Cisco has issued a high-priority security advisory warning of a critical vulnerability in its Smart Software Manager On-Prem (SSM On-Prem) platform.
Tracked as CVE-2026-20160, the flaw carries a CVSS severity score of 9.8 out of 10, placing it among the most dangerous classes of vulnerabilities.
If successfully exploited, an unauthenticated, remote attacker can execute arbitrary commands with root privileges on the underlying operating system, granting unrestricted control over the compromised host.
Cisco SSM On-Prem is an enterprise-grade license management solution designed to help organizations securely monitor and manage their Cisco software licenses within their own private network environment.
Because it often integrates deeply into core enterprise infrastructure, a root-level compromise represents an extreme risk, opening the door to lateral movement, data exfiltration, and full network takeover.
The vulnerability originates from the unintentional exposure of an internal service within the SSM On-Prem environment.
Threat actors can exploit this weakness by crafting and sending specially formed HTTP requests directly to the exposed service’s API.
Critically, the flaw requires no prior authentication and no user interaction, making it an ideal target for fully automated, large-scale exploitation campaigns.
Once root access is achieved, an attacker could take complete control of the host machine. From that privileged vantage point, adversaries could pivot laterally into other segments of the network, harvest sensitive enterprise data, or deploy ransomware and other malicious payloads across connected systems.
Cisco’s Product Security Incident Response Team (PSIRT) discovered the issue internally while working to resolve a Technical Assistance Center (TAC) support case.
As of the advisory’s publication, Cisco has confirmed there is no evidence of public exploitation or active malicious use in the wild.
However, given the near-maximum severity score and the zero-authentication exploitation path, the window for opportunistic attacks could narrow rapidly once the vulnerability gains wider attention.
Affected Versions and the Fix
Administrators must immediately assess whether their deployed version falls within the vulnerable range:
- Vulnerable: SSM On-Prem releases 9-202502 through 9-202510
- Fixed Release: SSM On-Prem version 9-202601
- Not affected: Releases before 9-202502, Cisco Smart Licensing Utility, and SSM satellite products
Cisco has explicitly confirmed that no workarounds or temporary mitigations exist. The only path to remediation is applying the official software update to version 9-202601.
IT and security administrators running affected versions of SSM On-Prem should treat this as an emergency patching priority.
Organizations are strongly advised to consult the official Cisco Security Advisory and upgrade immediately.
Given the severity and the absence of any compensating controls, a delay in patching could result in total enterprise compromise.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Critical Cisco Smart Software Manager Vulnerability Enables Arbitrary Command Execution appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
