Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
    Cybersecurity

    Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

    adminBy adminApril 18, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 16, 2026Vulnerability / Network Security

    Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service.

    The details of the vulnerabilities are below –

    • CVE-2026-20184 (CVSS score: 9.8) – An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services.
    • CVE-2026-20147 (CVSS score: 9.9) – An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests.
    • CVE-2026-20180 and CVE-2026-20186 (CVSS scores: 9.9) – Multiple insufficient validation of user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker in possession of read only admin credentials to execute arbitrary commands on the underlying operating system of an affected device by sending crafted HTTP requests.

    “A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root,” Cisco said in an advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.

    “In single-node ISE deployments, successful exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored.”

    CVE-2026-20184 requires no customer action as it’s cloud-based. However, customers who are using SSO are advised to upload a new identity provider (IdP) SAML certificate to Control Hub. The remaining vulnerabilities have been addressed in the following versions –

    • CVE-2026-20147
      • Cisco ISE or ISE-PIC Release earlier than 3.1 (Migrate to a fixed release)
      • Cisco ISE Release 3.1 (3.1 Patch 11)
      • Cisco ISE Release 3.2 (3.2 Patch 10)
      • Cisco ISE Release 3.3 (3.3 Patch 11)
      • Cisco ISE Release 3.4 (3.4 Patch 6)
      • Cisco ISE Release 3.5 (3.5 Patch 3)
    • CVE-2026-20180 and CVE-2026-20186
      • Cisco ISE Release earlier than 3.2 (Migrate to a fixed release)
      • Cisco ISE Release 3.2 (3.2 Patch 8)
      • Cisco ISE Release 3.3 (3.3 Patch 8)
      • Cisco ISE Release 3.4 (3.4 Patch 4)
      • Cisco ISE Release 3.5 (Not Vulnerable)

    While Cisco noted that it is not aware of any of these shortcomings being exploited in the wild, it’s essential that users update their instances to the latest version for optimal protection.

    Cisco Code Critical Enabling Execution Flaws identity Patches services Webex
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleU.S. search ad revenue reached $114.2 billion in 2025
    Next Article Why I just canceled ChatGPT Plus and two other AI subscriptions
    admin
    • Website

    Related Posts

    Microsoft Teams right-click paste broken by Edge update bug

    April 18, 2026

    Recent Apache ActiveMQ Vulnerability Exploited in the Wild

    April 18, 2026

    Liongard upgrades LiongardIQ with AI access, live asset data, and deeper discovery

    April 18, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Microsoft Teams right-click paste broken by Edge update bug

    April 18, 2026

    This $70 mouse has all of the features of a $200 mouse and the battery lasts me three months

    April 18, 2026

    Recent Apache ActiveMQ Vulnerability Exploited in the Wild

    April 18, 2026

    The mind-mapping app that finally organized my chaotic thoughts

    April 18, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,388)
    • Privacy & Online Earning (171)
    • SEO & Digital Marketing (848)
    • Tech Tools & Mobile / Apps (1,657)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Microsoft Teams right-click paste broken by Edge update bug

    April 18, 2026

    This $70 mouse has all of the features of a $200 mouse and the battery lasts me three months

    April 18, 2026

    Recent Apache ActiveMQ Vulnerability Exploited in the Wild

    April 18, 2026
    Most Popular
    • Microsoft Teams right-click paste broken by Edge update bug
    • This $70 mouse has all of the features of a $200 mouse and the battery lasts me three months
    • Recent Apache ActiveMQ Vulnerability Exploited in the Wild
    • The mind-mapping app that finally organized my chaotic thoughts
    • Why I just canceled ChatGPT Plus and two other AI subscriptions
    • Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
    • U.S. search ad revenue reached $114.2 billion in 2025
    • You Should Start Spring Cleaning With This Dyson Cordless Vacuum While It’s on Sale for Over $200 Off
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.