CVE-2026-20160
Cisco · Smart Software Manager On-Prem (SSM On-Prem)
The exposure of an internal service in Cisco SSM On-Prem allows unauthenticated remote attackers to execute arbitrary commands with root privileges via crafted API requests.
Executive summary
Cisco Smart Software Manager On-Prem is vulnerable to unauthenticated remote code execution with root privileges due to the unintentional exposure of an internal service API.
Vulnerability
This flaw is caused by the exposure of an internal service's API. An unauthenticated remote attacker can send crafted requests to this API to execute arbitrary commands on the host operating system with root-level privileges.
Business impact
The CVSS score of 9.8 reflects the critical nature of this RCE vulnerability. Root-level access allows an attacker to completely take over the SSM On-Prem host, steal licensing data, and use the system as a pivot point for further network attacks.
Remediation
Immediate Action: Update Cisco SSM On-Prem to the latest available version to close the exposed service and secure the API.
Proactive Monitoring: Review system logs for unauthorized command execution and inspect network traffic for unusual API calls directed at internal-only service ports.
Compensating Controls: Implement strict firewall rules to ensure that only authorized administrative IPs can access the SSM On-Prem management and API ports.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Applying the Cisco-provided patch is essential to prevent total system compromise. Organizations should also audit their network architecture to ensure that internal services are not reachable from outside the intended management segment.