{
    "document": {
        "category": "csaf_security_advisory",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE"
            }
        },
        "lang": "nl",
        "notes": [
            {
                "category": "legal_disclaimer",
                "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
            },
            {
                "category": "description",
                "text": "Cisco heeft meerdere kwetsbaarheden verholpen in Cisco Integrated Management Controller (IMC).",
                "title": "Feiten"
            },
            {
                "category": "description",
                "text": "De kwetsbaarheden bevinden zich in de webgebaseerde managementinterface van Cisco IMC. Een onbevoegde externe aanvaller kan via de functionaliteit voor het wijzigen van wachtwoorden de authenticatie omzeilen door speciaal opgemaakte HTTP-verzoeken te versturen, wat leidt tot ongeautoriseerde administratieve toegang. Daarnaast kunnen geauthenticeerde aanvallers, waaronder gebruikers met alleen leesrechten, door onvoldoende inputvalidatie command injection uitvoeren en willekeurige root-commando's of code uitvoeren, wat resulteert in privilege-escalatie en volledige controle over het systeem. Verder zijn er meerdere cross-site scripting (XSS) kwetsbaarheden, waaronder opgeslagen en gereflecteerde XSS, die geauthenticeerde gebruikers met administratieve rechten in staat stellen om kwaadaardige scripts te injecteren en uit te voeren in browsers van gebruikers die met de interface werken. Ook kunnen onbevoegde externe aanvallers via gereflecteerde XSS kwetsbaarheden kwaadaardige scripts injecteren door gebruikers te verleiden op speciaal opgemaakte links te klikken, wat kan leiden tot sessiekaping en ongeautoriseerde acties binnen de context van de getroffen gebruikers. Alle kwetsbaarheden zijn het gevolg van onvoldoende inputvalidatie in de webinterface van Cisco IMC.\n\nVoor succesvol misbruik moet de kwaadwillende toegang hebben tot de management-interface. Het is goed gebruik een dergelijke interface niet publiek toegankelijk te hebben, maar af te steunen in een separate beheeromgeving.",
                "title": "Interpretaties"
            },
            {
                "category": "description",
                "text": "Cisco heeft updates uitgebracht om de kwetsbaarheden in Cisco Integrated Management Controller te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
                "title": "Oplossingen"
            },
            {
                "category": "general",
                "text": "medium",
                "title": "Kans"
            },
            {
                "category": "general",
                "text": "high",
                "title": "Schade"
            },
            {
                "category": "general",
                "text": "Improper Input Validation",
                "title": "CWE-20"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                "title": "CWE-77"
            },
            {
                "category": "general",
                "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                "title": "CWE-79"
            },
            {
                "category": "general",
                "text": "Out-of-bounds Write",
                "title": "CWE-787"
            }
        ],
        "publisher": {
            "category": "coordinator",
            "contact_details": "cert@ncsc.nl",
            "name": "Nationaal Cyber Security Centrum",
            "namespace": "https://www.ncsc.nl/"
        },
        "references": [
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-auth-bypass-AgG2BxTn"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-cmd-inj-3hKN3bVt"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-xss-A2tkgVAB"
            },
            {
                "category": "external",
                "summary": "Reference",
                "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM#fs"
            }
        ],
        "title": "Kwetsbaarheden verholpen in Cisco Integrated Management Controller",
        "tracking": {
            "current_release_date": "2026-04-03T10:34:46.145536Z",
            "generator": {
                "date": "2025-08-04T16:30:00Z",
                "engine": {
                    "name": "V.A.",
                    "version": "1.3"
                }
            },
            "id": "NCSC-2026-0106",
            "initial_release_date": "2026-04-03T10:34:46.145536Z",
            "revision_history": [
                {
                    "date": "2026-04-03T10:34:46.145536Z",
                    "number": "1.0.0",
                    "summary": "Initiele versie"
                }
            ],
            "status": "final",
            "version": "1.0.0"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-1"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Cisco Unified Computing System (Standalone)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-2"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Cisco Unified Computing System E-Series Software (UCSE)"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-3"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Enterprise NFV Infrastructure Software"
                    },
                    {
                        "branches": [
                            {
                                "category": "product_version_range",
                                "name": "vers:unknown/*",
                                "product": {
                                    "name": "vers:unknown/*",
                                    "product_id": "CSAFPID-4"
                                }
                            }
                        ],
                        "category": "product_name",
                        "name": "Integrated Management Controller"
                    }
                ],
                "category": "vendor",
                "name": "Cisco"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2026-20093",
            "notes": [
                {
                    "category": "description",
                    "text": "A vulnerability in Cisco Integrated Management Controller's password change feature allows unauthenticated remote attackers to bypass authentication and gain administrative access via crafted HTTP requests.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20093 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20093.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 9.8,
                        "baseSeverity": "CRITICAL"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20093"
        },
        {
            "cve": "CVE-2026-20094",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "other",
                    "text": "Out-of-bounds Write",
                    "title": "CWE-787"
                },
                {
                    "category": "description",
                    "text": "Multiple vulnerabilities in Cisco IMC's web-based management interface allow authenticated remote attackers with read-only access to perform command injection, execute arbitrary root-level commands, and escalate privileges due to improper input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20094 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20094.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                        "baseScore": 8.8,
