Cisco ISE authenticated command execution (CVE-2026-20147)
CVE-2026-20147
A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vul...
Overview
A critical vulnerability in Cisco Identity Services Engine (ISE) and ISE Policy Integration Client (ISE-PIC) allows authenticated administrators to execute arbitrary commands on the device’s underlying operating system. Tracked as CVE-2026-20147 with a maximum CVSS score of 9.9, this flaw stems from insufficient input validation in the web interface.
Vulnerability Details
The vulnerability exists because the affected software does not properly validate user-supplied input in specific HTTP requests. An attacker with valid administrative credentials can send a crafted HTTP request to exploit this weakness.
A successful exploit grants the attacker initial access at the user level on the host operating system. The attacker can then leverage this foothold to escalate privileges to the root level, gaining complete control over the appliance. In single-node ISE deployments, exploitation can also cause the node to become unavailable, creating a denial-of-service (DoS) condition. This would prevent new endpoints from authenticating to the network until service is restored.
Affected Products
This vulnerability affects the following Cisco products:
- Cisco Identity Services Engine (ISE)
- Cisco Identity Services Engine Policy Integration Client (ISE-PIC)
Administrators should consult the official Cisco Security Advisory for a detailed list of affected software versions. Cisco has released software updates that address this vulnerability.
Remediation and Mitigation
The primary and most effective action is to apply the relevant patch provided by Cisco. There are no workarounds that address this vulnerability.
Immediate Action Required:
- Patch: Upgrade affected devices to a fixed software version as listed in the security advisory. This is the only complete remediation.
- Principle of Least Privilege: Strictly enforce the principle of least privilege for administrative accounts. Since exploitation requires admin credentials, limiting the number of users with this level of access reduces the attack surface.
- Network Controls: As a general best practice, restrict management interface access to trusted source IP addresses using network access control lists (ACLs).
While this vulnerability is not currently listed on CISA’s Known Exploited Vulnerabilities (KEV) catalog, its critical severity and potential impact warrant urgent patching.
Security Insight
This vulnerability highlights the persistent risk of improper input validation in network management interfaces, even for credentialed users. It echoes the pattern seen in incidents like the Interlock ransomware group’s exploitation of a Cisco FMC zero-day, where administrative access was leveraged for deeper system compromise. For critical infrastructure components like network access control systems, a “trust but verify” approach to all user input, regardless of privilege level, remains essential.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit...
A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of...
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the ar...
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setTtyServiceCfg of the file /cgi-bin/cstecgi.cgi of the component C...