Cisco IMC Vulnerability - Critical Authentication Bypass Flaw

There's a serious security problem with some Cisco devices that lets bad guys sneak in without a password. Cisco has fixed it, but you need to update your devices right away to stay safe.
Cisco has disclosed a critical authentication bypass vulnerability in its Integrated Management Controller (IMC), allowing attackers to gain administrative access. Urgent updates are now available to mitigate this risk.
The Flaw
Cisco has recently disclosed a critical security flaw affecting its Integrated Management Controller (IMC), tracked as CVE-2026-20093. This vulnerability has been assigned a critical Base CVSS score of 9.8, indicating its high severity. The flaw resides in the password change functionality of the Cisco IMC software, which incorrectly processes incoming password change requests. This allows a remote, unauthenticated attacker to send a maliciously crafted HTTP request to an affected device, bypassing standard authentication checks.
What's at Risk
Once authentication is bypassed, attackers can modify the passwords of any existing user on the system, including the primary Admin account. This essentially grants them full administrative access, enabling them to control the system as that user. The vulnerability impacts several Cisco hardware products, including:
- 5000 Series Enterprise Network Compute Systems (ENCS)
- Catalyst 8300 Series Edge uCPE
- UCS C-Series M5 and M6 Rack Servers (in standalone mode)
- UCS E-Series Servers M3 and M6
Additionally, numerous Cisco appliances that rely on preconfigured versions of the affected UCS C-Series Servers are also at risk. These include Application Policy Infrastructure Controller (APIC) Servers, Catalyst Center Appliances, Secure Firewall Management Center Appliances, and Secure Network Analytics Appliances. However, Cisco has confirmed that certain newer and differently configured products, such as UCS B-Series Blade Servers, UCS X-Series Modular Systems, and UCS C-Series M7 and M8 Rack Servers, are unaffected.
Patch Status
Cisco has released urgent software updates to address this vulnerability, and they strongly recommend that customers upgrade to the fixed software immediately. There are no temporary workarounds or mitigations available to block this vulnerability. For instance, upgrading the IMC on 5000 Series ENCS and Catalyst 8300 Series requires upgrading the underlying Cisco Enterprise NFV Infrastructure Software (NFVIS), while standalone servers can typically use the Cisco Host Upgrade Utility (HUU) to install the fixed IMC releases.
Immediate Actions
Administrators are urged to apply the official software updates provided by Cisco without delay. Although Cisco's Product Security Incident Response Team (PSIRT) has not found evidence of in-the-wild exploitation or proof-of-concept exploit code, the potential for unauthorized access remains a critical concern. As a precaution, organizations should assess their systems for exposure to this vulnerability and prioritize patching affected devices.
In addition to the IMC vulnerability, Cisco has also addressed other critical vulnerabilities, including a Smart Software Manager On-Prem vulnerability (CVE-2026-20160) that could allow remote code execution by unauthenticated users. This highlights the importance of maintaining updated security measures across all Cisco products.