Description
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.

This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
Published: 2026-01-15
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS) executed by an authenticated attacker
Action: Apply Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the web‑based management interface of Cisco Identity Services Engine. An attacker who has legitimate administrative credentials can inject malicious script into specific pages of the interface. When a target user subsequently views those pages, the script runs in the victim’s browser context, potentially allowing the attacker to execute arbitrary code or retrieve sensitive, browser‑based information.

Affected Systems

Cisco Identity Services Engine software is affected, including all builds from version 3.2.0 through the current 3.4.0 release. The flaw is present in both the base 3.2.0, 3.3.0 3.4.0 series and in all their intermediate patch releases (patch1‑patch7 for 3.2.0, patch1‑patch4 for 3.3.0).

Risk and Exploitability

The CVSS base score of 4.8 indicates a moderate impact, while the EPSS score of less than 1% suggests a very low likelihood of public exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires that the attacker first obtain valid administrative credentials, which could be achieved through phishing, credential reuse, or insider activity. Once authenticated, the attacker can perform a stored XSS attack by submitting malicious input through the interface. The attack vector is thus authenticated and remote, but limited to users who have access to the web interface.

Generated by OpenCVE AI on April 18, 2026 at 06:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install Cisco’s security patch that resolves CVE‑2026‑20076 (upgrade to ISE 3.4.0 or later).
  • Restrict administrative access to the ISE web interface to trusted personnel and secure networks; disable the interface when not needed.
  • Deploy a web‑application firewall or content‑filter capable of detecting and neutralizing malicious scripts submitted to the ISE interface.

Generated by OpenCVE AI on April 18, 2026 at 06:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Cisco identity Services Engine
CPEs cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch7:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch4:*:*:*:*:*:*
cpe:2.3:a:cisco:identity_services_engine:3.4.0:-:*:*:*:*:*:*
Vendors & Products Cisco identity Services Engine

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco identity Services Engine Software
Vendors & Products Cisco
Cisco identity Services Engine Software

Thu, 15 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.
Title Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Cisco Identity Services Engine Identity Services Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-26T15:04:07.360Z

Reserved: 2025-10-08T11:59:15.362Z

Link: CVE-2026-20076

cve-icon Vulnrichment

Updated: 2026-01-15T18:09:39.059Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-15T17:16:07.517

Modified: 2026-01-30T19:53:59.787

Link: CVE-2026-20076

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:15:15Z

Weaknesses