CVE-2026-20160

Cisco · Smart Software Manager On-Prem (SSM On-Prem)

The exposure of an internal service in Cisco SSM On-Prem allows unauthenticated remote attackers to execute arbitrary commands with root privileges via crafted API requests.

Executive summary

Cisco Smart Software Manager On-Prem is vulnerable to unauthenticated remote code execution with root privileges due to the unintentional exposure of an internal service API.

Vulnerability

This flaw is caused by the exposure of an internal service's API. An unauthenticated remote attacker can send crafted requests to this API to execute arbitrary commands on the host operating system with root-level privileges.

Business impact

The CVSS score of 9.8 reflects the critical nature of this RCE vulnerability. Root-level access allows an attacker to completely take over the SSM On-Prem host, steal licensing data, and use the system as a pivot point for further network attacks.

Remediation

Immediate Action: Update Cisco SSM On-Prem to the latest available version to close the exposed service and secure the API.

Proactive Monitoring: Review system logs for unauthorized command execution and inspect network traffic for unusual API calls directed at internal-only service ports.

Compensating Controls: Implement strict firewall rules to ensure that only authorized administrative IPs can access the SSM On-Prem management and API ports.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Applying the Cisco-provided patch is essential to prevent total system compromise. Organizations should also audit their network architecture to ensure that internal services are not reachable from outside the intended management segment.