
            {
              "status": "affected",
              "version": "2.0(9n)"
            },
            {
              "status": "affected",
              "version": "2.0(9o)"
            },
            {
              "status": "affected",
              "version": "2.0(9p)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            }
          ]
        },
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability that is described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-24T19:41:02.339Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-cmd-inj-mUx4c5AJ",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-mUx4c5AJ"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-cmd-inj-mUx4c5AJ",
        "defects": [
          "CSCwi12864",
          "CSCwi29799",
          "CSCwi10842"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20295",
    "datePublished": "2024-04-24T19:41:02.339Z",
    "dateReserved": "2023-11-08T15:08:07.629Z",
    "dateUpdated": "2024-08-01T21:59:41.494Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20356 (GCVE-0-2024-20356)
Vulnerability from cvelistv5
Published
2024-04-24 19:40
Modified
2024-08-01 21:59
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
Impacted products
Vendor Product Version
Cisco Cisco Unified Computing System (Standalone) Version: 3.0(1c)
Version: 3.0(1d)
Version: 3.0(3a)
Version: 3.0(3b)
Version: 3.0(3e)
Version: 3.0(4a)
Version: 3.0(4d)
Version: 3.0(4e)
Version: 3.0(4i)
Version: 3.0(4j)
Version: 3.0(4k)
Version: 3.0(4l)
Version: 3.0(4m)
Version: 3.0(4n)
Version: 3.0(4o)
Version: 3.0(4p)
Version: 3.0(4q)
Version: 3.0(4r)
Version: 3.0(4s)
Version: 3.1(1d)
Version: 3.1(2b)
Version: 3.1(2c)
Version: 3.1(2d)
Version: 3.1(2e)
Version: 3.1(2g)
Version: 3.1(2i)
Version: 3.1(3a)
Version: 3.1(3b)
Version: 3.1(3c)
Version: 3.1(3d)
Version: 3.1(3g)
Version: 3.1(3h)
Version: 3.1(3i)
Version: 3.1(3j)
Version: 3.1(3k)
Version: 4.0(1.240)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 4.0(1c)
Version: 4.0(1d)
Version: 4.0(1e)
Version: 4.0(1g)
Version: 4.0(1h)
Version: 4.0(2c)
Version: 4.0(2d)
Version: 4.0(2f)
Version: 4.0(2g)
Version: 4.0(2h)
Version: 4.0(2i)
Version: 4.0(2k)
Version: 4.0(2l)
Version: 4.0(2m)
Version: 4.0(2n)
Version: 4.0(4b)
Version: 4.0(4c)
Version: 4.0(4d)
Version: 4.0(4e)
Version: 4.0(4f)
Version: 4.0(4h)
Version: 4.0(4i)
Version: 4.0(4j)
Version: 4.0(4k)
Version: 4.0(4l)
Version: 4.0(4m)
Version: 4.0(2o)
Version: 4.0(2p)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.0(2r)
Version: 4.1(1c)
Version: 4.1(1d)
Version: 4.1(1f)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.1(1h)
Version: 4.1(2b)
Version: 4.1(2f)
Version: 4.1(2e)
Version: 4.1(3b)
Version: 4.1(2d)
Version: 4.1(3c)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(3f)
Version: 4.1(2h)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(2l)
Version: 4.1(3g)
Version: 4.1(3h)
Version: 4.1(3i)
Version: 4.1(3l)
Version: 4.1(2m)
Version: 4.1(3m)
Version: 4.2(1a)
Version: 4.2(1b)
Version: 4.2(1c)
Version: 4.2(1e)
Version: 4.2(1f)
Version: 4.2(1g)
Version: 4.2(1i)
Version: 4.2(1j)
Version: 4.2(2a)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.2(3d)
Version: 4.2(3e)
Version: 4.2(3g)
Version: 4.2(3h)
Version: 4.2(3i)
Version: 4.2(3j)
Version: 4.3(1.230097)
Version: 4.3(1.230124)
Version: 4.3(1.230138)
Version: 4.3(2.230207)
Version: 4.3(2.230270)
Version: 4.3(2.240002)
Version: 4.3(3.240022)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 2.1.0
Version: 2.4.0
Version: 2.4.1
Version: 2.4.2
Version: 3.2.1
Version: 3.2.2
Version: 3.2.3
Version: 3.2.4
Version: 3.2.6
Version: 3.2.7
Version: 3.2.10
Version: 3.2.11.1
Version: 3.2.8
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 3.2.15
Version: 3.1.1
Version: 3.1.2
Version: 3.1.3
Version: 3.1.4
Version: 3.1.5
Version: 3.1.0
Version: 3.0.1
Version: 3.0.2
Version: 2.3.1
Version: 2.3.2
Version: 2.3.3
Version: 2.3.5
Version: 2.2.1
Version: 2.2.2
Version: 2.0.0
Version: 4.11.1
Version: 4.12.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:cisco:unified_computing_system:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "unified_computing_system",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:cisco:unified_computing_system_e-series:4.12.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "unified_computing_system_e-series",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "-"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20356",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-25T17:53:52.218954Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:42.092Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-cimc-cmd-inj-bLuPcb",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.0(1c)"
