Cisco Webex SSO Flaw - Critical Certificate Update Required

Cisco has identified a critical vulnerability in Webex SSO that requires immediate action from administrators. Additionally, three other critical vulnerabilities in Cisco's Identity Services could allow for remote code execution.

VulnerabilitiesCRITICALUpdated: Published: πŸ“° 3 sources
Featured image for Cisco Webex SSO Flaw - Critical Certificate Update Required

Original Reporting

CSCSO Online

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Cisco found a serious problem with its Webex service that could let bad actors pretend to be any user. They need to fix it by updating a special security certificate. There are also other serious issues in their Identity Services that could let attackers run harmful code.

The Flaw

Cisco has identified a critical vulnerability in its Webex Services, specifically related to the single sign-on (SSO) integration with Control Hub. The flaw, designated as CVE-2026-20184, has a CVSS score of 9.8 and allows an unauthenticated remote attacker to impersonate any user within the service. This vulnerability arises from improper certificate validation and requires immediate action from administrators to mitigate risks.

What's at Risk

If left unaddressed, this vulnerability could lead to unauthorized access to Webex services, potentially compromising sensitive information and user accounts. Cisco emphasizes that while the cloud service has been patched, administrators must upload a new identity provider (IdP) SAML certificate to the Webex Control Hub to complete the fix. Without this update, users may lose access to their SSO capabilities.

Patch Status

Cisco has already patched the cloud side of the application, but the responsibility now lies with the administrators to implement the necessary changes. There are no workarounds available, making the certificate update a critical step in maintaining security. In addition to the Webex vulnerability, Cisco has addressed three other critical flaws in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), with CVSS scores ranging from 9.8 to 9.9. These vulnerabilities could allow authenticated attackers to execute arbitrary code or perform remote code execution by sending crafted HTTP requests. Notably, the ISE vulnerabilities (CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186) could lead to denial of service conditions if exploited. Cisco noted that successful exploitation of these ISE vulnerabilities could allow an attacker to gain user-level access to the underlying operating system and potentially elevate privileges to root, especially in single-node ISE deployments.

Immediate Actions

Administrators using Cisco Webex Services must take the following actions:

  1. Upload the new IdP SAML certificate to the Webex Control Hub.
  2. Ensure that all instances of Cisco Identity Services are updated to the latest versions to mitigate the identified vulnerabilities.
  3. Regularly monitor the Webex Control Hub Alerts center for updates on certificate statuses and other critical alerts.

Cisco has stated that it is not aware of any active exploitation of these vulnerabilities in the wild, but the potential risks necessitate prompt action from users to ensure uninterrupted services and security.

πŸ”’ Pro Insight

With the high CVSS scores of these vulnerabilities, organizations using Cisco Webex and Identity Services must prioritize updates to prevent potential exploitation.

πŸ“… Story Timeline

Story broke by CSO Online

Covered by The Hacker News

Covered by Security Affairs

πŸ”Ž Source Perspective Analysis

Technical Focus

β€œCisco's vulnerabilities could allow attackers to execute arbitrary code and impersonate users, necessitating urgent updates.”

Source: Security Affairs

Business Impact Focus

β€œThe flaws pose serious security risks, emphasizing the need for organizations to prioritize timely updates to prevent exploitation.”

Source: CyberPings

Policy Focus

β€œThe vulnerabilities highlight the importance of robust identity and access management policies in corporate security strategies.”

Source: Gartner

Related Pings