4.9

CVE-2026-20029

Medienbericht
A vulnerability in the licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. 

This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to the application. A successful exploit could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators. To exploit this vulnerability, the attacker must have valid administrative credentials.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Identity Services Engine Software
Default Statusunknown
Version 3.1.0
Status affected
Version 3.1.0 p1
Status affected
Version 3.1.0 p3
Status affected
Version 3.1.0 p2
Status affected
Version 3.2.0
Status affected
Version 3.1.0 p4
Status affected
Version 3.1.0 p5
Status affected
Version 3.2.0 p1
Status affected
Version 3.1.0 p6
Status affected
Version 3.2.0 p2
Status affected
Version 3.1.0 p7
Status affected
Version 3.3.0
Status affected
Version 3.2.0 p3
Status affected
Version 3.2.0 p4
Status affected
Version 3.1.0 p8
Status affected
Version 3.2.0 p5
Status affected
Version 3.2.0 p6
Status affected
Version 3.1.0 p9
Status affected
Version 3.3 Patch 2
Status affected
Version 3.3 Patch 1
Status affected
Version 3.3 Patch 3
Status affected
Version 3.4.0
Status affected
Version 3.2.0 p7
Status affected
Version 3.3 Patch 4
Status affected
Version 3.4 Patch 1
Status affected
Version 3.1.0 p10
Status affected
Version 3.3 Patch 5
Status affected
Version 3.3 Patch 6
Status affected
Version 3.4 Patch 2
Status affected
Version 3.3 Patch 7
Status affected
Version 3.4 Patch 3
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.12
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 4.9 1.2 3.6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CWE-611 Improper Restriction of XML External Entity Reference

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.