            },
            {
              "status": "affected",
              "version": "3.0(1d)"
            },
            {
              "status": "affected",
              "version": "3.0(3a)"
            },
            {
              "status": "affected",
              "version": "3.0(3b)"
            },
            {
              "status": "affected",
              "version": "3.0(3e)"
            },
            {
              "status": "affected",
              "version": "3.0(4a)"
            },
            {
              "status": "affected",
              "version": "3.0(4d)"
            },
            {
              "status": "affected",
              "version": "3.0(4e)"
            },
            {
              "status": "affected",
              "version": "3.0(4i)"
            },
            {
              "status": "affected",
              "version": "3.0(4j)"
            },
            {
              "status": "affected",
              "version": "3.0(4k)"
            },
            {
              "status": "affected",
              "version": "3.0(4l)"
            },
            {
              "status": "affected",
              "version": "3.0(4m)"
            },
            {
              "status": "affected",
              "version": "3.0(4n)"
            },
            {
              "status": "affected",
              "version": "3.0(4o)"
            },
            {
              "status": "affected",
              "version": "3.0(4p)"
            },
            {
              "status": "affected",
              "version": "3.0(4q)"
            },
            {
              "status": "affected",
              "version": "3.0(4r)"
            },
            {
              "status": "affected",
              "version": "3.0(4s)"
            },
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "4.0(2k)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "4.0(2m)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.0(4j)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.1(3g)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.1(2m)"
            },
            {
              "status": "affected",
              "version": "4.1(3m)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.2(3g)"
            },
            {
              "status": "affected",
              "version": "4.2(3h)"
            },
            {
              "status": "affected",
              "version": "4.2(3i)"
            },
            {
              "status": "affected",
              "version": "4.2(3j)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230207)"
            },
            {
              "status": "affected",
              "version": "4.3(2.230270)"
            },
            {
              "status": "affected",
              "version": "4.3(2.240002)"
            },
            {
              "status": "affected",
              "version": "4.3(3.240022)"
            }
          ]
        },
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "3.2.15"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            },
            {
              "status": "affected",
              "version": "4.12.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerability described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-04-24T19:40:33.312Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-cmd-inj-bLuPcb",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-bLuPcb"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-cmd-inj-bLuPcb",
        "defects": [
          "CSCwi43005",
          "CSCwj41082",
          "CSCwi43001",
          "CSCwi42996"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20356",
    "datePublished": "2024-04-24T19:40:33.312Z",
    "dateReserved": "2023-11-08T15:08:07.648Z",
    "dateUpdated": "2024-08-01T21:59:41.754Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20228 (GCVE-0-2023-20228)
Vulnerability from cvelistv5
Published
2023-08-16 20:59
Modified
2024-08-02 09:05
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Impacted products
Vendor Product Version
Cisco Cisco Identity Services Engine Software Version: N/A
Create a notification for this product.
