7.3

CVE-2026-20151

Medienbericht

Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability

A vulnerability in the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges on an affected system.

This vulnerability is due to the improper transmission of sensitive user information. An attacker could exploit this vulnerability by sending a crafted message to an affected Cisco SSM On-Prem host and retrieving session credentials from subsequent status messages. A successful exploit could allow the attacker to elevate privileges on the affected system from low to administrative.
To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of System User.
Note: This vulnerability exposes information only about users who logged in to the Cisco SSM On-Prem host using the web interface and who are currently logged in. SSH sessions are not affected.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Smart Software Manager On-Prem
Default Statusunknown
Version 7-202001
Status affected
Version 8-202004
Status affected
Version 8-202006
Status affected
Version 8-202012
Status affected
Version 8-202010
Status affected
Version 8-202008
Status affected
Version 9-202201
Status affected
Version 8-202102
Status affected
Version 8-202105
Status affected
Version 8-202108
Status affected
Version 8-202112
Status affected
Version 8-202201
Status affected
Version 8-202206
Status affected
Version 8-202212
Status affected
Version 8-202302
Status affected
Version 8-202303
Status affected
Version 8-202304
Status affected
Version 8-202308
Status affected
Version 8-202401
Status affected
Version 8-202404
Status affected
Version 9-202406
Status affected
Version 9-202407
Status affected
Version 9-202410
Status affected
Version 9-202412
Status affected
Version 9-202501
Status affected
Version 9-202502
Status affected
Version 9-202504
Status affected
Version 9-202507
Status affected
Version 9-202510
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.14
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 7.3 2.1 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
CWE-201 Insertion of Sensitive Information Into Sent Data

The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.