LIVE NEWS
  • ‘For All Mankind’ alternative timeline vs reality: How Apple TV’s sci-fi show diverges from history
  • How Trump’s Blockade of the Strait of Hormuz Works
  • BNB Holders Earned 177% Returns Over 15 Months Through Staking Rewards
  • Commercial AI Models Show Rapid Gains in Vulnerability Research
  • jumps to $76k as Iran says Strait of Hormuz ’completely open’ By Investing.com
  • Drone diplomacy: Ukraine strengthens security role in Europe and the Gulf
  • Netflix was long ‘a builder not a buyer.’ Is that era over?
  • China turns Taiwan’s own voices against it in information war
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Cybersecurity

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

primereportsBy primereportsApril 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananApr 16, 2026Vulnerability / Network Security

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service.

The details of the vulnerabilities are below –

  • CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services.
  • CVE-2026-20147 (CVSS score: 9.9) – An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests.
  • CVE-2026-20180 and CVE-2026-20186 (CVSS scores: 9.9) – Multiple insufficient validation of user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker in possession of read only admin credentials to execute arbitrary commands on the underlying operating system of an affected device by sending crafted HTTP requests.

“A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root,” Cisco said in an advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.

Cybersecurity

“In single-node ISE deployments, successful exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored.”

CVE-2026-20184 requires no customer action as it’s cloud-based. However, customers who are using SSO are advised to upload a new identity provider (IdP) SAML certificate to Control Hub. The remaining vulnerabilities have been addressed in the following versions –

  • CVE-2026-20147
    • Cisco ISE or ISE-PIC Release earlier than 3.1 (Migrate to a fixed release)
    • Cisco ISE Release 3.1 (3.1 Patch 11)
    • Cisco ISE Release 3.2 (3.2 Patch 10)
    • Cisco ISE Release 3.3 (3.3 Patch 11)
    • Cisco ISE Release 3.4 (3.4 Patch 6)
    • Cisco ISE Release 3.5 (3.5 Patch 3)
  • CVE-2026-20180 and CVE-2026-20186
    • Cisco ISE Release earlier than 3.2 (Migrate to a fixed release)
    • Cisco ISE Release 3.2 (3.2 Patch 8)
    • Cisco ISE Release 3.3 (3.3 Patch 8)
    • Cisco ISE Release 3.4 (3.4 Patch 4)
    • Cisco ISE Release 3.5 (Not Vulnerable)

While Cisco noted that it is not aware of any of these shortcomings being exploited in the wild, it’s essential that users update their instances to the latest version for optimal protection.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRegulators reportedly zeroing in on suspicious trades ahead of Trump post
Next Article Justin Sun Flags ‘Coercion Tactics’ in WLFI Proposal Impacting Billions in Tokens
primereports
  • Website

Related Posts

Cybersecurity

Commercial AI Models Show Rapid Gains in Vulnerability Research

April 17, 2026
Cybersecurity

I tried the new Gemini app for Mac – it has one major advantage over the web version

April 17, 2026
Cybersecurity

ZionSiphon malware designed to sabotage water treatment systems

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • ‘For All Mankind’ alternative timeline vs reality: How Apple TV’s sci-fi show diverges from history
  • How Trump’s Blockade of the Strait of Hormuz Works
  • BNB Holders Earned 177% Returns Over 15 Months Through Staking Rewards
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.