287
CVEs
17
Critical
75
High
7
KEV
8
PoC
91
Unpatched C/H
0.3%
Patch Rate
0.5%
Avg EPSS
Severity Breakdown
CRITICAL
17
HIGH
75
MEDIUM
193
LOW
2
Monthly CVE Trend
Affected Products (30)
Ios Xe
31
Command Injection
22
Identity Services Engine
18
Ios Xr
13
Unified Contact Center Express
11
Catalyst Sd Wan Manager
11
Tls
8
Evolved Programmable Network Manager
8
Prime Infrastructure
8
Secure Firewall Management Center
7
Webex Meetings
6
Java
5
Adaptive Security Appliance Software
5
Catalyst Center
5
Nexus Dashboard
5
Jwt Attack
5
Firepower Threat Defense
5
Ssh
4
Deserialization
4
Asyncos
4
Application Policy Infrastructure Controller
4
Unified Communications Manager
4
Crosswork Network Controller
4
Common Services Platform Collector
3
Desk Phone 9851 Firmware
3
Open Redirect
3
Unified Intelligence Center
3
Identity Services Engine Passive Identity Connector
3
Desk Phone 9841 Firmware
3
Desk Phone 9871 Firmware
3
Top Risky CVEs
| CVE | Summary | Severity | CVSS | EPSS | Priority | Signals |
|---|---|---|---|---|---|---|
| CVE-2025-20281 | Cisco ISE and ISE-PIC contain a critical input injection vulnerability (CVE-2025-20281, CVSS 10.0) that allows unauthenticated remote attackers to execute arbitrary code as root on the underlying operating system. With EPSS 30.4% and KEV listing, this vulnerability targets the network access control platform that governs who and what can access the enterprise network — compromising ISE means controlling network admission for the entire organization. | CRITICAL | 10.0 | 30.4% | 150 |
KEV
PoC
No patch
|
| CVE-2026-20131 | Cisco Secure Firewall Management Center (FMC) contains a critical unauthenticated Java deserialization vulnerability (CVE-2026-20131, CVSS 10.0) in its web interface that enables remote code execution as root. KEV-listed with public PoC, this vulnerability allows complete compromise of the central management platform that controls all Cisco firewalls in the organization, enabling attackers to modify security policies, disable protections, and access all network traffic. | CRITICAL | 10.0 | 0.6% | 141 |
KEV
PoC
No patch
|
| CVE-2026-20127 | Cisco Catalyst SD-WAN Controller and Manager contain a critical authentication bypass (CVE-2026-20127, CVSS 10.0) in the peering authentication mechanism that allows unauthenticated remote attackers to obtain full administrative privileges. The vulnerability exists because peering authentication does not properly validate credentials, enabling any attacker with network access to take over the SD-WAN management plane and control the entire WAN fabric. | CRITICAL | 10.0 | 2.6% | 113 |
KEV
PoC
No patch
|
| CVE-2026-20045 | Cisco Unified Communications Manager and related products contain a code injection vulnerability (CVE-2026-20045) that allows unauthenticated remote attackers to execute arbitrary code. This KEV-listed vulnerability affects the core enterprise voice/video infrastructure including Unified CM, IM&P, Unity Connection, and Webex Calling Dedicated Instance, making it a high-priority threat for organizations dependent on Cisco collaboration tools. | HIGH | 8.2 | 1.0% | 92 |
KEV
No patch
|
| CVE-2025-20352 | A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow the following: An authenticated, remote attacker with low. Rated high severity (CVSS 7.7), this vulnerability is remotely exploitable, low attack complexity. Actively exploited in the wild (cisa kev) and no vendor patch available. | HIGH | 7.7 | 2.0% | 90 |
KEV
No patch
|
| CVE-2026-20079 | Unauthenticated auth bypass in Cisco FMC web interface. CVSS 10.0. | CRITICAL | 10.0 | 0.2% | 90 |
PoC
No patch
|
| CVE-2025-20282 | CVE-2025-20282 is a critical remote code execution vulnerability in Cisco ISE and ISE-PIC that allows unauthenticated attackers to upload arbitrary files to privileged directories and execute them as root via an internal API lacking file validation. This is a CVSS 10.0 vulnerability with complete system compromise impact; organizations running affected Cisco ISE deployments face immediate risk of total infrastructure takeover without authentication requirements or user interaction. | CRITICAL | 10.0 | 0.3% | 50 |
No patch
|
| CVE-2024-45208 | Critical remote code execution vulnerability in Versa Director SD-WAN orchestration platform affecting the Cisco NCS application service bound to TCP ports 4566 and 4570. An unauthenticated network attacker can exploit weak HA authentication mechanisms to gain unauthorized administrative access and execute arbitrary code with CVSS 9.8 severity. While no active exploitation has been confirmed, third-party proof-of-concept code has been publicly disclosed, significantly elevating real-world risk. | CRITICAL | 9.8 | 1.2% | 50 |
No patch
|
| CVE-2025-20309 | A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user. | CRITICAL | 10.0 | 0.2% | 50 |
|
| CVE-2025-20286 | Default credentials in Cisco ISE cloud deployments on AWS/Azure/OCI. CVSS 9.9. | CRITICAL | 9.9 | 0.1% | 50 |
No patch
|
| CVE-2026-20160 | Remote code execution in Cisco Smart Software Manager On-Prem allows unauthenticated attackers to execute arbitrary commands with root privileges via an exposed internal service API. The vulnerability stems from unintentional exposure of an internal service that accepts crafted API requests, enabling full system compromise. With a CVSS score of 9.8 and complete attack vector accessibility over the network requiring no authentication or user interaction, this represents a critical security exposure for organizations using SSM On-Prem for Cisco software license management, though no public exploit identified at time of analysis. | CRITICAL | 9.8 | 0.2% | 49 |
No patch
|
| CVE-2026-20129 | Authentication bypass in Cisco Catalyst SD-WAN Manager API allows unauthenticated remote access to the management platform. Separate vulnerability from the peering auth bypass (CVE-2026-20127). | CRITICAL | 9.8 | 0.1% | 49 |
No patch
|
| CVE-2026-20093 | Authentication bypass in Cisco Integrated Management Controller (IMC) allows unauthenticated remote attackers to gain administrative access by exploiting improper password change request handling. Affected products include Cisco Enterprise NFV Infrastructure Software, Unified Computing System (Standalone), and UCS E-Series Software. The attacker can alter any user's password, including Admin accounts, and take full control of the management interface. CVSS 9.8 (Critical) with network-accessible attack vector requiring no privileges or user interaction. No public exploit identified at time of analysis, though EPSS data not available for comprehensive risk assessment. | CRITICAL | 9.8 | 0.0% | 49 |
PoC
No patch
|
| CVE-2026-20098 | Unauthenticated file upload in Cisco Meeting Management's Certificate Management interface allows authenticated attackers to write arbitrary files and execute commands with root privileges on affected systems. An attacker with valid credentials can exploit improper input validation in the web management interface to overwrite system files processed with elevated privileges, leading to complete system compromise. No patch is currently available for this vulnerability. | HIGH | 8.8 | 0.6% | 45 |
No patch
|
| CVE-2025-20236 | A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available. | HIGH | 8.8 | 0.4% | 44 |
No patch
|