This vulnerability is due to the unintentional exposure of an internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco
Cisco smart Software Manager On-prem |
|
| Vendors & Products |
Cisco
Cisco smart Software Manager On-prem |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This vulnerability is due to the unintentional exposure of an internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. | |
| Title | Cisco Smart Software Manager On-Prem Arbitrary Command Execution Vulnerability | |
| Weaknesses | CWE-668 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2026-04-02T03:56:10.746Z
Reserved: 2025-10-08T11:59:15.388Z
Link: CVE-2026-20160
Updated: 2026-04-01T18:08:32.796Z
Status : Awaiting Analysis
Published: 2026-04-01T17:28:31.760
Modified: 2026-04-03T16:11:11.357
Link: CVE-2026-20160
No data.
OpenCVE Enrichment
Updated: 2026-04-03T08:58:26Z