Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26057: CWE-668: Exposure of Resource to Wrong Sphere in cisco-ai-defense skill-scanner

0
Medium
VulnerabilityCVE-2026-26057cvecve-2026-26057cwe-668
Published: Thu Feb 19 2026 (02/19/2026, 18:41:13 UTC)
Source: CVE Database V5
Vendor/Project: cisco-ai-defense
Product: skill-scanner

Description

Skill Scanner is a security scanner for AI Agent Skills that detects prompt injection, data exfiltration, and malicious code patterns. A vulnerability in the API Server of Skill Scanner could allow a unauthenticated, remote attacker to interact with the server API and either trigger a denial of service (DoS) condition or upload arbitrary files. This vulnerability is due to an erroneous binding to multiple interfaces. An attacker could exploit this vulnerability by sending API requests to a device exposing the affected API Server. A successful exploit could allow the attacker to consume an excessive amount of resources (memory starvation) or to upload files to arbitrary folders on the affected device. This vulnerability affects Skill-scanner 1.0.1 and earlier releases when the API Server is enabled. The API Server is not enabled by default. Skill-scanner software releases 1.0.2 and later contain the fix for this vulnerability.

AI-Powered Analysis

AILast updated: 02/19/2026, 22:02:47 UTC

Technical Analysis

CVE-2026-26057 is a vulnerability classified under CWE-668 (Exposure of Resource to Wrong Sphere) affecting the API Server component of Cisco AI Defense's Skill Scanner software, versions before 1.0.2. Skill Scanner is designed to analyze AI Agent Skills for security issues such as prompt injection and malicious code. The vulnerability stems from the API Server erroneously binding to multiple network interfaces, exposing it beyond intended boundaries. This misconfiguration allows unauthenticated remote attackers to interact with the API Server without any credentials or user interaction. Attackers can exploit this by sending crafted API requests to the exposed server, resulting in two primary attack vectors: (1) triggering a denial of service condition through excessive resource consumption, specifically memory starvation, and (2) uploading arbitrary files to arbitrary directories on the affected device, potentially compromising system integrity. The API Server is disabled by default, which limits the attack surface, but if enabled, the device becomes vulnerable. Cisco addressed this vulnerability in Skill Scanner version 1.0.2 by correcting the network binding behavior to restrict exposure. No public exploits or active exploitation have been reported to date. The CVSS v3.1 base score is 6.5, reflecting a medium severity level due to the lack of required authentication and user interaction, but limited impact on availability and moderate impact on confidentiality and integrity.

Potential Impact

The vulnerability allows unauthenticated remote attackers to consume excessive system resources, potentially causing denial of service conditions that disrupt the availability of the Skill Scanner service and possibly other dependent systems. More critically, arbitrary file upload capability enables attackers to place malicious files anywhere on the device, which can lead to system compromise, unauthorized code execution, or persistent backdoors. This threatens the confidentiality and integrity of the affected systems and any data processed by them. Organizations relying on Skill Scanner for AI security assessments may face operational disruptions and risk exposure of sensitive AI skill data. The impact is heightened in environments where the API Server is enabled and accessible from untrusted networks. Since the API Server is not enabled by default, the overall risk is mitigated but remains significant for misconfigured or legacy deployments. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation. The vulnerability could be leveraged as a foothold in broader attack campaigns targeting AI infrastructure or critical Cisco AI Defense deployments.

Mitigation Recommendations

1. Upgrade all instances of Cisco AI Defense Skill Scanner to version 1.0.2 or later, where the vulnerability is fixed. 2. Verify that the API Server component is disabled unless explicitly required; keep it disabled if not in use. 3. If the API Server must be enabled, restrict network access strictly using firewall rules or network segmentation to trusted management networks only. 4. Monitor network traffic to detect unusual API requests or spikes in resource usage that may indicate exploitation attempts. 5. Implement host-based intrusion detection to identify unauthorized file uploads or modifications on devices running Skill Scanner. 6. Regularly audit configurations to ensure no unintended exposure of the API Server to public or untrusted networks. 7. Employ application-layer gateways or reverse proxies to add authentication and logging if the API Server must be exposed. 8. Maintain up-to-date backups of affected systems to enable recovery in case of compromise. These steps go beyond generic advice by focusing on configuration management, network controls, and monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-10T18:01:31.899Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699784dbd7880ec89b35846d

Added to database: 2/19/2026, 9:47:07 PM

Last enriched: 2/19/2026, 10:02:47 PM

Last updated: 2/21/2026, 12:22:12 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats