CVE-2026-20029

4.9 MEDIUM
XXE

📋 TL;DR

An XML External Entity (XXE) vulnerability in Cisco ISE and ISE-PIC allows authenticated administrators to read arbitrary files on the underlying operating system. This occurs due to improper XML parsing in the web-based management interface when malicious files are uploaded. Only systems with Cisco ISE or ISE-PIC with administrative access are affected.

💻 Affected Systems

Products:
  • Cisco Identity Services Engine (ISE)
  • Cisco ISE Passive Identity Connector (ISE-PIC)
Versions: Multiple versions - check Cisco advisory for specifics
Operating Systems: Cisco ISE OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative privileges to exploit. All default configurations with vulnerable versions are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator reads sensitive system files, configuration files, or credentials stored on the OS, potentially leading to full system compromise.

🟠

Likely Case

Administrator reads configuration files containing passwords, keys, or other sensitive data that should be protected.

🟢

If Mitigated

No impact if proper access controls and patching are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials and ability to upload files to the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions - see Cisco advisory

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt

Restart Required: Yes

Instructions:

1. Review Cisco advisory for specific fixed versions. 2. Backup configuration. 3. Apply appropriate patch/upgrade. 4. Restart services. 5. Verify fix.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to only trusted users and networks.

Monitor File Uploads

all

Implement monitoring for file uploads to the ISE management interface.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ISE management interfaces
  • Enforce multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check ISE version via CLI: show version, then compare to vulnerable versions in Cisco advisory.

Check Version:

show version

Verify Fix Applied:

Verify version is updated to fixed version listed in Cisco advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to management interface
  • Administrative access from unexpected sources
  • XML parsing errors in application logs

Network Indicators:

  • HTTP POST requests with XML content to management interface
  • File uploads to administrative endpoints

SIEM Query:

source="ISE" AND (event_type="file_upload" OR http_method="POST") AND uri CONTAINS "/admin/"

🔗 References

📤 Share & Export