Description
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
Published: 2026-01-15
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

A vulnerability in Cisco Identity Services Engine and the associated passive connector allows an attacker who has valid administrative credentials to inject malicious script into the web‑based management interface. The injected code then runs in the context of any authenticated user who views the compromised page, potentially granting the attacker the ability to steal session data, modify displayed information, or perform actions on behalf of the user. The flaw stems from inadequate validation and sanitization of user‑supplied input, enabling client‑side code execution. The impact is limited to the scope of users who access the affected interface, but the odds of credential compromise grant the attacker broad control over the management surface.

Affected Systems

Cisco Identity Services Engine software versions 3.2.0, 3.3.0, and 3.4.0 are referenced in the product list; whereas the advisory does not specify which patch levels mitigate the flaw, Cisco routinely releases patches for these releases. Admin‑level users of any of the affected releases who access the web interface are at risk until a remediation update is applied.

Risk and Exploitability

The CVSS score of 4.8 indicates medium severity, and the EPSS score of less than 1 % reflects a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated administrative access and interaction with the web interface, meaning it is an authenticated remote attack vector. Attackers would need to compromise or otherwise obtain valid credentials, making the threat moderate until patching occurs.

Generated by OpenCVE AI on April 18, 2026 at 06:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cisco Identity Services Engine to the latest available release that contains the XSS fix (e.g., update to version 3.4.0 patch 3 or newer).
  • Limit access to the ISE web management interface to trusted administrators and use least‑privilege accounts to reduce the impact of credential compromise.
  • Deploy a Content Security Policy (CSP) on the ISE web interface to restrict the execution of injected scripts on any unpatched systems.

Generated by OpenCVE AI on April 18, 2026 at 06:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco identity Services Engine
CPEs cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:patch3:*:*:*:*:*:*
Vendors & Products Cisco identity Services Engine

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco identity Services Engine Passive Identity Connector
Cisco identity Services Engine Software
Vendors & Products Cisco
Cisco identity Services Engine Passive Identity Connector
Cisco identity Services Engine Software

Thu, 15 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
Title Cisco Identity Services Engine Cross-Site Scripting Vulnerability
Weaknesses CWE-80
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Cisco Identity Services Engine Identity Services Engine Passive Identity Connector Identity Services Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-26T15:04:06.757Z

Reserved: 2025-10-08T11:59:15.355Z

Link: CVE-2026-20047

cve-icon Vulnrichment

Updated: 2026-01-15T18:10:08.340Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T17:16:07.160

Modified: 2026-01-30T19:58:27.947

Link: CVE-2026-20047

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses