{"id":3603,"date":"2026-04-02T15:21:00","date_gmt":"2026-04-02T15:21:00","guid":{"rendered":"http:\/\/infosec-daily.com\/?page_id=3603"},"modified":"2026-04-02T15:21:00","modified_gmt":"2026-04-02T15:21:00","slug":"cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=3603","title":{"rendered":"Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise"},"content":{"rendered":"<p>Cisco\u00a0has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system with elevated privileges.<br \/>\nThe\u00a0vulnerability, tracked as CVE-2026-20093, carries a CVSS score of 9.8\u00a0out of a maximum of\u00a010.0.<br \/>\n&#8220;This<\/p>","protected":false},"excerpt":{"rendered":"<p>Cisco\u00a0has released updates to address a critical security flaw in the Integrated Management Controller (IMC) that, if successfully exploited, could allow an unauthenticated, remote attacker to bypass authentication and gain&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3604,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-3603","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3603"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/3603\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/3604"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}