Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Ban on PFAS products expands in 2026 as US state law takes effect

Fashion retailer Express left customers’ personal data and order details exposed on the internet

This simulation startup wants to be the Cursor of physics AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cisco patches four critical identity services, Webex flaw that allows code execution
Identity

Cisco patches four critical identity services, Webex flaw that allows code execution

By April 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananApril 16, 2026Vulnerability/Network Security

Cisco has announced patches that address four critical security flaws affecting Identity and Webex services. These flaws could allow an attacker to execute arbitrary code and impersonate any user within the service.

The vulnerability details are below.

CVE-2026-20184 (CVSS Score: 9.8) – Improper certificate validation in the Control Hub and single sign-on (SSO) integration for Webex services could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to a legitimate Cisco Webex service. CVE-2026-20147 (CVSS Score: 9.9) – Insufficient validation of a user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with valid administrator credentials to execute remote code by sending a crafted HTTP request. CVE-2026-20180 and CVE-2026-20186 (CVSS Score: 9.9) – Multiple validation user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker with read-only administrator credentials to execute arbitrary commands on the underlying operating system of an affected device by sending a crafted HTTP request.

“A successful exploit could allow the attacker to gain user-level access to the underlying operating system and escalate privileges to root,” Cisco said in its advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.

“In a single-node ISE deployment, exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition in which unauthenticated endpoints are unable to access the network until the node is restored.”

CVE-2026-20184 is cloud-based and does not require any customer action. However, we recommend that customers using SSO upload a new identity provider (IdP) SAML certificate to Control Hub. The remaining vulnerabilities are resolved in the next version.

CVE-2026-20147 Cisco ISE or ISE-PIC releases prior to Release 3.1 (migrate to fixed release) Cisco ISE Release 3.1 (3.1 Patch 11) Cisco ISE Release 3.2 (3.2 Patch 10) Cisco ISE Release 3.3 (3.3 Patch 11) Cisco ISE Release 3.4 (3.4 Patch 6) Cisco ISE Release 3.5 (3.5) Patch 3) CVE-2026-20180 and CVE-2026-20186 Cisco ISE Releases Prior to Release 3.2 (Migration to Fixed Release) Cisco ISE Release 3.2 (3.2 Patch 8) Cisco ISE Release 3.3 (3.3 Patch 8) Cisco ISE Release 3.4 (3.4 Patch 4) Cisco ISE release 3.5 (no vulnerabilities)

While Cisco said it is not aware of these flaws being exploited, it said it is essential for users to update their instances to the latest version for optimal protection.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHidden passenger? How to route Taboola logged in banking sessions to Temu?
Next Article [Webinar] Find and eliminate isolated non-human identities in the environment

Related Posts

[Webinar] Find and eliminate isolated non-human identities in the environment

April 16, 2026

Hidden passenger? How to route Taboola logged in banking sessions to Temu?

April 16, 2026

Abuse of Obsidian plugin leads to PHANTOMPULSE RAT in targeted financial and cryptocurrency attacks

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Ban on PFAS products expands in 2026 as US state law takes effect

Fashion retailer Express left customers’ personal data and order details exposed on the internet

This simulation startup wants to be the Cursor of physics AI

[Webinar] Find and eliminate isolated non-human identities in the environment

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.