   Cisco Cisco Unified Computing System (Standalone) Version: 3.1(1d)
Version: 3.1(2b)
Version: 3.1(2c)
Version: 3.1(2d)
Version: 3.1(2e)
Version: 3.1(2g)
Version: 3.1(2i)
Version: 3.1(3a)
Version: 3.1(3b)
Version: 3.1(3c)
Version: 3.1(3d)
Version: 3.1(3g)
Version: 3.1(3h)
Version: 3.1(3i)
Version: 3.1(3j)
Version: 3.1(3k)
Version: 4.0(1.240)
Version: 4.0(1a)
Version: 4.0(1b)
Version: 4.0(1c)
Version: 4.0(1d)
Version: 4.0(1e)
Version: 4.0(1g)
Version: 4.0(1h)
Version: 4.0(2c)
Version: 4.0(2d)
Version: 4.0(2f)
Version: 4.0(2g)
Version: 4.0(2h)
Version: 4.0(2i)
Version: 4.0(2l)
Version: 4.0(2n)
Version: 4.0(4b)
Version: 4.0(4c)
Version: 4.0(4d)
Version: 4.0(4e)
Version: 4.0(4f)
Version: 4.0(4h)
Version: 4.0(4i)
Version: 4.0(4k)
Version: 4.0(4l)
Version: 4.0(4m)
Version: 4.0(2o)
Version: 4.0(2p)
Version: 4.0(4n)
Version: 4.0(2q)
Version: 4.0(2r)
Version: 4.1(1c)
Version: 4.1(1d)
Version: 4.1(1f)
Version: 4.1(1g)
Version: 4.1(2a)
Version: 4.1(1h)
Version: 4.1(2b)
Version: 4.1(2f)
Version: 4.1(2e)
Version: 4.1(3b)
Version: 4.1(2d)
Version: 4.1(3c)
Version: 4.1(3d)
Version: 4.1(2g)
Version: 4.1(3f)
Version: 4.1(2h)
Version: 4.1(2j)
Version: 4.1(2k)
Version: 4.1(2l)
Version: 4.1(3h)
Version: 4.1(3i)
Version: 4.1(3l)
Version: 4.2(1a)
Version: 4.2(1b)
Version: 4.2(1c)
Version: 4.2(1e)
Version: 4.2(1f)
Version: 4.2(1g)
Version: 4.2(1i)
Version: 4.2(1j)
Version: 4.2(2a)
Version: 4.2(2f)
Version: 4.2(2g)
Version: 4.2(3b)
Version: 4.2(3d)
Version: 4.2(3e)
Version: 4.3(1.230097)
Version: 4.3(1.230124)
Version: 4.3(1.230138)
Create a notification for this product.
   Cisco Cisco Unified Computing System E-Series Software (UCSE) Version: 2.1.0
Version: 2.4.0
Version: 2.4.1
Version: 2.4.2
Version: 3.2.1
Version: 3.2.2
Version: 3.2.3
Version: 3.2.4
Version: 3.2.6
Version: 3.2.7
Version: 3.2.10
Version: 3.2.11.1
Version: 3.2.8
Version: 3.2.11.3
Version: 3.2.11.5
Version: 3.2.12.2
Version: 3.2.13.6
Version: 3.2.14
Version: 3.1.1
Version: 3.1.2
Version: 3.1.3
Version: 3.1.4
Version: 3.1.5
Version: 3.1.0
Version: 3.0.1
Version: 3.0.2
Version: 2.3.1
Version: 2.3.2
Version: 2.3.3
Version: 2.3.5
Version: 2.2.1
Version: 2.2.2
Version: 2.0.0
Version: 2.10
Version: 3.06
Version: 3.02
Version: 4.11.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:35.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-cimc-xss-UMYtYEtr",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-UMYtYEtr"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Identity Services Engine Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "product": "Cisco Unified Computing System (Standalone)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "3.1(1d)"
            },
            {
              "status": "affected",
              "version": "3.1(2b)"
            },
            {
              "status": "affected",
              "version": "3.1(2c)"
            },
            {
              "status": "affected",
              "version": "3.1(2d)"
            },
            {
              "status": "affected",
              "version": "3.1(2e)"
            },
            {
              "status": "affected",
              "version": "3.1(2g)"
            },
            {
              "status": "affected",
              "version": "3.1(2i)"
            },
            {
              "status": "affected",
              "version": "3.1(3a)"
            },
            {
              "status": "affected",
              "version": "3.1(3b)"
            },
            {
              "status": "affected",
              "version": "3.1(3c)"
            },
            {
              "status": "affected",
              "version": "3.1(3d)"
            },
            {
              "status": "affected",
              "version": "3.1(3g)"
            },
            {
              "status": "affected",
              "version": "3.1(3h)"
            },
            {
              "status": "affected",
              "version": "3.1(3i)"
            },
            {
              "status": "affected",
              "version": "3.1(3j)"
            },
            {
              "status": "affected",
              "version": "3.1(3k)"
            },
            {
              "status": "affected",
              "version": "4.0(1.240)"
            },
            {
              "status": "affected",
              "version": "4.0(1a)"
            },
            {
              "status": "affected",
              "version": "4.0(1b)"
            },
            {
              "status": "affected",
              "version": "4.0(1c)"
            },
            {
              "status": "affected",
              "version": "4.0(1d)"
            },
            {
              "status": "affected",
              "version": "4.0(1e)"
            },
            {
              "status": "affected",
              "version": "4.0(1g)"
            },
            {
              "status": "affected",
              "version": "4.0(1h)"
            },
            {
              "status": "affected",
              "version": "4.0(2c)"
            },
            {
              "status": "affected",
              "version": "4.0(2d)"
            },
            {
              "status": "affected",
              "version": "4.0(2f)"
            },
            {
              "status": "affected",
              "version": "4.0(2g)"
            },
            {
              "status": "affected",
              "version": "4.0(2h)"
            },
            {
              "status": "affected",
              "version": "4.0(2i)"
            },
            {
              "status": "affected",
              "version": "4.0(2l)"
            },
            {
              "status": "affected",
              "version": "4.0(2n)"
            },
            {
              "status": "affected",
              "version": "4.0(4b)"
            },
            {
              "status": "affected",
              "version": "4.0(4c)"
            },
            {
              "status": "affected",
              "version": "4.0(4d)"
            },
            {
              "status": "affected",
              "version": "4.0(4e)"
