Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
好的,我现在要帮用户总结这篇文章的内容,控制在100字以内。首先,我需要仔细阅读文章,抓住主要信息。 文章主要讲的是Cisco修复了四个关键的安全漏洞,影响了身份服务和Webex服务。这些漏洞可能导致任意代码执行和用户冒充攻击。漏洞包括CVE-2026-20184、CVE-2026-20147、CVE-2026-20180和CVE-2026-20186,CVSS评分都很高,9.8和9.9分。 接下来,我需要将这些信息浓缩到一句话中。要包括Cisco修复漏洞、影响的服务、漏洞可能导致的问题以及修复措施。同时,要注意不要使用“文章内容总结”这样的开头。 最后,确保语言简洁明了,不超过100字。 </think> 思科修复了四个关键安全漏洞,影响身份服务和Webex服务,可能导致任意代码执行和用户冒充攻击。其中三个漏洞需更新至指定版本以修复。 2026-4-16 11:27:0 Author: thehackernews.com(查看原文) 阅读量:17 收藏

Vulnerability / Network Security

Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service.

The details of the vulnerabilities are below -

  • CVE-2026-20184 (CVSS score: 9.8) - An improper certificate validation in the integration of single sign-on (SSO) with Control Hub in Webex Services that could allow an unauthenticated, remote attacker to impersonate any user within the service and gain unauthorized access to legitimate Cisco Webex services.
  • CVE-2026-20147 (CVSS score: 9.9) - An insufficient validation of user-supplied input vulnerability in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could allow an authenticated, remote attacker in possession of valid administrative credentials to achieve remote code execution by sending crafted HTTP requests.
  • CVE-2026-20180 and CVE-2026-20186 (CVSS scores: 9.9) - Multiple insufficient validation of user-supplied input vulnerabilities in ISE could allow an authenticated, remote attacker in possession of read only admin credentials to execute arbitrary commands on the underlying operating system of an affected device by sending crafted HTTP requests.

"A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root," Cisco said in an advisory for CVE-2026-20147, CVE-2026-20180, and CVE-2026-20186.

"In single-node ISE deployments, successful exploitation of this vulnerability could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored."

CVE-2026-20184 requires no customer action as it's cloud-based. However, customers who are using SSO are advised to upload a new identity provider (IdP) SAML certificate to Control Hub. The remaining vulnerabilities have been addressed in the following versions -

  • CVE-2026-20147
    • Cisco ISE or ISE-PIC Release earlier than 3.1 (Migrate to a fixed release)
    • Cisco ISE Release 3.1 (3.1 Patch 11)
    • Cisco ISE Release 3.2 (3.2 Patch 10)
    • Cisco ISE Release 3.3 (3.3 Patch 11)
    • Cisco ISE Release 3.4 (3.4 Patch 6)
    • Cisco ISE Release 3.5 (3.5 Patch 3)
  • CVE-2026-20180 and CVE-2026-20186
    • Cisco ISE Release earlier than 3.2 (Migrate to a fixed release)
    • Cisco ISE Release 3.2 (3.2 Patch 8)
    • Cisco ISE Release 3.3 (3.3 Patch 8)
    • Cisco ISE Release 3.4 (3.4 Patch 4)
    • Cisco ISE Release 3.5 (Not Vulnerable)

While Cisco noted that it is not aware of any of these shortcomings being exploited in the wild, it's essential that users update their instances to the latest version for optimal protection.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/cisco-patches-four-critical-identity.html
如有侵权请联系:admin#unsafe.sh