๐Ÿ” CVE Alert

CVE-2026-20092

MEDIUM 6.0

Cisco Intersight Virtual Appliance Privilege Escalation Vulnerability

CVSS Score
6.0
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the read-only maintenance shell of Cisco Intersight Virtual Appliance could allow an authenticated, local attacker with administrative privileges to elevate privileges to root on the virtual appliance. This vulnerability is due to improper file permissions on configuration files for system accounts within the maintenance shell of the virtual appliance. An attacker could exploit this vulnerability by accessing the maintenance shell as a read-only administrator and manipulating system files to grant root privileges. A successful exploit could allow the attacker to elevate their privileges to root on the virtual appliance and gain full control of the appliance, giving them the ability to access sensitive information, modify workloads and configurations on the host system, and cause a denial of service (DoS).

CWE CWE-732
Vendor cisco
Product cisco intersight virtual appliance
Ecosystems
Industries
NetworkingTelecommunications
Published Jan 21, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for cisco cisco intersight virtual appliance

Be the first to know when new medium vulnerabilities affecting cisco cisco intersight virtual appliance are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Cisco / Cisco Intersight Virtual Appliance
1.1.4-0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
sec.cloudapps.cisco.com: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-intersight-privesc-p6tBm6jk