
🎯Basically, Cisco fixed serious security holes that could let hackers take control of user accounts.
The Flaw
Cisco has identified four critical vulnerabilities affecting its Identity Services and Webex Services. These flaws could allow attackers to execute arbitrary code and impersonate users within the system. The vulnerabilities are as follows:
- CVE-2026-20184: An improper certificate validation in the single sign-on (SSO) integration with Control Hub in Webex Services.
- CVE-2026-20147: Insufficient validation of user-supplied input in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC).
- CVE-2026-20180 and CVE-2026-20186: Multiple insufficient validation of user-supplied input vulnerabilities in ISE.
What's at Risk
These vulnerabilities pose a significant risk as they could allow an unauthenticated remote attacker to impersonate any user and gain unauthorized access to Cisco Webex services. Additionally, authenticated attackers could achieve remote code execution by sending crafted HTTP requests.
Patch Status
Cisco has released patches for these vulnerabilities, and users are encouraged to update their systems. The following versions are affected and require migration to fixed releases:
- CVE-2026-20147: Cisco ISE versions earlier than 3.1 need to migrate to a fixed release. Fixed versions include 3.1 Patch 11, 3.2 Patch 10, 3.3 Patch 11, 3.4 Patch 6, and 3.5 Patch 3.
- CVE-2026-20180 and CVE-2026-20186: Affected users should migrate from versions earlier than 3.2 to 3.2 Patch 8, 3.3 Patch 8, or 3.4 Patch 4. Version 3.5 is not vulnerable.
Immediate Actions
While CVE-2026-20184 does not require customer action as it is cloud-based, users utilizing SSO must upload a new identity provider (IdP) SAML certificate to Control Hub. For other vulnerabilities, it is crucial to update to the latest versions to ensure optimal security.
Cisco has stated that it is not aware of any active exploitation of these vulnerabilities. However, proactive measures are essential for safeguarding against potential threats. Users should remain vigilant and ensure their systems are up to date.
🔒 Pro insight: The high CVSS scores indicate severe risks; immediate updates are crucial to mitigate potential exploitation.




