Home

Description

A vulnerability in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with valid administrative privileges to execute arbitrary commands on the underlying operating system of an affected device.    This vulnerability is due to insufficient input validation of command arguments that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device with root-level privileges.

PUBLISHED Reserved 2025-10-08 | Published 2026-02-25 | Updated 2026-02-26 | Assigner cisco




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

4.0(4h)
affected

4.1(1a)
affected

4.0(1c)
affected

4.0(4a)
affected

4.0(1a)
affected

4.0(1d)
affected

4.1(1c)
affected

4.0(2a)
affected

4.0(4g)
affected

4.0(2e)
affected

4.0(4c)
affected

4.0(4f)
affected

4.0(1b)
affected

4.0(2b)
affected

4.0(2d)
affected

4.1(1b)
affected

4.0(4d)
affected

4.0(4e)
affected

4.0(4b)
affected

4.1(2a)
affected

4.1(1d)
affected

4.0(4i)
affected

4.1(1e)
affected

4.1(2b)
affected

4.0(4k)
affected

4.1(3a)
affected

4.1(3b)
affected

4.1(2c)
affected

4.0(4l)
affected

4.1(4a)
affected

4.1(3c)
affected

4.1(3d)
affected

4.2(1c)
affected

4.2(1d)
affected

4.0(4m)
affected

4.1(3e)
affected

4.2(1f)
affected

4.1(3f)
affected

4.2(1i)
affected

4.1(3h)
affected

4.2(1k)
affected

4.2(1l)
affected

4.0(4n)
affected

4.2(1m)
affected

4.1(3i)
affected

4.2(2a)
affected

4.2(1n)
affected

4.1(3j)
affected

4.2(2c)
affected

4.2(2d)
affected

4.2(3b)
affected

4.1(3k)
affected

4.0(4o)
affected

4.2(2e)
affected

4.2(3d)
affected

4.2(3e)
affected

4.2(3g)
affected

4.1(3l)
affected

4.3(2b)
affected

4.2(3h)
affected

4.2(3i)
affected

4.3(2c)
affected

4.1(3m)
affected

4.3(2e)
affected

4.3(3a)
affected

4.2(3j)
affected

4.3(3c)
affected

4.3(4a)
affected

4.2(3k)
affected

4.3(4b)
affected

4.3(4c)
affected

4.2(3l)
affected

4.3(4d)
affected

4.3(2f)
affected

4.2(3m)
affected

4.3(5a)
affected

4.3(4e)
affected

4.1(3n)
affected

4.3(4f)
affected

4.2(3n)
affected

4.3(5c)
affected

4.2(3o)
affected

4.3(5d)
affected

4.3(6a)
affected

4.3(6b)
affected

4.3(5e)
affected

4.3(6c)
affected

6.0(1b)
affected

4.2(3p)
affected

6.0(1c)
affected

4.3(6d)
affected

6.0(1d)
affected

6.0(1e)
affected

4.3(6e)
affected

6.0(1f)
affected

References

sec.cloudapps.cisco.com/...ory/cisco-sa-ucsm-cmdinj-GvxLPeSB (cisco-sa-ucsm-cmdinj-GvxLPeSB)

cve.org (CVE-2026-20036)

nvd.nist.gov (CVE-2026-20036)

Download JSON