6.7

CVE-2026-20099

A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root. 

This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Firepower Extensible Operating System (FXOS)
Default Statusunknown
Version 2.3.1.99
Status affected
Version 2.3.1.56
Status affected
Version 2.3.1.110
Status affected
Version 2.3.1.58
Status affected
Version 2.6.1.174
Status affected
Version 2.6.1.157
Status affected
Version 2.3.1.91
Status affected
Version 2.3.1.73
Status affected
Version 2.3.1.66
Status affected
Version 2.6.1.166
Status affected
Version 2.3.1.111
Status affected
Version 2.3.1.166
Status affected
Version 2.3.1.144
Status affected
Version 2.6.1.131
Status affected
Version 2.3.1.130
Status affected
Version 2.3.1.88
Status affected
Version 2.6.1.169
Status affected
Version 2.3.1.75
Status affected
Version 2.3.1.93
Status affected
Version 2.3.1.145
Status affected
Version 2.3.1.155
Status affected
Version 2.6.1.187
Status affected
Version 2.3.1.173
Status affected
Version 2.3.1.179
Status affected
Version 2.6.1.192
Status affected
Version 2.3.1.180
Status affected
Version 2.6.1.204
Status affected
Version 2.6.1.214
Status affected
Version 2.3.1.190
Status affected
Version 2.6.1.224
Status affected
Version 2.6.1.229
Status affected
Version 2.3.1.215
Status affected
Version 2.10.1.159
Status affected
Version 2.3.1.216
Status affected
Version 2.6.1.230
Status affected
Version 2.10.1.166
Status affected
Version 2.6.1.238
Status affected
Version 2.6.1.239
Status affected
Version 2.11.1.154
Status affected
Version 2.10.1.179
Status affected
Version 2.3.1.219
Status affected
Version 2.6.1.254
Status affected
Version 2.12.0.31
Status affected
Version 2.12.0.432
Status affected
Version 2.10.1.207
Status affected
Version 2.3.1.230
Status affected
Version 2.6.1.259
Status affected
Version 2.11.1.182
Status affected
Version 2.12.0.450
Status affected
Version 2.10.1.234
Status affected
Version 2.13.0.198
Status affected
Version 2.12.0.467
Status affected
Version 2.13.0.212
Status affected
Version 2.6.1.264
Status affected
Version 2.10.1.245
Status affected
Version 2.11.1.200
Status affected
Version 2.12.0.498
Status affected
Version 2.10.1.271
Status affected
Version 2.12.1.29
Status affected
Version 2.13.0.243
Status affected
Version 2.11.1.205
Status affected
Version 2.6.1.265
Status affected
Version 2.12.1.48
Status affected
Version 2.14.1.131
Status affected
Version 2.13.0.276
Status affected
Version 2.11.1.228
Status affected
Version 2.12.1.72
Status affected
Version 2.10.1.312
Status affected
Version 2.6.1.272
Status affected
Version 2.14.1.143
Status affected
Version 2.14.1.163
Status affected
Version 2.14.1.167
Status affected
Version 2.12.1.84
Status affected
Version 2.16.0.128
Status affected
Version 2.10.1.328
Status affected
Version 2.10.1.341
Status affected
Version 2.11.1.236
Status affected
Version 2.12.1.95
Status affected
Version 2.13.0.357
Status affected
Version 2.16.0.136
Status affected
Version 2.14.1.186
Status affected
Version 2.17.0.518
Status affected
Version 2.14.1.187
Status affected
HerstellerCisco
Produkt Cisco Secure Firewall Adaptive Security Appliance (ASA) Software
Default Statusunknown
Version 9.12.2
Status affected
Version 9.12.1
Status affected
Version 9.12.3
Status affected
Version 9.12.4
Status affected
Version 9.12.3.2
Status affected
Version 9.12.3.12
Status affected
Version 9.12.2.5
Status affected
Version 9.12.1.2
Status affected
Version 9.12.2.1
Status affected
Version 9.12.3.7
Status affected
Version 9.12.2.9
Status affected
Version 9.12.3.9
Status affected
