Article Details
Scrape Timestamp (UTC): 2026-01-08 09:13:45.446
Original Article Text
Click to Toggle View
Cisco warns of Identity Service Engine flaw with exploit code. Cisco has patched a vulnerability in its Identity Services Engine (ISE) network access control solution, with public proof-of-concept exploit code, that can be abused by attackers with admin privileges. Enterprise admins use Cisco ISE to manage endpoint, user, and device access to network resources while enforcing a zero-trust architecture. The security flaw (CVE-2026-20029) affects Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) regardless of device configuration, and remote attackers with high privileges can exploit it to access sensitive information on unpatched devices. "This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to the application," Cisco said. "A successful exploit could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators. To exploit this vulnerability, the attacker must have valid administrative credentials." While the Cisco Product Security Incident Response Team (PSIRT) found no evidence of active exploitation, it did warn that a proof-of-concept (PoC) exploit is available online. Cisco considers "any workarounds and mitigations (if applicable) to be temporary solutions" and said that it "strongly recommends that customers upgrade to the fixed software" to "avoid future exposure" and fully address this vulnerability. On Wednesday, Cisco also addressed multiple IOS XE vulnerabilities that allow unauthenticated, remote attackers to restart the Snort 3 Detection Engine to trigger a denial-of-service or obtain sensitive information in the Snort data stream. However, Cisco PSIRT found no publicly available exploit code and no signs of threat actors exploiting them in the wild. In November, Amazon's threat intelligence team warned that hackers exploited a maximum-severity Cisco ISE zero-day (CVE-2025-20337) to deploy custom malware. When it patched it in July, Cisco warned that CVE-2025-20337 could be exploited to allow unauthenticated attackers to execute arbitrary code or gain root privileges on vulnerable devices. Over the next two weeks, Cisco updated its advisory to warn that CVE-2025-20337 was under active exploitation, and researcher Bobby Gould (who reported the flaw) published proof-of-concept exploit code. Cisco also warned customers in December that a Chinese threat group tracked as UAT-9686 is exploiting a maximum-severity Cisco AsyncOS zero-day (CVE-2025-20393) that's still awaiting a patch in attacks targeting Secure Email and Web Manager (SEWM) and Secure Email Gateway (SEG) appliances. Until CVE-2025-20393 security updates are released, Cisco advises customers to secure and restrict access to vulnerable appliances by restricting connections to trusted hosts, limiting internet access, and placing them behind firewalls to filter traffic. 7 Security Best Practices for MCP As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe. This free cheat sheet outlines 7 best practices you can start using today.
Daily Brief Summary
Cisco has addressed a critical vulnerability in its Identity Services Engine (ISE), identified as CVE-2026-20029, which could be exploited by attackers with administrative privileges.
The flaw arises from improper XML parsing in the web-based management interface, allowing attackers to upload malicious files and access sensitive system data.
Though no active exploitation has been reported, a proof-of-concept exploit is publicly available, increasing the risk for unpatched systems.
Cisco advises immediate software upgrades to mitigate the vulnerability, as temporary workarounds are not deemed sufficient for long-term protection.
Additional vulnerabilities in Cisco's IOS XE were also patched, addressing potential denial-of-service attacks and unauthorized data access.
Past incidents include a zero-day exploit in Cisco ISE (CVE-2025-20337) used to deploy malware, highlighting the ongoing threat landscape for Cisco products.
Customers are urged to follow Cisco's guidance on securing systems, including restricting access and employing firewalls, until all patches are applied.