[CIVN-2026-0220] Multiple Vulnerabilities in Cisco IoT Field Network Director

By Published On: May 7, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Cisco IoT Field Network Director


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Cisco IoT Field Network Director release 4 and earlier

Cisco IoT Field Network Director 5.0.x versions prior to 5.0.0-117

Overview


Multiple vulnerabilities have been reported in the Cisco IoT Field Network Director, which could allow an attacker to execute commands, access unauthorized files, or cause a denial of service condition on the targeted system.


Target Audience:

All organizations and individuals using Cisco IoT Field Network Director.


Risk Assessment:

Risk of unauthorized file access, command execution, and denial of service.


Impact Assessment:

Potential for information disclosure, command execution, and denial of service.


Description


Cisco IoT Field Network Director is a network management solution designed to simplify the man-agement and monitoring of industrial and IoT network deployments.


These vulnerabilities exist in the web-based management interface of Cisco IoT Field Network Director due to insufficient input validation, improper file access restrictions, and improper error handling. This could allow an authenticated remote attacker with low privileges to execute limited commands, retrieve unauthorized files, or cause a denial of service condition on a managed router.


Successful exploitation of these vulnerabilities could allow an attacker to execute commands, access unauthorized files, or cause a denial of service condition on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iot-fnd-dos-n8N26Q4u#vp



Vendor Information


Cisco

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iot-fnd-dos-n8N26Q4u#vp


References


Cisco

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iot-fnd-dos-n8N26Q4u#vp


CVE Name

CVE-2026-20167

CVE-2026-20168

CVE-2026-20169




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn8pD4ACgkQ3jCgcSdc

ys9Nqg/9EusaY/vTBpw8snY/rpO062MpuEgkzCysXbwjaOUFdzoxPg9yBBAZ+SdZ

TO6yLXIt//51zYZBW19EAwshbkwV4O8B2GZyV1W7ft4UAzQXZEesDISrVGSxc/YM

eRe7h3fQMEi1xfKnsROlG6E1y9cFiB3xU7x6QK8A/IWwgMZnpZqLOjPeYZsPTjlA

jKM9bRPar/3Uzd82c6ataI4745cl1g+l358UCmKzsRAtWgCmVEmFAPSODCBUaAi6

N3rst/umuFBurVmpa+/BUJxUaMnJS9jnHq/hK0UEd8aTffYC5gMnS+6bAHDwbFA9

eLrIEC/02Lq4D3e95igEP+puHC+9jNChJeDmF0Sf/u4rIK6z9Bltk8qlxgY4ZlXX

itMNkPXj4RJ+Hza6nmjqnRP17kQAGBRUJi1Rdt99uwdEM+X2fAV5KktqXgrc5o7V

6zkZLJ7+HTz8OG/oLyn3GF9kihXJnh02c8kR2KGwO24ps9TLDZQV5LOvsD1hTXfc

1Z1+ov68WxhxF5CmJY4mJoxjDP7v/zAULhk23Kg8ni9sB4yEio89s65oFy6GW291

0nhe7A17D+FKDPP/fGSO79doKDGpqF+wo+RSVlkGNB2FYy/m+khqJLWY4t/bQj9L

wYqHSZ7qTbq+hjERZ3gMysT5QhYNhdglv7kakh5AgGFakibJ2zU=

=H5hi

—–END PGP SIGNATURE—–

Share this article