Home Cisco CVE-2026-20093
Back to Cisco

CVE-2026-20093

Cisco Integrated Management Controller - IMC

Cisco CVSS 9.8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin. This vulnerability is due to incorrect handling of password change requests, allowing an attacker to send a crafted HTTP request to an affected device and alter the passwords of any user on the system."

Anticipated Attack Path

  1. 1. Attacker sends a crafted HTTP request to the affected device
  2. 2. The device incorrectly handles the password change request, allowing the attacker to bypass authentication
  3. 3. The attacker gains access to the system as an Admin user, allowing them to alter passwords and access sensitive data

Am I Vulnerable?

  • Is the Cisco Integrated Management Controller (IMC) version vulnerable to this exploit?
  • Are there any unauthenticated, remote access points to the IMC?
  • Have the latest security patches been applied to the IMC?

Operational Audit Arsenal

Target Type Web Application
Target Asset IMC-Admin-Portal
Standard Path Management Plane / Web UI

Manual Verification Required

This is a non-Windows asset (Cisco). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Likely

Potential disruption to system access and management functionality

Internal Work Notes

CVE-2026-20093: Unauthenticated Admin access vulnerability in Cisco IMC, requiring immediate patching and security review.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Cisco Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.