[CIVN-2026-0132] Privilege Escalation Vulnerability in CISCO

By Published On: March 12, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Privilege Escalation Vulnerability in CISCO


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Systems Affected


Cisco IOS XR Software

Cisco IOS XRv 9000 Routers

Overview


Multiple  vulnerabilities have been reported in Cisco IOS XR Software could allow an  authenticated, local attacker to execute commands as root on an underlying operating system or gain full administrative control of an affected device.


Target Audience: 

All IT administrators and individuals responsible for maintaining and updating in Software.


Risk Assessment:

High risk of data manipulation and service disruption.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


These vulnerabilities exist due to insufficient validation of user arguments that are passed to specific CLI commands and incorrect mapping of a command to task groups within the source code. An attacker could exploit this vulnerability by using crafted commands at the prompt and   CLI command to bypass the task group-based checks.


Successful exploitation of these vulnerabilities could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system and perform actions on an affected device without authorization checks.


Solution


Apply appropriate updates as mentioned in Cisco Advisory

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W



Vendor Information


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W


References


CISCO

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W


CVE Name

CVE-2026-20040

CVE-2026-20046




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmy0b0ACgkQ3jCgcSdc

ys/V1xAAp04kpWkRwTBVyi+4YtNqSfjEvV7KaQGFZXHoo6Wt3VfKOptIxvpM7Bwx

344P2P/+zsT/koa7i4CYgTswmOShIgGkk+GgBjLYyWaMlD0rhRC92yQLlfFONjZH

OWcfrQbfry2WU8rm4UEiR9yBlOGMxB7ESG9yz/7P6yhuCvenOT4H9N3wT3PbMsBh

TI3ubFz3lNs7cWmEkad+DSud0KJoggiES3876tX8MCVX2q5xGRlNmSW8GH3T5SL3

VJub5cKXpXQ7vUZ8ZeJlM8ckyk17gvZrCfkdd/Li4Q8x69Djk0OWJMfPVevti8U5

bAOyvA6GXprB0Lpfd/mMWCcDWYX+6NDmPgFAAmpf9bCI4KQ33+PUVJBNOK7rdTCU

AkmHu40FNodESRzBtrc8vy1ed9ChLOdMm58SDMiDPP80wcVtC6UssSwn7CNb3XGg

jRbOIaYI78OeJHkBNct2k6UTQhD4GrVEXesJiwPt/qXUl20ZhvCZAllAAJkOtM66

yvj29b3tnQAb3jNje7KiUdMrOwOWO4euMFw+DR4rsxjbD10F9eA9fzeCkztbBZk0

/IaXVDE1jJ0xIakTW5w9K2Dtt6YW4KEkbWiyWPjYBc7vvVdaVm4tzul4jEDP8toy

K6ctQQgxLA7xS12YcFtG00/pHXJb6VmWugCdxRswtymV57x2FdE=

=RTdE

—–END PGP SIGNATURE—–

Share this article