TL;DR
Cisco released fixes for a vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector after a public proof-of-concept appeared. The flaw (CVE-2026-20029) can let authenticated users with admin privileges read arbitrary files via the web management interface; Cisco and ZDI report no in-the-wild abuse so far.
What happened
Cisco published patches addressing a vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Tracked as CVE-2026-20029 with a CVSS score of 4.9, the bug stems from incorrect handling of XML in the products' web-based management interface. An attacker who can authenticate with administrative privileges may upload a crafted file that results in arbitrary file reads from the underlying operating system, potentially exposing sensitive data. Trend Micro ZDI researcher Bobby Gould reported the issue; ZDI notes the flaw requires authentication, which limits immediate abuse. Cisco and ZDI say they are not aware of active exploitation, but a publicly available proof-of-concept exploit has been posted online by an unknown party, increasing the urgency for organizations to apply the vendor's updates.
Why it matters
- Administrators could have sensitive system files exposed if credentials are compromised.
- A public proof-of-concept lowers the bar for attackers to develop working exploits.
- ISE is widely used to enforce network access policies, so vulnerable instances could affect many organizations.
- Previous ISE flaws were exploited in the wild, illustrating the product class is a frequent target.
Key facts
- Vulnerability identifier: CVE-2026-20029.
- CVSS score: 4.9 (medium severity).
- Affected products: Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC).
- Root cause: improper parsing of XML in the web-based management interface.
- Exploitation requires authentication with administrative-level privileges.
- A public proof-of-concept exploit is available online; the publisher is unknown.
- Trend Micro ZDI bug hunter Bobby Gould is credited with reporting the issue.
- Cisco and ZDI report no confirmed in-the-wild exploitation as of the advisory.
- Cisco urges customers to install the provided patches promptly.
What to watch next
- Monitor vendor and threat-intel updates for any reports of active exploitation of CVE-2026-20029.
- Track whether the origin of the public proof-of-concept is identified or if additional PoCs appear.
- not confirmed in the source
Quick glossary
- CVE: Common Vulnerabilities and Exposures — a standardized identifier for publicly known cybersecurity vulnerabilities.
- CVSS: Common Vulnerability Scoring System — a framework for rating the severity of security vulnerabilities.
- Proof-of-concept (PoC): A demonstration that shows how a vulnerability can be exploited, often used by researchers and attackers.
- Identity Services Engine (ISE): Cisco's platform for network access control and centralized policy enforcement for users and devices.
Reader FAQ
Has this vulnerability been used in the wild?
Cisco and ZDI say they are not aware of any in-the-wild exploitation at the time of the advisory.
Who published the proof-of-concept exploit?
not confirmed in the source
Does an attacker need to authenticate to exploit the bug?
Yes. ZDI says the vulnerability requires authentication at administrative privilege levels.
What should affected organizations do?
Apply Cisco's patches for ISE and ISE-PIC as provided in the vendor advisory.

PATCHES Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit No reports of active exploitation … yet Jessica Lyons Thu 8 Jan 2026 // 18:43 UTC Cisco patched a bug in its Identity…
Sources
- Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit
- Critical Cisco ISE Vulnerabilities Allow Root-Level RCE
- Cisco Patches ISE Security Vulnerability After Public PoC …
- Cisco warns of Identity Service Engine flaw with exploit code
Related posts
- Near-total internet shutdown in Iran during nationwide economic protests
- IBM Bob AI Vulnerability Lets CLI Download and Execute Malware Remotely
- Cloudflare Radar Shows Iran Routing Anomalies Amid Apparent IPv6 Outage