Cisco warns of Identity Service Engine flaw with exploit code
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是Cisco修复了一个漏洞,这个漏洞存在于他们的ISE和ISE-PIC产品中。漏洞编号是CVE-2026-20029,属于XML解析不当的问题。攻击者如果有管理员权限,可以通过上传恶意文件来读取敏感数据。 文章还提到已经有PoC代码公开,虽然目前没有活跃的攻击迹象,但Cisco建议用户升级软件以修复问题。此外,最近还有其他漏洞被修复,比如IOS XE的一些问题。 我需要把这些关键点浓缩到100字以内:Cisco修复了ISE和ISE-PIC中的XML解析漏洞(CVE-2026-20029),允许有权限的攻击者读取敏感文件。已有PoC代码可用,建议升级软件。 </think> Cisco修复了其Identity Services Engine (ISE)和ISE Passive Identity Connector (ISE-PIC)中的XML解析漏洞(CVE-2026-20029),该漏洞允许拥有管理员权限的攻击者通过上传恶意文件读取敏感数据。尽管尚未发现活跃攻击迹象,但已有公开的PoC代码可用。 Cisco建议用户升级到最新版本以避免风险。 2026-1-8 09:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Cisco

Cisco has patched a vulnerability in its Identity Services Engine (ISE) network access control solution, with public proof-of-concept exploit code, that can be abused by attackers with admin privileges.

Enterprise admins use Cisco ISE to manage endpoint, user, and device access to network resources while enforcing a zero-trust architecture.

The security flaw (CVE-2026-20029) affects Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) regardless of device configuration, and remote attackers with high privileges can exploit it to access sensitive information on unpatched devices.

Wiz

"This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to the application," Cisco said.

"A successful exploit could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators. To exploit this vulnerability, the attacker must have valid administrative credentials."

While the Cisco Product Security Incident Response Team (PSIRT) found no evidence of active exploitation, it did warn that a proof-of-concept (PoC) exploit is available online.

Cisco considers "any workarounds and mitigations (if applicable) to be temporary solutions" and said that it "strongly recommends that customers upgrade to the fixed software" to "avoid future exposure" and fully address this vulnerability.

Cisco ISE or ISE-PIC Release First Fixed Release
Earlier than 3.2 Migrate to a fixed release.
3.2 3.2 Patch 8
3.3 3.3 Patch 8
3.4 3.4 Patch 4
3.5 Not vulnerable.

On Wednesday, Cisco also addressed multiple IOS XE vulnerabilities that allow unauthenticated, remote attackers to restart the Snort 3 Detection Engine to trigger a denial-of-service or obtain sensitive information in the Snort data stream. However, Cisco PSIRT found no publicly available exploit code and no signs of threat actors exploiting them in the wild.

In November, Amazon's threat intelligence team warned that hackers exploited a maximum-severity Cisco ISE zero-day (CVE-2025-20337) to deploy custom malware. When it patched it in July, Cisco warned that CVE-2025-20337 could be exploited to allow unauthenticated attackers to execute arbitrary code or gain root privileges on vulnerable devices.

Over the next two weeks, Cisco updated its advisory to warn that CVE-2025-20337 was under active exploitation, and researcher Bobby Gould (who reported the flaw) published proof-of-concept exploit code.

Cisco also warned customers in December that a Chinese threat group tracked as UAT-9686 is exploiting a maximum-severity Cisco AsyncOS zero-day (CVE-2025-20393) that's still awaiting a patch in attacks targeting Secure Email and Web Manager (SEWM) and Secure Email Gateway (SEG) appliances.

Until CVE-2025-20393 security updates are released, Cisco advises customers to secure and restrict access to vulnerable appliances by restricting connections to trusted hosts, limiting internet access, and placing them behind firewalls to filter traffic.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/cisco-warns-of-identity-service-engine-flaw-with-exploit-code/
如有侵权请联系:admin#unsafe.sh