Description

A vulnerability in the web interface of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges on an affected system. This vulnerability is due to the improper transmission of sensitive user information. An attacker could exploit this vulnerability by sending a crafted message to an affected Cisco SSM On-Prem host and retrieving session credentials from subsequent status messages. A successful exploit could allow the attacker to elevate privileges on the affected system from low to administrative. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of System User. Note: This vulnerability exposes information only about users who logged in to the Cisco SSM On-Prem host using the web interface and who are currently logged in. SSH sessions are not affected.

INFO

Published Date :

2026-04-01T16:29:13.496Z

Last Modified :

2026-04-02T03:56:09.678Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2026-20151 vulnerability.

Vendors Products
Cisco
  • Smart Software Manager On-prem
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-20151.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact