Cisco ISE authenticated command injection to root (CVE-2026-20180)
CVE-2026-20180
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit...
Overview
A critical vulnerability in Cisco Identity Services Engine (ISE) allows authenticated attackers to execute arbitrary commands on the device’s underlying operating system. Tracked as CVE-2026-20180, this flaw has a maximum CVSS score of 9.9. Attackers can leverage this to gain a foothold on the system and escalate privileges to the root user, leading to a complete compromise of the network access control system.
Vulnerability Details
The vulnerability stems from insufficient validation of user-supplied input in the web management interface. An authenticated remote attacker with at least Read-Only Administrator privileges can exploit this by sending a specially crafted HTTP request to a vulnerable ISE node. A successful exploit grants the attacker user-level access to the underlying Linux OS, which can then be used to escalate privileges to root.
Impact and Risk
The primary risk is the complete compromise of the ISE appliance, granting an attacker root-level control. This could be used to steal credentials, manipulate network access policies, deploy malware, or establish persistence. In single-node ISE deployments, successful exploitation can also cause the node to become unavailable, creating a denial-of-service (DoS) condition. This would prevent new endpoints from authenticating to the network until the service is restored.
Affected Products
This vulnerability affects Cisco ISE software. Cisco has confirmed specific affected versions in its security advisory. Administrators must check the official Cisco advisory for the complete list of vulnerable releases.
Remediation and Mitigation
The only complete remediation is to apply the patch provided by Cisco. The vendor has released software updates that address this vulnerability. There are no workarounds that effectively mitigate this flaw. Organizations should prioritize patching all affected ISE nodes immediately. As a best practice, ensure that Read-Only Administrator accounts are only assigned to trusted personnel and that account credentials are managed securely.
Security Insight
This vulnerability highlights the persistent risk of input validation flaws in critical network security appliances, even for authenticated functions. The high privilege requirement for exploitation underscores the importance of strict credential management and the principle of least privilege, as compromised low-privilege accounts can serve as a stepping stone to total system control. For context on how attackers target Cisco infrastructure, see related coverage on Interlock Ransomware Exploits Cisco FMC Zero-Day.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code exec...
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary...
Pegasus CMS 1.0 contains a remote code execution vulnerability in the extra_fields.php plugin that allows unauthenticated attackers to execute arbitrary commands by exploiting unsafe eval functionalit...
The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can...