Command Injection in Cisco FXOS/UCS Manager Web UI Elevates to Root
CVE-2026-20099 Published on February 25, 2026

Cisco UCS Manager and FXOS Software Command Injection Vulnerability
A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.  This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.

NVD

Vulnerability Analysis

CVE-2026-20099 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2026-20099 has been classified to as a Shell injection vulnerability or weakness.


Products Associated with CVE-2026-20099

stack.watch emails you whenever new vulnerabilities are published in Cisco Adaptive Security Appliance or Cisco Unified Computing System. Just hit a watch button to start following.

 
 

Affected Versions

Cisco Firepower Extensible Operating System (FXOS): Cisco Secure Firewall Adaptive Security Appliance (ASA) Software: Cisco Unified Computing System (Managed):

Exploit Probability

EPSS
0.06%
Percentile
19.84%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.