{"id":615,"date":"2026-04-16T12:03:46","date_gmt":"2026-04-16T12:03:46","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=615"},"modified":"2026-04-16T12:03:46","modified_gmt":"2026-04-16T12:03:46","slug":"cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=615","title":{"rendered":"Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 16, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Network Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihdjDVphpsoBIBjhimILabg28ZsD4p-xNzJol1uD3SSIRBvkp-juko45B2sjKpQmJi-h2tHZf2yWAvuCOZRs3m3q4w5sj7x-MyXWosuKglLblipF_94T8f8OQ8_peVgqZTrnjxF8dPRLfv63K8zrbQYqh898b31p_2C37UO0DNAuR8cESZeo4XTFlsDs0C\/s1700-e365\/cisco-flaws.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the\u00a0service.<\/p>\n<p>The details of the vulnerabilities are below\u00a0&#8211;<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-webex-cui-cert-8jSZYhWL\">CVE-2026-20184<\/a><\/strong> (CVSS score: 9.8) &#8211; An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services.<\/li>\n<li><strong><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ise-rce-traversal-8bYndVrZ\">CVE-2026-20147<\/a><\/strong> (CVSS score: 9.9) &#8211; An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests.<\/li>\n<li><strong><a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ise-rce-4fverepv\">CVE-2026-20180 and CVE-2026-20186<\/a><\/strong> (CVSS scores: 9.9) &#8211; Multiple insufficient validation of user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker in possession of read only admin credentials to execute arbitrary commands on the underlying operating system of an affected device by sending crafted HTTP requests.<\/li>\n<\/ul>\n<p>\u00abA successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root,\u00bb Cisco said in an advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-security-guide-d-1\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRxP56rpa2W0O_0yc0xgs5l2r4FRV4Wiuq3IqWuFdsd_4g1c3oRVXoHtW9gxo8ObuxmyjqkAf3cD6N1JbVDos7QX99ZHtmeVrg-FUzSnMZLTl1ZFyiSkpqQiw6BcHXz52jr3s42xWEDFOpwWK6HgXOqscGMNkhA5pZK7h6zVV4dpDaLfgy17TidZXVrtUB\/s728-e100\/nudge-d-1.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abIn single-node ISE deployments, successful exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In\u00a0that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored.\u00bb<\/p>\n<p>CVE-2026-20184 requires no customer action as it&#8217;s cloud-based. However, customers who are using SSO\u00a0are <a href=\"https:\/\/help.webex.com\/en-us\/article\/nstvmyo\/Manage-single-sign-on-integration-in-Control-Hub#task_394598AFBCD3D73A488E6DBB99AD3214\">advised<\/a> to upload a new identity provider (IdP) SAML certificate to Control Hub. The\u00a0remaining vulnerabilities have been addressed in the following versions\u00a0&#8211;<\/p>\n<ul>\n<li><strong>CVE-2026-20147<\/strong>\n<ul>\n<li>Cisco ISE or ISE-PIC Release earlier than 3.1\u00a0(Migrate to a fixed release)<\/li>\n<li>Cisco ISE Release 3.1\u00a0(3.1\u00a0Patch 11)<\/li>\n<li>Cisco ISE Release 3.2\u00a0(3.2\u00a0Patch 10)<\/li>\n<li>Cisco ISE Release 3.3\u00a0(3.3\u00a0Patch 11)<\/li>\n<li>Cisco ISE Release 3.4\u00a0(3.4\u00a0Patch 6)<\/li>\n<li>Cisco ISE Release 3.5\u00a0(3.5\u00a0Patch 3)<\/li>\n<\/ul>\n<\/li>\n<li><strong>CVE-2026-20180 and CVE-2026-20186<\/strong>\n<ul>\n<li>Cisco ISE Release earlier than 3.2\u00a0(Migrate to a fixed release)<\/li>\n<li>Cisco ISE Release 3.2\u00a0(3.2\u00a0Patch 8)<\/li>\n<li>Cisco ISE Release 3.3\u00a0(3.3\u00a0Patch 8)<\/li>\n<li>Cisco ISE Release 3.4\u00a0(3.4\u00a0Patch 4)<\/li>\n<li>Cisco ISE Release 3.5\u00a0(Not Vulnerable)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>While Cisco noted that it is not aware of any of these shortcomings being exploited in the\u00a0wild, it&#8217;s essential that users\u00a0update their instances to the latest version for optimal protection.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 16, 2026Vulnerability \/ Network Security Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution&hellip;<\/p>\n","protected":false},"author":1,"featured_media":616,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[124,10,58,524,13,11,85,57,1238,1239],"class_list":["post-615","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cisco","tag-code","tag-critical","tag-enabling","tag-execution","tag-flaws","tag-identity","tag-patches","tag-services","tag-webex"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=615"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/615\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/616"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}