Cisco: Critical code injection vulnerabilities in ISE and more closed

Critical security vulnerabilities in Cisco's Identity Services Engine and Webex. In total, developers are closing 10 security holes.

listen Print view
view of Cisco company logo with selective focus.

(Image: VIVEK PAYGUDE/Shutterstock.com)

3 min. read

Cisco warns of partly critical security vulnerabilities in its products. The company published ten security advisories on Thursday night.

The most serious are security vulnerabilities in Cisco's Identity Services Engine (ISE), which allow the injection of malicious code from the network. In ISE and ISE Passive Identity Connector (ISE-PIC), logged-in administrators can inject malicious code from the network or perform path traversal attacks on vulnerable instances (CVE-2026-20147, CVSS 9.9, risk “critical”; CVE-2026-20148, CVSS 4.9, risk “medium”). If attackers have at least read-only admin credentials, they can use them to inject arbitrary commands to the operating system of ISE instances from the network and thus smuggle code from the network (CVE-2026-20180, CVE-2026-20186, both CVSS 9.9, risk “critical”). Updates to close the vulnerabilities are available.

Malicious actors can also cause damage in the web conferencing software Cisco Webex. Due to insufficient certificate validation in the Single Sign-On (SSO) integration with Control Hub in Webex services, malicious actors can impersonate arbitrary users in the service from the network. Attackers can exploit this without prior login by connecting to a service endpoint by sending a manipulated token to gain unauthorized access to legitimate Webex services (CVE-2026-20184, CVSS 9.8, risk “critical”). As it is a cloud service, Cisco has already resolved the issue on the server side. However, customers using SSO should upload a new Identity Provider certificate (IdP SAML) to prevent service interruptions. Cisco mentions that there have been no reports of abuse of the vulnerabilities on the network so far.

The network equipment provider also lists further security vulnerabilities, all of which have been classified as “medium” risk:

Admins should check if they are using vulnerable Cisco products and apply the available updates promptly.

Videos by heise

Cisco published several security warnings two weeks ago. They also dealt with critical security vulnerabilities.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.