Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Fixes Critical Flaws in Identity and Webex Services

Cisco Fixes Critical Flaws in Identity and Webex Services

Posted on April 16, 2026 By CWS

Cisco has released updates to fix four significant security vulnerabilities affecting its Identity Services and Webex platforms. These flaws, if left unaddressed, could allow attackers to execute arbitrary code and impersonate users, posing serious risks to network integrity and user data security.

Details of the Vulnerabilities

Four critical vulnerabilities have been identified, each carrying the potential for severe exploitation. The first, tracked as CVE-2026-20184 with a CVSS score of 9.8, relates to improper certificate validation in the single sign-on (SSO) integration within Webex Services. This flaw permits unauthenticated attackers to impersonate users and access Cisco Webex services without authorization.

The second flaw, CVE-2026-20147, scoring 9.9, is found in the Identity Services Engine (ISE) and its Passive Identity Connector (ISE-PIC). This vulnerability allows remote attackers with valid admin credentials to execute code remotely by sending specifically crafted HTTP requests.

Additionally, the CVE-2026-20180 and CVE-2026-20186 vulnerabilities, both with a CVSS score of 9.9, involve inadequate validation of user inputs in ISE. These could lead to arbitrary command execution on the affected systems’ operating systems when exploited by attackers with read-only admin credentials.

Potential Impact of Exploits

Cisco has warned that successful exploitation of these vulnerabilities could grant attackers user-level access to the operating system, with the potential to escalate privileges to root. Particularly in single-node ISE deployments, exploiting these vulnerabilities could render the node unavailable, causing a denial of service (DoS) condition that prevents unauthenticated endpoints from accessing the network.

For CVE-2026-20184, which is cloud-based, no action is required from customers. However, those using SSO are advised to update their identity provider SAML certificate within the Control Hub. Cisco has addressed the other vulnerabilities through updates available in specific software releases.

Recommended Updates and User Action

To mitigate these risks, Cisco recommends users migrate to fixed releases or apply the latest patches. Specifically, updates are necessary for Cisco ISE versions earlier than 3.1 for CVE-2026-20147, and versions earlier than 3.2 for CVE-2026-20180 and CVE-2026-20186. Users should ensure they apply the appropriate patches for versions 3.1 through 3.5, as outlined by Cisco.

Though Cisco has not observed these vulnerabilities being exploited in actual attacks, it emphasizes the importance of updating systems promptly to maintain the highest level of protection against potential threats.

By staying informed and proactive, users can significantly reduce the risk of exploitation and maintain robust security across their Cisco services.

The Hacker News Tags:Cisco, code execution, CVE, Cybersecurity, Identity Services, network security, patch update, security update, vulnerability management, Webex vulnerabilities

Post navigation

Previous Post: Cybercriminals Exploit AI Workflow Tool for Malware
Next Post: Tennessee Hospital Data Breach Exposes Thousands

Related Posts

FBI and Indonesian Police Disrupt W3LL Phishing Scheme FBI and Indonesian Police Disrupt W3LL Phishing Scheme The Hacker News
RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks The Hacker News
AI Assistants Exploited as Malware Command Channels AI Assistants Exploited as Malware Command Channels The Hacker News
Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads The Hacker News
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines How To Automate Ticket Creation, Device Identification and Threat Triage With Tines The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NIST Updates CVE Enrichment Process for Critical Software
  • Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT
  • Cisco ISE Flaws Allow Remote Code Execution
  • Splunk Releases Critical Security Fixes for Vulnerabilities
  • Taboola Pixel Breach in Banking Sessions Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NIST Updates CVE Enrichment Process for Critical Software
  • Obsidian Plugin Exploitation Delivers PHANTOMPULSE RAT
  • Cisco ISE Flaws Allow Remote Code Execution
  • Splunk Releases Critical Security Fixes for Vulnerabilities
  • Taboola Pixel Breach in Banking Sessions Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark