
[CIVN-2026-0132] Privilege Escalation Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Privilege Escalation Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Cisco IOS XR Software
Cisco IOS XRv 9000 Routers
Overview
Multiple vulnerabilities have been reported in Cisco IOS XR Software could allow an authenticated, local attacker to execute commands as root on an underlying operating system or gain full administrative control of an affected device.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
These vulnerabilities exist due to insufficient validation of user arguments that are passed to specific CLI commands and incorrect mapping of a command to task groups within the source code. An attacker could exploit this vulnerability by using crafted commands at the prompt and CLI command to bypass the task group-based checks.
Successful exploitation of these vulnerabilities could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system and perform actions on an affected device without authorization checks.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-privesc-bF8D5U4W
CVE Name
CVE-2026-20040
CVE-2026-20046
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=RTdE
—–END PGP SIGNATURE—–