                        "baseSeverity": "HIGH"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20094"
        },
        {
            "cve": "CVE-2026-20095",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "other",
                    "text": "Out-of-bounds Write",
                    "title": "CWE-787"
                },
                {
                    "category": "description",
                    "text": "Multiple vulnerabilities in Cisco IMC's web-based management interface allow authenticated administrators to perform command injection, execute arbitrary root commands, and escalate privileges due to improper input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20095 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20095.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20095"
        },
        {
            "cve": "CVE-2026-20096",
            "cwe": {
                "id": "CWE-77",
                "name": "Improper Neutralization of Special Elements used in a Command ('Command Injection')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "other",
                    "text": "Out-of-bounds Write",
                    "title": "CWE-787"
                },
                {
                    "category": "description",
                    "text": "Multiple vulnerabilities in Cisco IMC's web-based management interface allow authenticated administrators to perform command injection, execute arbitrary root commands, and escalate privileges due to improper input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20096 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20096.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20096"
        },
        {
            "cve": "CVE-2026-20097",
            "cwe": {
                "id": "CWE-787",
                "name": "Out-of-bounds Write"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Out-of-bounds Write",
                    "title": "CWE-787"
                },
                {
                    "category": "other",
                    "text": "Improper Neutralization of Special Elements used in a Command ('Command Injection')",
                    "title": "CWE-77"
                },
                {
                    "category": "description",
                    "text": "Multiple vulnerabilities in Cisco IMC's web-based management interface allow authenticated admin-level attackers to execute arbitrary root-level code and escalate privileges due to improper input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20097 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20097.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
                        "baseScore": 6.5,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20097"
        },
        {
            "cve": "CVE-2026-20087",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "Multiple stored and reflected cross-site scripting (XSS) vulnerabilities in Cisco IMC's web-based management interface allow authenticated remote attackers with admin privileges to execute arbitrary script code in users' browsers via insufficient input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20087 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20087.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 4.8,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20087"
        },
        {
            "cve": "CVE-2026-20088",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "Multiple stored and reflected cross-site scripting (XSS) vulnerabilities in Cisco IMC's web-based management interface allow authenticated remote attackers with admin privileges to execute arbitrary script code in users' browsers via insufficient input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20088 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20088.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 4.8,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20088"
        },
        {
            "cve": "CVE-2026-20089",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "Multiple stored and reflected cross-site scripting (XSS) vulnerabilities in Cisco IMC's web-based management interface allow authenticated remote attackers with admin privileges to execute arbitrary script code in users' browsers via insufficient input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20089 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20089.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 4.8,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20089"
        },
        {
            "cve": "CVE-2026-20090",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "Multiple stored and reflected cross-site scripting (XSS) vulnerabilities in Cisco IMC's web-based management interface allow authenticated remote attackers with admin privileges to execute arbitrary script code in users' browsers via insufficient input validation.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20090 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20090.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 4.8,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20090"
        },
        {
            "cve": "CVE-2026-20085",
            "cwe": {
                "id": "CWE-79",
                "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
            },
            "notes": [
                {
                    "category": "other",
                    "text": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                    "title": "CWE-79"
                },
                {
                    "category": "description",
                    "text": "Multiple reflected cross-site scripting (XSS) vulnerabilities in Cisco IMC's web-based management interface allow unauthenticated remote attackers to execute arbitrary scripts by tricking users into clicking malicious links.",
                    "title": "Summary"
                }
            ],
            "product_status": {
                "known_affected": [
                    "CSAFPID-1",
                    "CSAFPID-2",
                    "CSAFPID-3",
                    "CSAFPID-4"
                ]
            },
            "references": [
                {
                    "category": "self",
                    "summary": "CVE-2026-20085 | NCSC-NL Website",
                    "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20085.json"
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "version": "3.1",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                        "baseScore": 6.1,
                        "baseSeverity": "MEDIUM"
                    },
                    "products": [
                        "CSAFPID-1",
                        "CSAFPID-2",
                        "CSAFPID-3",
                        "CSAFPID-4"
                    ]
                }
            ],
            "title": "CVE-2026-20085"
        }
    ]
}