Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Home/CyberSecurity News/Critical Cisco IMC Flaw Allows Attackers to Bypass Authentication
CyberSecurity News

Critical Cisco IMC Flaw Allows Attackers to Bypass Authentication

A critical security flaw impacting Cisco’s Integrated Management Controller (IMC) has been recently disclosed, prompting the release of urgent software updates. The vulnerability, officially...

Jennifer sherman
Jennifer sherman
April 2, 2026 2 Min Read
2 0

A critical security flaw impacting Cisco’s Integrated Management Controller (IMC) has been recently disclosed, prompting the release of urgent software updates.

The vulnerability, officially tracked as CVE-2026-20093, has been assigned a critical Base CVSS score of 9.8, indicating the highest level of severity.

This security weakness is located in the password change functionality of the Cisco IMC software. The core issue stems from the system’s incorrect processing of incoming password change requests.

By exploiting this flaw, a remote, unauthenticated attacker can send a maliciously crafted HTTP request directly to an affected device.

If the exploit is successful, the attacker can completely bypass standard authentication checks. Once authentication is bypassed, the attacker can modify the passwords of any existing user on the system.

This includes the primary Admin account, which essentially allows the attacker to hijack the system and gain full administrative access as that user.

Affected Systems and Hardware

The vulnerability impacts several Cisco hardware products if they are running a vulnerable release of the Cisco IMC software.

The affected standalone products include:

  • 5000 Series Enterprise Network Compute Systems (ENCS)
  • Catalyst 8300 Series Edge uCPE
  • UCS C-Series M5 and M6 Rack Servers (in standalone mode)
  • UCS E-Series Servers M3 and M6

Furthermore, numerous Cisco appliances that rely on preconfigured versions of the affected UCS C-Series Servers are also at risk. If these appliances expose the Cisco IMC user interface, they are vulnerable.

This extensive list includes Application Policy Infrastructure Controller (APIC) Servers, Catalyst Center Appliances, Secure Firewall Management Center Appliances, and Secure Network Analytics Appliances.

Cisco has confirmed that certain newer and differently configured products, such as UCS B-Series Blade Servers, UCS X-Series Modular Systems, and UCS C-Series M7 and M8 Rack Servers, remain unaffected by this flaw.

Currently, no temporary workarounds or mitigations are available to block this vulnerability. The only effective solution is to apply the official software updates provided by Cisco.

Administrators are strongly urged to immediately upgrade their affected systems to the fixed software releases.

The update process varies by device; for instance, upgrading the IMC on 5000 Series ENCS and Catalyst 8300 Series requires upgrading the underlying Cisco Enterprise NFV Infrastructure Software (NFVIS).

For standalone servers, administrators can typically use the Cisco Host Upgrade Utility (HUU) to install the fixed IMC releases.

Cisco has credited a security researcher for reporting the flaw and noted that there is currently no evidence of active exploitation or public announcements regarding malicious use of this vulnerability.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitSecurityVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Remcos RAT Infection Uses Obfuscated Scripts & Windows Bin

Next Post

WhatsApp Attack Chain Uses VBS, Cloud, & MSI Back Scripts Downloads

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
WatchGuard Agent Flaws Grant Full SYSTEM Privileges on
May 7, 2026
Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP
May 7, 2026
Fake Call History Apps on Google Play Steal Payments
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us