MediumVulnerability

Cisco ISE XXE Vulnerability Exposes Sensitive Files to Authenticated Attackers After Public PoC Release

Cisco has patched a medium-severity XML External Entity (XXE) vulnerability in Identity Services Engine that allows authenticated administrators to read arbitrary system files—including those normally restricted from admin access. With proof-of-concept exploit code now publicly available, organizations running ISE or ISE-PIC should apply patches immediately despite no confirmed active exploitation.

Evan Mael
Evan Mael
Enterprise64views
CVSS Score4.9
Affected Releases4
Total CVEs3
Workarounds0

Frequently Asked Questions

CVE-2026-20029 is an XML External Entity (XXE) vulnerability in Cisco Identity Services Engine that allows an authenticated administrator to read arbitrary system files, including those normally restricted even to administrators.

An attacker with administrator privileges can extract sensitive files such as configurations, certificates, private keys, and authentication data stored on the ISE server, potentially compromising the entire network.

Yes, a functional proof-of-concept has been published, significantly increasing the risk of exploitation by less sophisticated attackers. Immediate patch application is strongly recommended.

ISE and ISE-PIC versions prior to the January 2026 patches are vulnerable. Cisco has released security updates for all supported versions.

Apply Cisco patches immediately, limit ISE administrator access to the strict minimum, monitor logs for abnormal file access, and audit existing administrator accounts.

Incident Summary

Type
Vulnerability
Severity
Medium
Industry
Enterprise
Threat Actor
N/A
Target
Network Administrators, Enterprise Security Teams
Published
Jan 8, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in