Version 9.12.1.3
Status affected
Version 9.12.4.2
Status affected
Version 9.12.4.4
Status affected
Version 9.12.4.7
Status affected
Version 9.12.4.8
Status affected
Version 9.12.4.10
Status affected
Version 9.12.4.13
Status affected
Version 9.12.4.18
Status affected
Version 9.12.4.24
Status affected
Version 9.16.1
Status affected
Version 9.12.4.26
Status affected
Version 9.16.1.28
Status affected
Version 9.12.4.29
Status affected
Version 9.16.2
Status affected
Version 9.12.4.30
Status affected
Version 9.16.2.3
Status affected
Version 9.12.4.35
Status affected
Version 9.16.2.7
Status affected
Version 9.12.4.37
Status affected
Version 9.17.1
Status affected
Version 9.16.2.11
Status affected
Version 9.16.2.13
Status affected
Version 9.12.4.39
Status affected
Version 9.12.4.38
Status affected
Version 9.16.2.14
Status affected
Version 9.17.1.7
Status affected
Version 9.12.4.40
Status affected
Version 9.16.3.3
Status affected
Version 9.16.3
Status affected
Version 9.17.1.9
Status affected
Version 9.16.3.14
Status affected
Version 9.12.4.41
Status affected
Version 9.17.1.10
Status affected
Version 9.18.1
Status affected
Version 9.12.4.47
Status affected
Version 9.16.3.15
Status affected
Version 9.18.1.3
Status affected
Version 9.17.1.11
Status affected
Version 9.12.4.48
Status affected
Version 9.18.2
Status affected
Version 9.16.3.19
Status affected
Version 9.17.1.13
Status affected
Version 9.12.4.50
Status affected
Version 9.17.1.15
Status affected
Version 9.12.4.52
Status affected
Version 9.16.3.23
Status affected
Version 9.18.2.5
Status affected
Version 9.16.4
Status affected
Version 9.12.4.54
Status affected
Version 9.17.1.20
Status affected
Version 9.18.2.7
Status affected
Version 9.19.1
Status affected
Version 9.16.4.9
Status affected
Version 9.12.4.55
Status affected
Version 9.18.2.8
Status affected
Version 9.16.4.14
Status affected
Version 9.18.3
Status affected
Version 9.19.1.5
Status affected
Version 9.12.4.56
Status affected
Version 9.17.1.30
Status affected
Version 9.19.1.9
Status affected
Version 9.18.3.39
Status affected
Version 9.16.4.19
Status affected
Version 9.12.4.58
Status affected
Version 9.19.1.12
Status affected
Version 9.18.3.46
Status affected
Version 9.16.4.27
Status affected
Version 9.19.1.18
Status affected
Version 9.18.3.53
Status affected
Version 9.18.3.55
Status affected
Version 9.16.4.38
Status affected
Version 9.17.1.33
Status affected
Version 9.12.4.62
Status affected
Version 9.16.4.39
Status affected
Version 9.18.3.56
Status affected
Version 9.16.4.42
Status affected
Version 9.19.1.22
Status affected
Version 9.18.4
Status affected
Version 9.18.4.5
Status affected
Version 9.19.1.24
Status affected
Version 9.16.4.48
Status affected
Version 9.18.4.8
Status affected
Version 9.20.2
Status affected
Version 9.19.1.27
Status affected
Version 9.12.4.65
Status affected
Version 9.16.4.55
Status affected
Version 9.18.4.22
Status affected
Version 9.20.2.10
Status affected
Version 9.16.4.57
Status affected
Version 9.19.1.28
Status affected
Version 9.17.1.39
Status affected
Version 9.12.4.67
Status affected
Version 9.18.4.24
Status affected
Version 9.20.2.21
Status affected
Version 9.16.4.61
Status affected
Version 9.19.1.31
Status affected
Version 9.18.4.29
Status affected
Version 9.20.2.22
Status affected
Version 9.16.4.62
Status affected
Version 9.18.4.34
Status affected
Version 9.20.3
Status affected
Version 9.16.4.67
Status affected
Version 9.18.4.40
Status affected
Version 9.16.4.71
Status affected
Version 9.20.3.4
Status affected
Version 9.18.4.47
Status affected
