A critical vulnerability in Cisco's Integrated Management Controller (IMC) has been patched, carrying a CVSS score of 9.8 out of 10. This flaw, tracked as CVE-2026-20093, allows an unauthenticated remote attacker to bypass authentication and gain elevated access to the system1. The vulnerability is considered highly severe, as it could enable a remote compromise of the system without requiring any credentials. Cisco has released updates to address this issue, and administrators are advised to apply the patches as soon as possible. The high CVSS score indicates a significant risk of exploitation, and the fact that it is being actively discussed by Cisco suggests that it may be a target for malicious actors. This matters to practitioners because the exploitation status of CVE-2026-20093 will determine whether this is a patch-now or monitor situation, highlighting the need for prompt attention to prevent potential system compromise.