            },
            {
              "status": "affected",
              "version": "4.0(4f)"
            },
            {
              "status": "affected",
              "version": "4.0(4h)"
            },
            {
              "status": "affected",
              "version": "4.0(4i)"
            },
            {
              "status": "affected",
              "version": "4.0(4k)"
            },
            {
              "status": "affected",
              "version": "4.0(4l)"
            },
            {
              "status": "affected",
              "version": "4.0(4m)"
            },
            {
              "status": "affected",
              "version": "4.0(2o)"
            },
            {
              "status": "affected",
              "version": "4.0(2p)"
            },
            {
              "status": "affected",
              "version": "4.0(4n)"
            },
            {
              "status": "affected",
              "version": "4.0(2q)"
            },
            {
              "status": "affected",
              "version": "4.0(2r)"
            },
            {
              "status": "affected",
              "version": "4.1(1c)"
            },
            {
              "status": "affected",
              "version": "4.1(1d)"
            },
            {
              "status": "affected",
              "version": "4.1(1f)"
            },
            {
              "status": "affected",
              "version": "4.1(1g)"
            },
            {
              "status": "affected",
              "version": "4.1(2a)"
            },
            {
              "status": "affected",
              "version": "4.1(1h)"
            },
            {
              "status": "affected",
              "version": "4.1(2b)"
            },
            {
              "status": "affected",
              "version": "4.1(2f)"
            },
            {
              "status": "affected",
              "version": "4.1(2e)"
            },
            {
              "status": "affected",
              "version": "4.1(3b)"
            },
            {
              "status": "affected",
              "version": "4.1(2d)"
            },
            {
              "status": "affected",
              "version": "4.1(3c)"
            },
            {
              "status": "affected",
              "version": "4.1(3d)"
            },
            {
              "status": "affected",
              "version": "4.1(2g)"
            },
            {
              "status": "affected",
              "version": "4.1(3f)"
            },
            {
              "status": "affected",
              "version": "4.1(2h)"
            },
            {
              "status": "affected",
              "version": "4.1(2j)"
            },
            {
              "status": "affected",
              "version": "4.1(2k)"
            },
            {
              "status": "affected",
              "version": "4.1(2l)"
            },
            {
              "status": "affected",
              "version": "4.1(3h)"
            },
            {
              "status": "affected",
              "version": "4.1(3i)"
            },
            {
              "status": "affected",
              "version": "4.1(3l)"
            },
            {
              "status": "affected",
              "version": "4.2(1a)"
            },
            {
              "status": "affected",
              "version": "4.2(1b)"
            },
            {
              "status": "affected",
              "version": "4.2(1c)"
            },
            {
              "status": "affected",
              "version": "4.2(1e)"
            },
            {
              "status": "affected",
              "version": "4.2(1f)"
            },
            {
              "status": "affected",
              "version": "4.2(1g)"
            },
            {
              "status": "affected",
              "version": "4.2(1i)"
            },
            {
              "status": "affected",
              "version": "4.2(1j)"
            },
            {
              "status": "affected",
              "version": "4.2(2a)"
            },
            {
              "status": "affected",
              "version": "4.2(2f)"
            },
            {
              "status": "affected",
              "version": "4.2(2g)"
            },
            {
              "status": "affected",
              "version": "4.2(3b)"
            },
            {
              "status": "affected",
              "version": "4.2(3d)"
            },
            {
              "status": "affected",
              "version": "4.2(3e)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230097)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230124)"
            },
            {
              "status": "affected",
              "version": "4.3(1.230138)"
            }
          ]
        },
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "2.1.0"
            },
            {
              "status": "affected",
              "version": "2.4.0"
            },
            {
              "status": "affected",
              "version": "2.4.1"
            },
            {
              "status": "affected",
              "version": "2.4.2"
            },
            {
              "status": "affected",
              "version": "3.2.1"
            },
            {
              "status": "affected",
              "version": "3.2.2"
            },
            {
              "status": "affected",
              "version": "3.2.3"
            },
            {
              "status": "affected",
              "version": "3.2.4"
            },
            {
              "status": "affected",
              "version": "3.2.6"
            },
            {
              "status": "affected",
              "version": "3.2.7"
            },
            {
              "status": "affected",
              "version": "3.2.10"
            },
            {
              "status": "affected",
              "version": "3.2.11.1"
            },
            {
