{"id":13346,"date":"2026-04-02T12:39:19","date_gmt":"2026-04-02T12:39:19","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13346"},"modified":"2026-04-02T12:39:19","modified_gmt":"2026-04-02T12:39:19","slug":"cisco-patches-essential-and-excessive-severity-vulnerabilities","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13346","title":{"rendered":"Cisco Patches Essential and Excessive-Severity Vulnerabilities"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Cisco on Wednesday introduced fixes for 2 crucial and 6 high-severity vulnerabilities that could possibly be exploited for authentication bypass, distant code execution, privilege escalation, and knowledge disclosure.<\/strong><\/p>\n<p>One of many crucial bugs, tracked as CVE-2026-20160, impacts Cisco Sensible Software program Supervisor On-Prem (SSM On-Prem) and will permit attackers to abuse an erroneously uncovered inner service to execute arbitrary instructions.<\/p>\n<p>\u201cAn attacker might exploit this vulnerability by sending a crafted request to the API of the uncovered service. A profitable exploit might permit the attacker to execute instructions on the underlying working system with root-level privileges,\u201d Cisco says.<\/p>\n<p>The second crucial flaw is CVE-2026-20093, an authentication bypass difficulty rooted within the incorrect dealing with of password change requests.<\/p>\n<p>An unauthenticated attacker might ship crafted HTTP requests to a susceptible machine and modify consumer passwords, together with these of directors. The attacker might then entry the system as an administrator.<\/p>\n<p>On Wednesday, Cisco patched a high-severity defect in Developed Programmable Community Supervisor (EPNM) that might permit attackers to entry delicate data, and one other in SSM On-Prem that could possibly be exploited for privilege escalation.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>The corporate additionally rolled out fixes for 4 Built-in Administration Controller (IMC) vulnerabilities that could possibly be exploited to execute arbitrary instructions and achieve root privileges. All flaws exist as a result of user-supplied enter shouldn&#8217;t be correctly validated on IMC\u2019s web-based administration interface.<\/p>\n<p>In keeping with Cisco, greater than two dozen enterprise networking merchandise are impacted by the 4 safety defects, together with UCS C-series and E-series servers, in addition to home equipment which are based mostly on them.<\/p>\n<p>Cisco says it&#8217;s not conscious of any of those vulnerabilities being exploited within the wild. Further data will be discovered on the corporate\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/publicationListing.x\">safety advisories<\/a> web page.<\/p>\n<p><strong>Associated: <\/strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/exploited-zero-day-among-21-vulnerabilities-patched-in-chrome\/\">Exploited Zero-Day Amongst 21 Vulnerabilities Patched in Chrome<\/a><\/p>\n<p><strong>Associated: <\/strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/tp-link-patches-high-severity-router-vulnerabilities\/\">TP-Hyperlink Patches Excessive-Severity Router Vulnerabilities<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/bind-updates-patch-high-severity-vulnerabilities-2\/\">BIND Updates Patch Excessive-Severity Vulnerabilities<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/cisco-patches-multiple-vulnerabilities-in-ios-software\/\">Cisco Patches A number of Vulnerabilities in IOS Software program<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Cisco on Wednesday introduced fixes for 2 crucial and 6 high-severity vulnerabilities that could possibly be exploited for authentication bypass, distant code execution, privilege escalation, and knowledge disclosure. One of many crucial bugs, tracked as CVE-2026-20160, impacts Cisco Sensible Software program Supervisor On-Prem (SSM On-Prem) and will permit attackers to abuse an erroneously uncovered inner [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[131,420,7623,6544,2721],"class_list":["post-13346","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cisco","tag-critical","tag-highseverity","tag-patches","tag-vulnerabilities"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13346"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13346\/revisions"}],"predecessor-version":[{"id":13347,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13346\/revisions\/13347"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13348"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-03 20:39:27 UTC -->