
Cisco has announced patches that address four critical security flaws affecting Identity and Webex services. These flaws could allow an attacker to execute arbitrary code and impersonate any user within the service.
The vulnerability details are below.
CVE-2026-20184 (CVSS Score: 9.8) – Improper certificate validation in the Control Hub and single sign-on (SSO) integration for Webex services could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to a legitimate Cisco Webex service. CVE-2026-20147 (CVSS Score: 9.9) – Insufficient validation of a user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with valid administrator credentials to execute remote code by sending a crafted HTTP request. CVE-2026-20180 and CVE-2026-20186 (CVSS Score: 9.9) – Multiple validation user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker with read-only administrator credentials to execute arbitrary commands on the underlying operating system of an affected device by sending a crafted HTTP request.
“A successful exploit could allow the attacker to gain user-level access to the underlying operating system and escalate privileges to root,” Cisco said in its advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.
“In a single-node ISE deployment, exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition in which unauthenticated endpoints are unable to access the network until the node is restored.”
CVE-2026-20184 is cloud-based and does not require any customer action. However, we recommend that customers using SSO upload a new identity provider (IdP) SAML certificate to Control Hub. The remaining vulnerabilities are resolved in the next version.
CVE-2026-20147 Cisco ISE or ISE-PIC releases prior to Release 3.1 (migrate to fixed release) Cisco ISE Release 3.1 (3.1 Patch 11) Cisco ISE Release 3.2 (3.2 Patch 10) Cisco ISE Release 3.3 (3.3 Patch 11) Cisco ISE Release 3.4 (3.4 Patch 6) Cisco ISE Release 3.5 (3.5) Patch 3) CVE-2026-20180 and CVE-2026-20186 Cisco ISE Releases Prior to Release 3.2 (Migration to Fixed Release) Cisco ISE Release 3.2 (3.2 Patch 8) Cisco ISE Release 3.3 (3.3 Patch 8) Cisco ISE Release 3.4 (3.4 Patch 4) Cisco ISE release 3.5 (no vulnerabilities)
While Cisco said it is not aware of these flaws being exploited, it said it is essential for users to update their instances to the latest version for optimal protection.
Source link