              "status": "affected",
              "version": "3.2.8"
            },
            {
              "status": "affected",
              "version": "3.2.11.3"
            },
            {
              "status": "affected",
              "version": "3.2.11.5"
            },
            {
              "status": "affected",
              "version": "3.2.12.2"
            },
            {
              "status": "affected",
              "version": "3.2.13.6"
            },
            {
              "status": "affected",
              "version": "3.2.14"
            },
            {
              "status": "affected",
              "version": "3.1.1"
            },
            {
              "status": "affected",
              "version": "3.1.2"
            },
            {
              "status": "affected",
              "version": "3.1.3"
            },
            {
              "status": "affected",
              "version": "3.1.4"
            },
            {
              "status": "affected",
              "version": "3.1.5"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "3.0.1"
            },
            {
              "status": "affected",
              "version": "3.0.2"
            },
            {
              "status": "affected",
              "version": "2.3.1"
            },
            {
              "status": "affected",
              "version": "2.3.2"
            },
            {
              "status": "affected",
              "version": "2.3.3"
            },
            {
              "status": "affected",
              "version": "2.3.5"
            },
            {
              "status": "affected",
              "version": "2.2.1"
            },
            {
              "status": "affected",
              "version": "2.2.2"
            },
            {
              "status": "affected",
              "version": "2.0.0"
            },
            {
              "status": "affected",
              "version": "2.10"
            },
            {
              "status": "affected",
              "version": "3.06"
            },
            {
              "status": "affected",
              "version": "3.02"
            },
            {
              "status": "affected",
              "version": "4.11.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-25T16:58:25.643Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-cimc-xss-UMYtYEtr",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-UMYtYEtr"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cimc-xss-UMYtYEtr",
        "defects": [
          "CSCwe96259",
          "CSCwf98681",
          "CSCwh65092"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20228",
    "datePublished": "2023-08-16T20:59:07.910Z",
    "dateReserved": "2022-10-27T18:47:50.369Z",
    "dateUpdated": "2024-08-02T09:05:35.864Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1883 (GCVE-0-2019-1883)
Vulnerability from cvelistv5
Published
2019-08-21 18:20
Modified
2024-11-20 17:11
CWE
Summary
A vulnerability in the command-line interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker with read-only credentials to inject arbitrary commands that could allow them to obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input on the command-line interface. An attacker could exploit this vulnerability by authenticating with read-only privileges via the CLI of an affected device and submitting crafted input to the affected commands. A successful exploit could allow an attacker to execute arbitrary commands on the device with root privileges.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:50.734Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller CLI Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-cimc-cli-inject"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1883",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:15.679102Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:11:30.718Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "3.0(4k)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the command-line interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker with read-only credentials to inject arbitrary commands that could allow them to obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input on the command-line interface. An attacker could exploit this vulnerability by authenticating with read-only privileges via the CLI of an affected device and submitting crafted input to the affected commands. A successful exploit could allow an attacker to execute arbitrary commands on the device with root privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:20:38.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller CLI Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-cimc-cli-inject"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-cimc-cli-inject",
        "defect": [
          [
            "CSCvo35996"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller CLI Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1883",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller CLI Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "3.0(4k)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the command-line interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker with read-only credentials to inject arbitrary commands that could allow them to obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input on the command-line interface. An attacker could exploit this vulnerability by authenticating with read-only privileges via the CLI of an affected device and submitting crafted input to the affected commands. A successful exploit could allow an attacker to execute arbitrary commands on the device with root privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.0",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller CLI Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-cimc-cli-inject"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-cimc-cli-inject",
          "defect": [
            [
              "CSCvo35996"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1883",
    "datePublished": "2019-08-21T18:20:38.194Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-20T17:11:30.718Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1896 (GCVE-0-2019-1896)
Vulnerability from cvelistv5
Published
2019-08-21 18:20
Modified
2024-11-20 17:11
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:51.570Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1896",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:21.918460Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:11:47.410Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "3.0(4k)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:20:28.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-cmdinject-1896",
        "defect": [
          [
            "CSCvo36057"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1896",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "3.0(4k)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands and obtain root privileges. The vulnerability is due to insufficient validation of user-supplied input in the Certificate Signing Request (CSR) function of the web-based management interface. An attacker could exploit this vulnerability by submitting a crafted CSR in the web-based management interface. A successful exploit could allow an attacker with administrator privileges to execute arbitrary commands on the device with full root privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.2",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller CSR Generation Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1896"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-cmdinject-1896",
          "defect": [
            [
              "CSCvo36057"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1896",
    "datePublished": "2019-08-21T18:20:28.706Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-20T17:11:47.410Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1863 (GCVE-0-2019-1863)
Vulnerability from cvelistv5
Published
2019-08-21 18:15
Modified
2024-11-21 19:15
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to make unauthorized changes to the system configuration. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow a user with read-only privileges to change critical system configurations using administrator privileges.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:43.087Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller Privilege Escalation Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privilege"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1863",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:57:15.263803Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:15:47.750Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "2.0(13o)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to make unauthorized changes to the system configuration. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow a user with read-only privileges to change critical system configurations using administrator privileges."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:15:28.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller Privilege Escalation Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privilege"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-privilege",
        "defect": [
          [
            "CSCvn21011"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller Privilege Escalation Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1863",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Privilege Escalation Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "2.0(13o)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to make unauthorized changes to the system configuration. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow a user with read-only privileges to change critical system configurations using administrator privileges."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "6.5",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-285"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller Privilege Escalation Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-privilege"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-privilege",
          "defect": [
            [
              "CSCvn21011"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1863",
    "datePublished": "2019-08-21T18:15:28.776Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-21T19:15:47.750Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1864 (GCVE-0-2019-1864)
Vulnerability from cvelistv5
Published
2019-08-21 18:15
Modified
2024-11-20 17:11
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of the affected software. A successful exploit could allow the attacker, with read-only privileges, to inject and execute arbitrary, system-level commands with root privileges on an affected device.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1864"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1864",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:23.399396Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:11:55.287Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "2.0(13o)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of the affected software. A successful exploit could allow the attacker, with read-only privileges, to inject and execute arbitrary, system-level commands with root privileges on an affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:15:23.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1864"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-cmdinj-1864",
        "defect": [
          [
            "CSCvn21003"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1864",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "2.0(13o)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending malicious commands to the web-based management interface of the affected software. A successful exploit could allow the attacker, with read-only privileges, to inject and execute arbitrary, system-level commands with root privileges on an affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.8",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1864"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-cmdinj-1864",
