<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ucs on cybercrime.club</title><link>https://cybercrime.club/tags/ucs/</link><description>Recent content in Ucs on cybercrime.club</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 03 Apr 2026 14:30:00 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/ucs/index.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Patches Two 9.8 CVSS Flaws in IMC and Smart Software Manager — No Workarounds Available</title><link>https://cybercrime.club/posts/cisco-imc-ssm-cve-2026-20093-cve-2026-20160-auth-bypass-rce/</link><pubDate>Fri, 03 Apr 2026 14:30:00 -0400</pubDate><guid>https://cybercrime.club/posts/cisco-imc-ssm-cve-2026-20093-cve-2026-20160-auth-bypass-rce/</guid><description>&lt;p>Cisco dropped fixes this week for three vulnerabilities across its Integrated Management Controller (IMC) and Smart Software Manager On-Prem (SSM On-Prem), two of which carry a CVSS score of 9.8. Neither has been exploited in the wild yet, but both are trivially exploitable over the network with zero authentication required. There are no workarounds for any of them. If you run UCS servers or SSM On-Prem, stop reading and go patch.&lt;/p></description></item></channel></rss>