{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-20098","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2025-10-08T11:59:15.369Z","datePublished":"2026-02-04T16:11:48.298Z","dateUpdated":"2026-02-26T15:04:20.557Z"},"containers":{"cna":{"title":"Cisco Meeting Management Arbitrary File Upload Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.\r\n\r\nThis vulnerability is due to improper input validation in certain sections of the web-based management interface. An attacker could exploit this vulnerability&nbsp;by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to upload arbitrary files to the affected system. The malicious files could overwrite system files that are processed by the&nbsp;root system account and allow arbitrary command execution with&nbsp;root privileges. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of video operator."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-file-up-kY47n8kK","name":"cisco-sa-cmm-file-up-kY47n8kK"}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-cmm-file-up-kY47n8kK","discovery":"EXTERNAL","defects":["CSCwr97339"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Unrestricted Upload of File with Dangerous Type","type":"cwe","cweId":"CWE-434"}]}],"affected":[{"vendor":"Cisco","product":"Cisco Meeting Management","versions":[{"version":"CMM3.4.0","status":"affected"},{"version":"CMM3.2.0","status":"affected"},{"version":"CMM2.9.1","status":"affected"},{"version":"CMM2.9.0","status":"affected"},{"version":"CMM3.1.0","status":"affected"},{"version":"CMM3.5.0","status":"affected"},{"version":"CMM3.6.0","status":"affected"},{"version":"CMM3.6.1","status":"affected"},{"version":"CMM3.7.0","status":"affected"},{"version":"CMM3.8.0","status":"affected"},{"version":"CMM3.9.0","status":"affected"},{"version":"CMM3.10.0","status":"affected"},{"version":"CMM3.9.1","status":"affected"},{"version":"CMM3.11.0","status":"affected"},{"version":"CMM3.12.0","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2026-02-04T16:11:48.298Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-20098","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-02-05T04:55:17.537048Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:04:20.557Z"}}]}}