          "defect": [
            [
              "CSCvn21003"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1864",
    "datePublished": "2019-08-21T18:15:23.313Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-20T17:11:55.287Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1865 (GCVE-0-2019-1865)
Vulnerability from cvelistv5
Published
2019-08-21 18:15
Modified
2024-11-20 17:12
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by invoking an interface monitoring mechanism with a crafted argument on the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.892Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1865"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1865",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:26.018979Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:12:05.135Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "2.0(13o)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by invoking an interface monitoring mechanism with a crafted argument on the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:15:18.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1865"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-cmdinj-1865",
        "defect": [
          [
            "CSCvn20993"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1865",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "2.0(13o)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by invoking an interface monitoring mechanism with a crafted argument on the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.8",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1865"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-cmdinj-1865",
          "defect": [
            [
              "CSCvn20993"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1865",
    "datePublished": "2019-08-21T18:15:18.639Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-20T17:12:05.135Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1634 (GCVE-0-2019-1634)
Vulnerability from cvelistv5
Published
2019-08-21 18:10
Modified
2024-11-20 17:12
CWE
Summary
A vulnerability in the Intelligent Platform Management Interface (IPMI) of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of user-supplied commands. An attacker who has administrator privileges and access to the network where the IPMI resides could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to gain root privileges on the affected device.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:20:28.540Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1634"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1634",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:32.268721Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:12:22.326Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "2.0(13o)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Intelligent Platform Management Interface (IPMI) of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of user-supplied commands. An attacker who has administrator privileges and access to the network where the IPMI resides could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to gain root privileges on the affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:10:22.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1634"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-cmdinject-1634",
        "defect": [
          [
            "CSCvo35971"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1634",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "2.0(13o)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Intelligent Platform Management Interface (IPMI) of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on the underlying operating system (OS). The vulnerability is due to insufficient input validation of user-supplied commands. An attacker who has administrator privileges and access to the network where the IPMI resides could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to gain root privileges on the affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.2",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinject-1634"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-cmdinject-1634",
          "defect": [
            [
              "CSCvo35971"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1634",
    "datePublished": "2019-08-21T18:10:22.475Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-20T17:12:22.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1850 (GCVE-0-2019-1850)
Vulnerability from cvelistv5
Published
2019-08-21 18:10
Modified
2024-11-20 17:12
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. An attacker would need to have valid administrator credentials on the device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker with elevated privileges could exploit this vulnerability by sending crafted commands to the administrative web management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:28:42.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1850"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1850",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-20T16:52:41.663083Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-20T17:12:38.937Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "3.0(4k)",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. An attacker would need to have valid administrator credentials on the device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker with elevated privileges could exploit this vulnerability by sending crafted commands to the administrative web management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-21T18:10:12.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1850"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190821-imc-cmdinj-1850",
        "defect": [
          [
            "CSCvn20998",
            "CSCvq09455"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-08-21T16:00:00-0700",
