Description
A vulnerability in the CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, local attacker with administrative privileges to perform a command injection attack on the underlying operating system and elevate privileges to root.

This vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by providing crafted input to a specific CLI command. A successful exploit could allow the attacker to elevate their privileges to root on the underlying operating system.
Published: 2026-04-15
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The flaw is a command injection vulnerability in the command‑line interface of Cisco Identity Services Engine (ISE) and the ISE Passive Identity Connector. It is based on CWE‑116, indicating insufficient input validation that allows crafted user data to be executed by the underlying operating system. When successfully exploited, the attacker’s privileges are raised to system root, granting full control of the host and the potential to move laterally across the network. Based on the description, it is inferred that the attack vector requires an authenticated, local administrator with CLI access. The advisory does not provide a direct exploitation pathway but indicates that the flaw can be triggered by supplying malicious input to a specific command.

Affected Systems

Cisco Identity Services Engine Software and the Cisco ISE Passive Identity Connector. No specific version ranges are listed in the advisory, so any installation that includes the vulnerable CLI command is potentially affected. The issue applies to systems where local CLI access is granted to administrative accounts.

Risk and Exploitability

The moderate CVSS score (6) combined with the absence of an EPSS value or KEV listing suggests the likelihood of active exploitation is uncertain. However, the vulnerability can be leveraged by anyone with authenticated local admin rights to inject shell commands that execute with root privilege, leading to a full system compromise. The exploitation vector is inferred from the description to be remote from the perspective of local access, but requires privileged user interaction.

Generated by OpenCVE AI on April 16, 2026 at 02:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade to the latest Cisco ISE firmware that eliminates the command‑injection flaw.
  • Restrict local CLI access to administrators with least‑privilege accounts and enforce account separation.
  • Disable or limit the execution of the affected CLI command through configuration or access‑control policies.

Generated by OpenCVE AI on April 16, 2026 at 02:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco identity Services Engine Software
Vendors & Products Cisco
Cisco identity Services Engine Software

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the&nbsp;CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, local attacker with administrative privileges to perform a command injection attack on the underlying operating system and elevate privileges to root. This vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by providing crafted input to a specific CLI command. A successful exploit could allow the attacker to elevate their privileges to root on the underlying operating system.
Title Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability
Weaknesses CWE-116
References
Metrics cvssV3_1

{'score': 6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Cisco Identity Services Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-16T03:55:30.918Z

Reserved: 2025-10-08T11:59:15.381Z

Link: CVE-2026-20136

cve-icon Vulnrichment

Updated: 2026-04-15T16:56:10.370Z

cve-icon NVD

Status : Received

Published: 2026-04-15T17:17:02.150

Modified: 2026-04-15T17:17:02.150

Link: CVE-2026-20136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T02:45:06Z

Weaknesses