Cisco Releases Patches for Critical Vulnerabilities in ISE and Webex Platforms

Cisco Addresses Critical Vulnerabilities in Identity Services and Webex Platforms

Cisco has recently released patches to address four critical security vulnerabilities affecting its Identity Services Engine (ISE) and Webex Services. These flaws could potentially allow attackers to execute arbitrary code and impersonate users within the affected services.

Overview of the Vulnerabilities:

1. CVE-2026-20184 (CVSS Score: 9.8): This vulnerability pertains to improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services. An unauthenticated, remote attacker could exploit this flaw to impersonate any user within the service, thereby gaining unauthorized access to legitimate Cisco Webex services. ([thehackernews.com](https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html?utm_source=openai))

2. CVE-2026-20147 (CVSS Score: 9.9): Found in Cisco ISE and ISE Passive Identity Connector (ISE-PIC), this vulnerability arises from insufficient validation of user-supplied input. An authenticated, remote attacker with administrative credentials could exploit this flaw by sending crafted HTTP requests, leading to remote code execution. ([thehackernews.com](https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html?utm_source=openai))

3. CVE-2026-20180 and CVE-2026-20186 (CVSS Scores: 9.9): These vulnerabilities exist in Cisco ISE due to inadequate validation of user-supplied input. Authenticated, remote attackers with read-only admin credentials could exploit these flaws by sending crafted HTTP requests, allowing them to execute arbitrary commands on the underlying operating system. ([thehackernews.com](https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html?utm_source=openai))

Potential Impact:

Exploitation of these vulnerabilities could have severe consequences:

– Remote Code Execution: Attackers could gain unauthorized access to the underlying operating system, potentially leading to full system compromise.

– Denial of Service (DoS): In single-node ISE deployments, successful exploitation could render the affected ISE node unavailable. This would prevent endpoints that have not yet authenticated from accessing the network until the node is restored. ([thehackernews.com](https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html?utm_source=openai))

– Unauthorized Access: Particularly concerning is the ability for attackers to impersonate any user within Webex Services, leading to potential data breaches and unauthorized actions.

Recommended Actions:

Cisco has addressed these vulnerabilities in the following software versions:

– CVE-2026-20147:

– Cisco ISE or ISE-PIC Release earlier than 3.1: Migrate to a fixed release.

– Cisco ISE Release 3.1: Update to Patch 11.

– Cisco ISE Release 3.2: Update to Patch 10.

– Cisco ISE Release 3.3: Update to Patch 11.

– Cisco ISE Release 3.4: Update to Patch 6.

– Cisco ISE Release 3.5: Update to Patch 3.

– CVE-2026-20180 and CVE-2026-20186:

– Cisco ISE Release earlier than 3.2: Migrate to a fixed release.

– Cisco ISE Release 3.2: Update to Patch 8.

– Cisco ISE Release 3.3: Update to Patch 8.

– Cisco ISE Release 3.4: Update to Patch 4.

– Cisco ISE Release 3.5: Not Vulnerable.

For CVE-2026-20184, as it pertains to cloud-based services, no direct customer action is required. However, customers utilizing SSO are advised to upload a new identity provider (IdP) SAML certificate to Control Hub to ensure continued security. ([thehackernews.com](https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html?utm_source=openai))

Importance of Timely Updates:

While Cisco has stated that there is no evidence of these vulnerabilities being exploited in the wild, it is crucial for users to update their systems promptly. Timely application of patches is essential to maintain optimal protection against potential threats.

Conclusion:

The discovery and subsequent patching of these critical vulnerabilities underscore the importance of proactive cybersecurity measures. Organizations utilizing Cisco ISE and Webex Services should prioritize updating their systems to the latest versions to safeguard against potential exploits.