Article Details

Scrape Timestamp (UTC): 2026-01-08 10:45:58.184

Source: https://thehackernews.com/2026/01/cisco-patches-ise-security.html

Original Article Text

Click to Toggle View

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release. Cisco has released updates to address a medium-severity security flaw in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. "This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC," Cisco said in a Wednesday advisory. "An attacker could exploit this vulnerability by uploading a malicious file to the application." Successful exploitation of the shortcoming could allow an attacker with valid administrative credentials to read arbitrary files from the underlying operating system, which the company said should be off-limits even to administrators. Bobby Gould of Trend Micro Zero Day Initiative has been credited with discovering and reporting the flaw. It affects the following versions - Cisco said there are no workarounds to address the flaw, adding it's aware of the availability of a PoC exploit code. There are no indications that it has been exploited in the wild. In tandem, the networking equipment company also shipped fixes for two other medium-severity bugs stemming from the processing of Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests that could allow an unauthenticated, remote attacker to cause the Snort 3 Detection Engine to leak sensitive information or to restart, impacting availability. Trend Micro researcher Guy Lederfein has acknowledged for reporting the flaws. The details of the issues are as follows - They affect a number of Cisco products - With vulnerabilities in Cisco products frequently targeted by bad actors, it's crucial that users update to the latest version for adequate protection.

Daily Brief Summary

VULNERABILITIES // Cisco Releases Critical Patches for ISE Security Vulnerabilities

Cisco has issued updates to fix a medium-severity vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) following a public proof-of-concept exploit release.

The vulnerability, identified as CVE-2026-20029 with a CVSS score of 4.9, affects the licensing feature and could expose sensitive information to authenticated, remote attackers with administrative privileges.

The flaw arises from improper XML parsing in the web-based management interface, potentially allowing attackers to upload malicious files and access restricted operating system files.

Cisco has acknowledged the discovery by Bobby Gould of Trend Micro Zero Day Initiative and confirmed no current exploitation in the wild, despite the availability of exploit code.

In addition to this, Cisco addressed two other medium-severity bugs related to Distributed Computing Environment Remote Procedure Call (DCE/RPC) requests, which could impact Snort 3 Detection Engine's availability.

Users are advised to immediately update to the latest software versions to mitigate risks, as Cisco products are often targeted by cybercriminals.

These updates underscore the ongoing need for vigilance and timely patch management to protect organizational assets from potential threats.