Version 9.20.3.7
Status affected
Version 9.17.1.45
Status affected
Version 9.19.1.37
Status affected
Version 9.16.4.76
Status affected
Version 9.18.4.50
Status affected
Version 9.20.3.10
Status affected
Version 9.18.4.52
Status affected
Version 9.20.3.13
Status affected
Version 9.18.4.53
Status affected
Version 9.16.4.82
Status affected
Version 9.20.3.16
Status affected
Version 9.19.1.42
Status affected
Version 9.18.4.57
Status affected
Version 9.16.4.84
Status affected
Version 9.20.3.20
Status affected
Version 9.20.4
Status affected
Version 9.20.4.7
Status affected
HerstellerCisco
Produkt Cisco Unified Computing System (Managed)
Default Statusunknown
Version 4.0(4h)
Status affected
Version 4.1(1a)
Status affected
Version 4.0(1c)
Status affected
Version 4.0(4a)
Status affected
Version 4.0(1a)
Status affected
Version 4.0(1d)
Status affected
Version 4.1(1c)
Status affected
Version 4.0(2a)
Status affected
Version 4.0(4g)
Status affected
Version 4.0(2e)
Status affected
Version 4.0(4c)
Status affected
Version 4.0(4f)
Status affected
Version 4.0(1b)
Status affected
Version 4.0(2b)
Status affected
Version 4.0(2d)
Status affected
Version 4.1(1b)
Status affected
Version 4.0(4d)
Status affected
Version 4.0(4e)
Status affected
Version 4.0(4b)
Status affected
Version 4.1(2a)
Status affected
Version 4.1(1d)
Status affected
Version 4.0(4i)
Status affected
Version 4.1(1e)
Status affected
Version 4.1(2b)
Status affected
Version 4.0(4k)
Status affected
Version 4.1(3a)
Status affected
Version 4.1(3b)
Status affected
Version 4.1(2c)
Status affected
Version 4.0(4l)
Status affected
Version 4.1(4a)
Status affected
Version 4.1(3c)
Status affected
Version 4.1(3d)
Status affected
Version 4.2(1c)
Status affected
Version 4.2(1d)
Status affected
Version 4.0(4m)
Status affected
Version 4.1(3e)
Status affected
Version 4.2(1f)
Status affected
Version 4.1(3f)
Status affected
Version 4.2(1i)
Status affected
Version 4.1(3h)
Status affected
Version 4.2(1k)
Status affected
Version 4.2(1l)
Status affected
Version 4.0(4n)
Status affected
Version 4.2(1m)
Status affected
Version 4.1(3i)
Status affected
Version 4.2(2a)
Status affected
Version 4.2(1n)
Status affected
Version 4.1(3j)
Status affected
Version 4.2(2c)
Status affected
Version 4.2(2d)
Status affected
Version 4.2(3b)
Status affected
Version 4.1(3k)
Status affected
Version 4.0(4o)
Status affected
Version 4.2(2e)
Status affected
Version 4.2(3d)
Status affected
Version 4.2(3e)
Status affected
Version 4.2(3g)
Status affected
Version 4.1(3l)
Status affected
Version 4.3(2b)
Status affected
Version 4.2(3h)
Status affected
Version 4.2(3i)
Status affected
Version 4.3(2c)
Status affected
Version 4.1(3m)
Status affected
Version 4.3(2e)
Status affected
Version 4.3(3a)
Status affected
Version 4.2(3j)
Status affected
Version 4.3(3c)
Status affected
Version 4.3(4a)
Status affected
Version 4.2(3k)
Status affected
Version 4.3(4b)
Status affected
Version 4.3(4c)
Status affected
Version 4.2(3l)
Status affected
Version 4.3(4d)
Status affected
Version 4.3(2f)
Status affected
Version 4.2(3m)
Status affected
Version 4.3(5a)
Status affected
Version 4.3(4e)
Status affected
Version 4.1(3n)
Status affected
Version 4.3(4f)
Status affected
Version 4.2(3n)
Status affected
Version 4.3(5c)
Status affected
Version 4.2(3o)
Status affected
Version 4.3(5d)
Status affected
Version 4.3(6a)
Status affected
Version 4.3(6b)
Status affected
Version 4.3(5e)
Status affected
Version 4.2(3p)
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.198
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.