[CIVN-2026-0160] Secure Boot Bypass Vulnerability in CISCO

By Published On: April 2, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Secure Boot Bypass Vulnerability in CISCO


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Systems Affected


Catalyst 9200 Series Switches, including 9200CX and 9200L switches

Catalyst ESS9300 Embedded Series Switches

Catalyst IE9310 and IE9320 Rugged Series Switches

IE3500 and IE3505 Rugged Series Switches

Overview


A vulnerability has been reported in the bootloader of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches, Cisco Catalyst ESS9300 Embedded Series Switches, Cisco Catalyst IE9310 and IE9320 Rugged Series Switches, and Cisco IE3500 and IE3505 Rugged Series Switches could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute arbitrary code at boot time and break the chain of trust.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


This vulnerability exists due to insufficient validation of software at boot time. An attacker could exploit this vulnerability by manipulating the loaded binaries on an affected device to bypass some of the integrity checks that are performed during the boot process.


Successful exploitation of this vulnerability could allow the attacker to execute code that bypasses the requirement to run Cisco-signed images.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-secureboot-bypass-B6uYxYSZ



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-secureboot-bypass-B6uYxYSZ


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-secureboot-bypass-B6uYxYSZ


CVE Name

CVE-2026-20104




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnOe2gACgkQ3jCgcSdc

ys+8Xg/+M4EkoOycwy1M6gJI1pOgdzPKG7LLR/WFkap0jd5oD3w2LQo2rNv74JNo

sTo4/eFzGZhns/9VrqpI3W6NvFfLSWQx7CsGu3leucyPO5T20pALSZbXqDI2cJgp

W7T1ZEqz1cHlPnQ84CGDMG4xm9QgY9eHPOrB3FXWTLgTqgmtuw28/lu34TWDJRAo

eDqRJZ5uX45RlM1LLOubB9JYc02BEisfuBiXL3qEbK7ivTrAlimq9q8e+eGQA73t

46vb8vJaoWjwpAdd+7ypJ655vvWf8pxtsC8RP1905hPshaOCkbH5YWa/dHukq2wW

kkJpZ74d8Rf9a5DzDrF95EsaT5mYuB0ogU9Va9Rr3aDjma+42eq3LHPjyiFUjvFA

hDz7vhAxRPkg6B9ib0avn90ECLbYoEcg8qsTm/V8ESmZ6Tl5FLS3o1icNvYXGNgW

sy3ylu9j4KBL7mQ4hWuLvu2v09rImHefL40c3fQ36/wcGGxVLrlqD433uAb8rC5Y

rNGm7qsmotBEPYu3F+i4EFiHn3iBUuZVUJOxiI28EsUwp6DilWw13XDWao3ykvAl

W/juzKXHdtvHczhkd+bGySQjFIeM/bcW/tRRtAhvD2P71APKu3w9u7vsekcBN2qz

VhuTubvNqobfXX1DxW34SkMa0qhIkOijaFO6ENXX654lxtYRcF4=

=ywAG

—–END PGP SIGNATURE—–

Share this article