Cisco: Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

Cisco: Cisco Patches ISE Security Vulnerability After Public PoC Exploit Release

**Cisco Patches Medium-Severity Flaws in ISE and Snort 3, Including Exploitable XML Vulnerability**

Cisco has released security updates to address three medium-severity vulnerabilities, including one with a public proof-of-concept (PoC) exploit. The most notable flaw, CVE-2026-20029 (CVSS 4.9), affects Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC), allowing authenticated attackers with administrative privileges to access sensitive files on the underlying OS.

The vulnerability stems from improper XML parsing in the web-based management interface. An attacker could exploit it by uploading a malicious file, potentially reading restricted system files. Bobby Gould of Trend Micro Zero Day Initiative reported the issue, which impacts:

  • ISE/ISE-PIC versions prior to 3.2 (users must migrate to a fixed release)
  • 3.2 (patch with 3.2 Patch 8)
  • 3.3 (patch with 3.3 Patch 8)
  • 3.4 (patch with 3.4 Patch 4)
  • 3.5 (not vulnerable)

Cisco confirmed the availability of a PoC exploit but reported no active exploitation in the wild. No workarounds exist, making updates the only mitigation.

Additionally, Cisco patched two Snort 3-related flaws in its Secure Firewall Threat Defense (FTD) Software, IOS XE Software, and Meraki software:

  • CVE-2026-20026 (CVSS 5.8): A denial-of-service (DoS) vulnerability in Snort 3’s DCE/RPC processing, allowing unauthenticated attackers to crash the detection engine.
  • CVE-2026-20027 (CVSS 5.3): An information disclosure bug in the same component, enabling data leaks.

Guy Lederfein of Trend Micro reported these issues, which require Snort 3 to be configured for exploitation. Cisco has released fixes for all affected products.

Source: https://thehackernews.com/2026/01/cisco-patches-ise-security.html

Cisco cybersecurity rating report: https://www.rankiteo.com/company/cisco

"id": "CIS1767871927",
"linkid": "cisco",
"type": "Vulnerability",
"date": "1/2026",
"severity": "25",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Technology/Networking',
                        'name': 'Cisco',
                        'type': 'Corporation'}],
 'attack_vector': 'Remote',
 'data_breach': {'sensitivity_of_data': 'High (arbitrary files from underlying '
                                        'OS)',
                 'type_of_data_compromised': 'Sensitive information'},
 'description': 'Cisco has released updates to address a medium-severity '
                'security flaw in Identity Services Engine (ISE) and ISE '
                'Passive Identity Connector (ISE-PIC) with a public '
                'proof-of-concept (PoC) exploit. The vulnerability, tracked as '
                'CVE-2026-20029 (CVSS score: 4.9), resides in the licensing '
                'feature and could allow an authenticated, remote attacker '
                'with administrative privileges to gain access to sensitive '
                'information.',
 'impact': {'data_compromised': 'Sensitive information',
            'systems_affected': 'Cisco ISE and ISE-PIC underlying operating '
                                'system files'},
 'investigation_status': 'Completed (patches released)',
 'post_incident_analysis': {'corrective_actions': 'Fixed XML parsing logic in '
                                                  'updated releases',
                            'root_causes': 'Improper parsing of XML in the '
                                           'web-based management interface'},
 'recommendations': 'Users should update to the latest version of Cisco ISE '
                    'and ISE-PIC for adequate protection.',
 'references': [{'source': 'Cisco Advisory'},
                {'source': 'Trend Micro Zero Day Initiative'}],
 'response': {'containment_measures': 'Released patches for affected versions',
              'remediation_measures': 'Update to fixed releases (3.2 Patch 8, '
                                      '3.3 Patch 8, 3.4 Patch 4, or migrate to '
                                      '3.5)'},
 'title': 'CVE-2026-20029: Cisco ISE and ISE-PIC XML Parsing Vulnerability',
 'type': 'Information Disclosure',
 'vulnerability_exploited': 'CVE-2026-20029'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.