VulnerabilitiesHIGH

Cisco Patches Critical and High-Severity Vulnerabilities

Featured image for Cisco Patches Critical and High-Severity Vulnerabilities
SASecurity Affairs
CVE-2026-20093CVE-2026-20160CVE-2026-20131Ciscoauthentication bypass
🎯

Basically, Cisco fixed serious security holes that hackers could exploit to take control of systems.

Quick Summary

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

What Happened

Cisco has released patches for two critical and six high-severity vulnerabilities that pose significant risks to users. These flaws could allow attackers to bypass authentication, execute malicious code, and gain unauthorized access to sensitive data. The vulnerabilities were identified in critical components of Cisco's infrastructure, including the Integrated Management Controller (IMC) and SSM On-Prem.

The Flaw

One of the most critical vulnerabilities is CVE-2026-20093, which has a CVSS score of 9.8. This flaw allows remote attackers to bypass authentication through a crafted HTTP request, potentially enabling them to change user passwords and gain full system access. Another critical flaw, CVE-2026-20160, also scores 9.8 and lets unauthenticated attackers execute commands on the host operating system with root privileges via a crafted API request.

What's at Risk

These vulnerabilities primarily affect organizations using Cisco's management systems. If exploited, attackers could manipulate server settings, access sensitive data, and disrupt operations. The potential for unauthorized access to critical systems makes these vulnerabilities particularly dangerous.

Patch Status

Cisco's Product Security Incident Response Team (PSIRT) has confirmed that they are not aware of any active exploits or proof-of-concept code for these vulnerabilities. However, they strongly recommend that all customers apply the patches immediately to mitigate any risks.

Immediate Actions

  • Update your systems: Ensure that you are running the latest patched version of Cisco software.
  • Monitor for unusual activity: Keep an eye on your systems for any unauthorized access attempts.
  • Educate staff: Make sure your team is aware of these vulnerabilities and the importance of applying updates promptly.

In March, Cisco had already addressed another critical vulnerability, CVE-2026-20131, which had a CVSS score of 10.0 and was actively exploited by the Interlock ransomware. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) had ordered federal agencies to patch this flaw within three days, highlighting the urgency of addressing these security issues.

In conclusion, the recent patches by Cisco are crucial for maintaining the security of their systems. Organizations must act quickly to protect themselves from potential attacks stemming from these vulnerabilities.

🔒 Pro insight: The high CVSS scores indicate severe risks; organizations should prioritize patching to avoid potential exploitation.

Original article from

SASecurity Affairs· Pierluigi Paganini
Read Full Article

Related Pings

CRITICALVulnerabilities

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

The Hacker News·
HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-3502 - CISA Adds New Exploited Vulnerability

CISA has added a new vulnerability, CVE-2026-3502, to its KEV Catalog. This flaw affects the TrueConf Client and poses serious risks to federal networks. Timely remediation is essential to prevent exploitation.

CISA Advisories·