Initiatieven voor
Als nationale autoriteit voor cyberveiligheid heeft het CCB verschillende initiatieven ontwikkeld voor specifieke doelgroepen die hier worden gepresenteerd.
Last update: 03/04/2026
Affected software:
Type: CWE-20: Improper Input Validation
CVE/CVSS: CVE-2026-20093: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
The risks of this vulnerability are high because no authentication is required to exploit it, making it accessible to any attacker. A successful compromise can impact critical systems, giving attackers insight into an organization's internal network. This has a severe impact on the confidentiality, integrity, and availability of the affected system.
CVE-2026-20093 is a vulnerability where an unauthenticated remote attacker can completely bypass the login process and gain full administrative access to the system. This allows the attacker to change the password of any user.
Cisco IMC manages servers at a hardware level which makes this is especially dangerous as the attacker could manipulate hardware settings, power cycle servers, disrupt critical infrastructure, and use the compromised device to launch attacks on other systems on the network.
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.