Home

Description

A vulnerability in the web-based management interface of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.  This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.

PUBLISHED Reserved 2025-10-08 | Published 2026-02-25 | Updated 2026-02-26 | Assigner cisco




MEDIUM: 6.7CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

2.3.1.99
affected

2.3.1.56
affected

2.3.1.110
affected

2.3.1.58
affected

2.6.1.174
affected

2.6.1.157
affected

2.3.1.91
affected

2.3.1.73
affected

2.3.1.66
affected

2.6.1.166
affected

2.3.1.111
affected

2.3.1.166
affected

2.3.1.144
affected

2.6.1.131
affected

2.3.1.130
affected

2.3.1.88
affected

2.6.1.169
affected

2.3.1.75
affected

2.3.1.93
affected

2.3.1.145
affected

2.3.1.155
affected

2.6.1.187
affected

2.3.1.173
affected

2.3.1.179
affected

2.6.1.192
affected

2.3.1.180
affected

2.6.1.204
affected

2.6.1.214
affected

2.3.1.190
affected

2.6.1.224
affected

2.6.1.229
affected

2.3.1.215
affected

2.10.1.159
affected

2.3.1.216
affected

2.6.1.230
affected

2.10.1.166
affected

2.6.1.238
affected

2.6.1.239
affected

2.11.1.154
affected

2.10.1.179
affected

2.3.1.219
affected

2.6.1.254
affected

2.12.0.31
affected

2.12.0.432
affected

2.10.1.207
affected

2.3.1.230
affected

2.6.1.259
affected

2.11.1.182
affected

2.12.0.450
affected

2.10.1.234
affected

2.13.0.198
affected

2.12.0.467
affected

2.13.0.212
affected

2.6.1.264
affected

2.10.1.245
affected

2.11.1.200
affected

2.12.0.498
affected

2.10.1.271
affected

2.12.1.29
affected

2.13.0.243
affected

2.11.1.205
affected

2.6.1.265
affected

2.12.1.48
affected

2.14.1.131
affected

2.13.0.276
affected

2.11.1.228
affected

2.12.1.72
affected

2.10.1.312
affected

2.6.1.272
affected

2.14.1.143
affected

2.14.1.163
affected

2.14.1.167
affected

2.12.1.84
affected

2.16.0.128
affected

2.10.1.328
affected

2.10.1.341
affected

2.11.1.236
affected

2.12.1.95
affected

2.13.0.357
affected

2.16.0.136
affected

2.14.1.186
affected

2.17.0.518
affected

2.14.1.187
affected

Default status
unknown

9.12.2
affected

9.12.1
affected

9.12.3
affected

9.12.4
affected

9.12.3.2
affected

9.12.3.12
affected

9.12.2.5
affected

9.12.1.2
affected

9.12.2.1
affected

9.12.3.7
affected

9.12.2.9
affected

9.12.3.9
affected

9.12.1.3
affected

9.12.4.2
affected

9.12.4.4
affected

9.12.4.7
affected

9.12.4.8
affected

9.12.4.10
affected

9.12.4.13
affected

9.12.4.18
affected

9.12.4.24
affected

9.16.1
affected

9.12.4.26
affected

9.16.1.28
affected

9.12.4.29
affected

9.16.2
affected

9.12.4.30
affected

9.16.2.3
affected

9.12.4.35
affected

9.16.2.7
affected

9.12.4.37
affected

9.17.1
affected

9.16.2.11
affected

9.16.2.13
affected

9.12.4.39
affected

9.12.4.38
affected

9.16.2.14
affected

9.17.1.7
affected

9.12.4.40
affected

9.16.3.3
affected

9.16.3
affected

9.17.1.9
affected

9.16.3.14
affected

9.12.4.41
affected

9.17.1.10
affected

9.18.1
affected

9.12.4.47
affected

9.16.3.15
affected

9.18.1.3
affected

9.17.1.11
affected

9.12.4.48
affected

9.18.2
affected

9.16.3.19
affected

9.17.1.13
affected

9.12.4.50
affected

9.17.1.15
affected

9.12.4.52
affected

9.16.3.23
affected

9.18.2.5
affected

9.16.4
affected

9.12.4.54