          "ID": "CVE-2019-1850",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "3.0(4k)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. An attacker would need to have valid administrator credentials on the device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker with elevated privileges could exploit this vulnerability by sending crafted commands to the administrative web management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.2",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-78"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190821 Cisco Integrated Management Controller Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imc-cmdinj-1850"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190821-imc-cmdinj-1850",
          "defect": [
            [
              "CSCvn20998",
              "CSCvq09455"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1850",
    "datePublished": "2019-08-21T18:10:12.499Z",
    "dateReserved": "2018-12-06T00:00:00.000Z",
    "dateUpdated": "2024-11-20T17:12:38.937Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-0430 (GCVE-0-2018-0430)
Vulnerability from cvelistv5
Published
2018-10-05 14:00
Modified
2024-11-26 14:44
Severity ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:28:11.098Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1041686",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1041686"
          },
          {
            "name": "20180905 Cisco Integrated Management Controller Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-0430",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-25T18:51:48.249577Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T14:44:41.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-09-05T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-07T09:57:02.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1041686",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1041686"
        },
        {
          "name": "20180905 Cisco Integrated Management Controller Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20180905-cimc-injection",
        "defect": [
          [
            "CSCvi34410",
            "CSCvi45098",
            "CSCvi46942",
            "CSCvj38915",
            "CSCvj39762"
          ]
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2018-09-05T16:00:00-0500",
          "ID": "CVE-2018-0430",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": "8.8",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1041686",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1041686"
            },
            {
              "name": "20180905 Cisco Integrated Management Controller Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20180905-cimc-injection",
          "defect": [
            [
              "CSCvi34410",
              "CSCvi45098",
              "CSCvi46942",
              "CSCvj38915",
              "CSCvj39762"
            ]
          ],
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2018-0430",
    "datePublished": "2018-10-05T14:00:00.000Z",
    "dateReserved": "2017-11-27T00:00:00.000Z",
    "dateUpdated": "2024-11-26T14:44:41.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-0431 (GCVE-0-2018-0431)
Vulnerability from cvelistv5
Published
2018-10-05 14:00
Modified
2024-11-26 14:44
Severity ?
CWE
Summary
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:28:10.594Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1041686",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1041686"
          },
          {
            "name": "20180905 Cisco Integrated Management Controller Command Injection Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-0431",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-25T18:51:46.860935Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T14:44:32.327Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Unified Computing System E-Series Software (UCSE)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-09-05T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-07T09:57:02.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1041686",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1041686"
        },
        {
          "name": "20180905 Cisco Integrated Management Controller Command Injection Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20180905-cimc-injection",
        "defect": [
          [
            "CSCvi34410",
            "CSCvi45098",
            "CSCvi46942",
            "CSCvj38915",
            "CSCvj39762"
          ]
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Cisco Integrated Management Controller Command Injection Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2018-09-05T16:00:00-0500",
          "ID": "CVE-2018-0431",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Integrated Management Controller Command Injection Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Unified Computing System E-Series Software (UCSE)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject and execute arbitrary commands with root privileges on an affected device. The vulnerability is due to insufficient validation of command input by the affected software. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device."
            }
          ]
        },
        "impact": {
          "cvss": {
            "baseScore": "8.8",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-77"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1041686",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1041686"
            },
            {
              "name": "20180905 Cisco Integrated Management Controller Command Injection Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20180905-cimc-injection",
          "defect": [
            [
              "CSCvi34410",
              "CSCvi45098",
              "CSCvi46942",
              "CSCvj38915",
              "CSCvj39762"
            ]
          ],
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2018-0431",
    "datePublished": "2018-10-05T14:00:00.000Z",
    "dateReserved": "2017-11-27T00:00:00.000Z",
    "dateUpdated": "2024-11-26T14:44:32.327Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}