Cisco Patches Critical Identity Services, Webex Flaws

Cisco has patched four critical vulnerabilities in Identity Services and Webex. These flaws could allow unauthorized access and code execution. Users must update their systems to stay secure.

VulnerabilitiesCRITICALUpdated: Published:
Featured image for Cisco Patches Critical Identity Services, Webex Flaws

Original Reporting

THThe Hacker News

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, Cisco fixed serious security holes that could let hackers take control of user accounts.

The Flaw

Cisco has identified four critical vulnerabilities affecting its Identity Services and Webex Services. These flaws could allow attackers to execute arbitrary code and impersonate users within the system. The vulnerabilities are as follows:

  • CVE-2026-20184: An improper certificate validation in the single sign-on (SSO) integration with Control Hub in Webex Services.
  • CVE-2026-20147: Insufficient validation of user-supplied input in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC).
  • CVE-2026-20180 and CVE-2026-20186: Multiple insufficient validation of user-supplied input vulnerabilities in ISE.

What's at Risk

These vulnerabilities pose a significant risk as they could allow an unauthenticated remote attacker to impersonate any user and gain unauthorized access to Cisco Webex services. Additionally, authenticated attackers could achieve remote code execution by sending crafted HTTP requests.

Patch Status

Cisco has released patches for these vulnerabilities, and users are encouraged to update their systems. The following versions are affected and require migration to fixed releases:

  • CVE-2026-20147: Cisco ISE versions earlier than 3.1 need to migrate to a fixed release. Fixed versions include 3.1 Patch 11, 3.2 Patch 10, 3.3 Patch 11, 3.4 Patch 6, and 3.5 Patch 3.
  • CVE-2026-20180 and CVE-2026-20186: Affected users should migrate from versions earlier than 3.2 to 3.2 Patch 8, 3.3 Patch 8, or 3.4 Patch 4. Version 3.5 is not vulnerable.

Immediate Actions

While CVE-2026-20184 does not require customer action as it is cloud-based, users utilizing SSO must upload a new identity provider (IdP) SAML certificate to Control Hub. For other vulnerabilities, it is crucial to update to the latest versions to ensure optimal security.

Cisco has stated that it is not aware of any active exploitation of these vulnerabilities. However, proactive measures are essential for safeguarding against potential threats. Users should remain vigilant and ensure their systems are up to date.

🔒 Pro Insight

🔒 Pro insight: The high CVSS scores indicate severe risks; immediate updates are crucial to mitigate potential exploitation.

THThe Hacker News
Read Original

Related Pings