
[CIVN-2026-0160] Secure Boot Bypass Vulnerability in CISCO
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Secure Boot Bypass Vulnerability in CISCO
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Catalyst 9200 Series Switches, including 9200CX and 9200L switches
Catalyst ESS9300 Embedded Series Switches
Catalyst IE9310 and IE9320 Rugged Series Switches
IE3500 and IE3505 Rugged Series Switches
Overview
A vulnerability has been reported in the bootloader of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches, Cisco Catalyst ESS9300 Embedded Series Switches, Cisco Catalyst IE9310 and IE9320 Rugged Series Switches, and Cisco IE3500 and IE3505 Rugged Series Switches could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute arbitrary code at boot time and break the chain of trust.
Target Audience:
All IT administrators and individuals responsible for maintaining and updating in Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to insufficient validation of software at boot time. An attacker could exploit this vulnerability by manipulating the loaded binaries on an affected device to bypass some of the integrity checks that are performed during the boot process.
Successful exploitation of this vulnerability could allow the attacker to execute code that bypasses the requirement to run Cisco-signed images.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-secureboot-bypass-B6uYxYSZ
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-secureboot-bypass-B6uYxYSZ
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xe-secureboot-bypass-B6uYxYSZ
CVE Name
CVE-2026-20104
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=ywAG
—–END PGP SIGNATURE—–


