Cisco IMC Web Mgt Interface RCE (CVE-2026-20097)
CVE-2026-20097 Published on April 1, 2026
Cisco Integrated Management Controller Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco IMC could allow an authenticated, remote attacker with admin-level privileges to execute arbitrary code as the root user. This vulnerability is due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
Cisco has assigned this vulnerability a SIR of High rather than Medium as the score indicates because additional security implications could occur when the attacker becomes root.
Vulnerability Analysis
CVE-2026-20097 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a Memory Corruption Vulnerability?
The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
CVE-2026-20097 has been classified to as a Memory Corruption vulnerability or weakness.
Products Associated with CVE-2026-20097
Want to know whenever a new CVE is published for Cisco Unified Computing System? stack.watch will email you.
Affected Versions
Cisco Unified Computing System (Standalone):- Version 4.0(2g) is affected.
- Version 3.1(2i) is affected.
- Version 3.1(1d) is affected.
- Version 4.0(4i) is affected.
- Version 4.1(1c) is affected.
- Version 4.0(2c) is affected.
- Version 4.0(1e) is affected.
- Version 4.0(2h) is affected.
- Version 4.0(4h) is affected.
- Version 4.0(1h) is affected.
- Version 4.0(2l) is affected.
- Version 3.1(3g) is affected.
- Version 4.0(1.240) is affected.
- Version 4.0(2f) is affected.
- Version 4.0(1g) is affected.
- Version 4.0(2i) is affected.
- Version 3.1(3i) is affected.
- Version 4.0(4d) is affected.
- Version 4.1(1d) is affected.
- Version 3.1(3c) is affected.
- Version 4.0(4k) is affected.
- Version 3.1(2d) is affected.
- Version 3.1(3a) is affected.
- Version 3.1(3j) is affected.
- Version 4.0(2d) is affected.
- Version 4.1(1f) is affected.
- Version 4.0(1c) is affected.
- Version 4.0(4f) is affected.
- Version 4.0(4c) is affected.
- Version 3.1(3d) is affected.
- Version 3.1(2g) is affected.
- Version 3.1(2c) is affected.
- Version 4.0(1d) is affected.
- Version 3.1(2e) is affected.
- Version 4.0(1a) is affected.
- Version 4.0(1b) is affected.
- Version 3.1(3b) is affected.
- Version 4.0(4b) is affected.
- Version 3.1(2b) is affected.
- Version 4.0(4e) is affected.
- Version 3.1(3h) is affected.
- Version 4.0(4l) is affected.
- Version 4.1(1g) is affected.
- Version 4.1(2a) is affected.
- Version 4.0(2n) is affected.
- Version 4.1(1h) is affected.
- Version 3.1(3k) is affected.
- Version 4.1(2b) is affected.
- Version 4.0(2o) is affected.
- Version 4.0(4m) is affected.
- Version 4.1(2d) is affected.
- Version 4.1(3b) is affected.
- Version 4.0(2p) is affected.
- Version 4.1(2e) is affected.
- Version 4.1(2f) is affected.
- Version 4.0(4n) is affected.
- Version 4.0(2q) is affected.
- Version 4.1(3c) is affected.
- Version 4.0(2r) is affected.
- Version 4.1(3d) is affected.
- Version 4.1(2g) is affected.
- Version 4.1(2h) is affected.
- Version 4.1(3f) is affected.
- Version 4.1(2j) is affected.
- Version 4.1(2k) is affected.
- Version 4.1(3h) is affected.
- Version 4.2(2a) is affected.
- Version 4.1(3i) is affected.
- Version 4.2(2f) is affected.
- Version 4.2(2g) is affected.
- Version 4.2(3b) is affected.
- Version 4.1(3l) is affected.
- Version 4.2(3d) is affected.
- Version 4.3(1.230097) is affected.
- Version 4.2(1e) is affected.
- Version 4.2(1b) is affected.
- Version 4.2(1j) is affected.
- Version 4.2(1i) is affected.
- Version 4.2(1f) is affected.
- Version 4.2(1a) is affected.
- Version 4.2(1c) is affected.
- Version 4.2(1g) is affected.
- Version 4.3(1.230124) is affected.
- Version 4.1(2l) is affected.
- Version 4.2(3e) is affected.
- Version 4.3(1.230138) is affected.
- Version 4.2(3g) is affected.
- Version 4.3(2.230207) is affected.
- Version 4.2(3h) is affected.
- Version 4.2(3i) is affected.
- Version 4.3(2.230270) is affected.
- Version 4.1(3m) is affected.
- Version 4.1(2m) is affected.
- Version 4.3(2.240002) is affected.
- Version 4.3(3.240022) is affected.
- Version 4.2(3j) is affected.
- Version 4.1(3n) is affected.
- Version 4.3(2.240009) is affected.
- Version 4.3(3.240043) is affected.
- Version 4.3(4.240142) is affected.
- Version 4.3(2.240037) is affected.
- Version 4.3(2.240053) is affected.
- Version 4.3(4.240152) is affected.
- Version 4.2(3l) is affected.
- Version 4.3(2.240077) is affected.
- Version 4.3(4.242028) is affected.
- Version 4.3(4.241063) is affected.
- Version 4.3(4.242038) is affected.
- Version 4.2(3m) is affected.
- Version 4.3(2.240090) is affected.
- Version 4.3(5.240021) is affected.
- Version 4.3(2.240107) is affected.
- Version 4.3(4.242066) is affected.
- Version 4.2(3n) is affected.
- Version 4.3(5.250001) is affected.
- Version 4.2(3o) is affected.
- Version 4.3(2.250016) is affected.
- Version 4.3(2.250021) is affected.
- Version 4.3(5.250030) is affected.
- Version 4.3(2.250022) is affected.
- Version 4.3(6.250040) is affected.
- Version 4.3(5.250033) is affected.
- Version 4.3(6.250044) is affected.
- Version 4.3(6.250053) is affected.
- Version 4.3(2.250037) is affected.
- Version 4.3(2.250045) is affected.
- Version 4.3(4.252001) is affected.
- Version 4.3(4.252002) is affected.
- Version 6.0(1.250127) is affected.
- Version 4.2(3p) is affected.
- Version 6.0(1.250131) is affected.
- Version 4.3(6.250101) is affected.
- Version 6.0(1.250174) is affected.
- Version 4.3(6.250117) is affected.
- Version 4.3(5.250043) is affected.
- Version 4.3(6.250039) is affected.
- Version 4.3(5.250045) is affected.
- Version 4.3(6.250060) is affected.
- Version 6.0(1.250130) is affected.
- Version 4.3(4.241014) is affected.
- Version 4.3(2.250063) is affected.
- Version 6.0(1.250192) is affected.
- Version 4.3(6.260003) is affected.
- Version 6.0(1.250194) is affected.