affected

9.17.1.20
affected

9.18.2.7
affected

9.19.1
affected

9.16.4.9
affected

9.12.4.55
affected

9.18.2.8
affected

9.16.4.14
affected

9.18.3
affected

9.19.1.5
affected

9.12.4.56
affected

9.17.1.30
affected

9.19.1.9
affected

9.18.3.39
affected

9.16.4.19
affected

9.12.4.58
affected

9.19.1.12
affected

9.18.3.46
affected

9.16.4.27
affected

9.19.1.18
affected

9.18.3.53
affected

9.18.3.55
affected

9.16.4.38
affected

9.17.1.33
affected

9.12.4.62
affected

9.16.4.39
affected

9.18.3.56
affected

9.16.4.42
affected

9.19.1.22
affected

9.18.4
affected

9.18.4.5
affected

9.19.1.24
affected

9.16.4.48
affected

9.18.4.8
affected

9.20.2
affected

9.19.1.27
affected

9.12.4.65
affected

9.16.4.55
affected

9.18.4.22
affected

9.20.2.10
affected

9.16.4.57
affected

9.19.1.28
affected

9.17.1.39
affected

9.12.4.67
affected

9.18.4.24
affected

9.20.2.21
affected

9.16.4.61
affected

9.19.1.31
affected

9.18.4.29
affected

9.20.2.22
affected

9.16.4.62
affected

9.18.4.34
affected

9.20.3
affected

9.16.4.67
affected

9.18.4.40
affected

9.16.4.71
affected

9.20.3.4
affected

9.18.4.47
affected

9.20.3.7
affected

9.17.1.45
affected

9.19.1.37
affected

9.16.4.76
affected

9.18.4.50
affected

9.20.3.10
affected

9.18.4.52
affected

9.20.3.13
affected

9.18.4.53
affected

9.16.4.82
affected

9.20.3.16
affected

9.19.1.42
affected

9.18.4.57
affected

9.16.4.84
affected

9.20.3.20
affected

9.20.4
affected

9.20.4.7
affected

Default status
unknown

4.0(4h)
affected

4.1(1a)
affected

4.0(1c)
affected

4.0(4a)
affected

4.0(1a)
affected

4.0(1d)
affected

4.1(1c)
affected

4.0(2a)
affected

4.0(4g)
affected

4.0(2e)
affected

4.0(4c)
affected

4.0(4f)
affected

4.0(1b)
affected

4.0(2b)
affected

4.0(2d)
affected

4.1(1b)
affected

4.0(4d)
affected

4.0(4e)
affected

4.0(4b)
affected

4.1(2a)
affected

4.1(1d)
affected

4.0(4i)
affected

4.1(1e)
affected

4.1(2b)
affected

4.0(4k)
affected

4.1(3a)
affected

4.1(3b)
affected

4.1(2c)
affected

4.0(4l)
affected

4.1(4a)
affected

4.1(3c)
affected

4.1(3d)
affected

4.2(1c)
affected

4.2(1d)
affected

4.0(4m)
affected

4.1(3e)
affected

4.2(1f)
affected

4.1(3f)
affected

4.2(1i)
affected

4.1(3h)
affected

4.2(1k)
affected

4.2(1l)
affected

4.0(4n)
affected

4.2(1m)
affected

4.1(3i)
affected

4.2(2a)
affected

4.2(1n)
affected

4.1(3j)
affected

4.2(2c)
affected

4.2(2d)
affected

4.2(3b)
affected

4.1(3k)
affected

4.0(4o)
affected

4.2(2e)
affected

4.2(3d)
affected

4.2(3e)
affected

4.2(3g)
affected

4.1(3l)
affected

4.3(2b)
affected

4.2(3h)
affected

4.2(3i)
affected

4.3(2c)
affected

4.1(3m)
affected

4.3(2e)
affected

4.3(3a)
affected

4.2(3j)
affected

4.3(3c)
affected

4.3(4a)
affected

4.2(3k)
affected

4.3(4b)
affected

4.3(4c)
affected

4.2(3l)
affected

4.3(4d)
affected

4.3(2f)
affected

4.2(3m)
affected

4.3(5a)
affected

4.3(4e)
affected

4.1(3n)
affected

4.3(4f)
affected

4.2(3n)
affected

4.3(5c)
affected

4.2(3o)
affected

4.3(5d)
affected

4.3(6a)
affected

4.3(6b)
affected

4.3(5e)
affected

4.2(3p)
affected

References

sec.cloudapps.cisco.com/...Advisory/cisco-sa-ucsciv-wGYtC78q (cisco-sa-ucsciv-wGYtC78q)

cve.org (CVE-2026-20099)

nvd.nist.gov (CVE-2026-20099)

Download JSON