Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananNetwork Safety / Vulnerability
Cisco has launched updates to deal with a medium-severity safety flaw in Identification Providers Engine (ISE) and ISE Passive Identification Connector (ISE-PIC) with a public proof-of-concept (PoC) exploit.
The vulnerability, tracked as CVE-2026-20029 (CVSS rating: 4.9), resides within the licensing characteristic and will permit an authenticated, distant attacker with administrative privileges to realize entry to delicate data.
“This vulnerability is because of improper parsing of XML that’s processed by the web-based administration interface of Cisco ISE and Cisco ISE-PIC,” Cisco mentioned in a Wednesday advisory. “An attacker might exploit this vulnerability by importing a malicious file to the appliance.”
Profitable exploitation of the shortcoming might permit an attacker with legitimate administrative credentials to learn arbitrary recordsdata from the underlying working system, which the corporate mentioned ought to be off-limits even to directors.

Bobby Gould of Development Micro Zero Day Initiative has been credited with discovering and reporting the flaw. It impacts the next variations –

Cisco ISE or ISE-PIC Launch sooner than 3.2 – Migrate to a hard and fast launch
Cisco ISE or ISE-PIC Launch 3.2 – 3.2 Patch 8
Cisco ISE or ISE-PIC Launch 3.3 – 3.3 Patch 8
Cisco ISE or ISE-PIC Launch 3.4 – 3.4 Patch 4
Cisco ISE or ISE-PIC Launch 3.5 – Not weak

Cisco mentioned there aren’t any workarounds to deal with the flaw, including it is conscious of the provision of a PoC exploit code. There aren’t any indications that it has been exploited within the wild.
In tandem, the networking gear firm additionally shipped fixes for 2 different medium-severity bugs stemming from the processing of Distributed Computing Setting Distant Process Name (DCE/RPC) requests that would permit an unauthenticated, distant attacker to trigger the Snort 3 Detection Engine to leak delicate data or to restart, impacting availability.
Development Micro researcher Man Lederfein has acknowledged for reporting the failings. The small print of the problems are as follows –

CVE-2026-20026 (CVSS rating: 5.8) – Snort 3 DCE/RPC denial-of-service vulnerability
CVE-2026-20027 (CVSS rating: 5.3) – Snort 3 DCE/RPC data disclosure vulnerability

They have an effect on quite a few Cisco merchandise –

Cisco Safe Firewall Menace Protection (FTD) Software program, if Snort 3 was configured
Cisco IOS XE Software program
Cisco Meraki software program

With vulnerabilities in Cisco merchandise continuously focused by dangerous actors, it is essential that customers replace to the most recent model for satisfactory safety.

The Hacker News Tags:Cisco, Exploit, ISE, Patches, PoC, Public, Release, Security, Vulnerability

Post navigation

Previous Post: Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages
Next Post: Critical HPE OneView Vulnerability Exploited in Attacks

Related Posts

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach The Hacker News
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack The Hacker News
Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising The Hacker News
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station The Hacker News
Google Pays .375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection The Hacker News
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News