Description
A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to perform path traversal attacks on the underlying operating system and read arbitrary files. To exploit this vulnerability, the attacker must have valid administrative credentials.

This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.
Published: 2026-04-15
Score: 4.9 Medium
EPSS: n/a
KEV: No
Impact: Potential read of arbitrary files via path traversal by authenticated administrators
Action: Apply Patch
AI Analysis

Impact

A flaw in Cisco Identity Services Engine and its Passive Identity Connector component permits an authenticated user to conduct path traversal on the underlying operating system. The flaw arises from inadequate validation of user‑supplied HTTP parameters, enabling the attacker to request arbitrary files after authentication. The consequence is the potential disclosure of sensitive configuration or credential files, effectively compromising confidentiality for accounts with administrative privileges. While authentication is required, the lack of further checks means any compromised admin can read protected files.

Affected Systems

The vulnerability affects Cisco ISE and Cisco ISE-PIC. No specific version information is listed, indicating that all released versions remain vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 4.9 reflects a moderate impact with limited attack surface. No EPSS score is available and the flaw is not listed in the KEV catalog. Exploitation requires valid administrative credentials, so the risk is largely confined to environments where such access is possible. Because no public exploitation has been reported, the threat is controlled by access management and timely patching.

Generated by OpenCVE AI on April 15, 2026 at 19:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Cisco ISE or ISE‑PIC system to the latest version that resolves the path traversal issue.
  • Restrict administrative privileges to a minimal set of trusted users and enforce strong authentication to reduce the chance of credential compromise.
  • Monitor web server and application logs for repeated path traversal attempts and deploy firewall or reverse proxy rules to block suspicious requests.

Generated by OpenCVE AI on April 15, 2026 at 19:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco identity Services Engine Passive Identity Connector
Cisco identity Services Engine Software
Vendors & Products Cisco
Cisco identity Services Engine Passive Identity Connector
Cisco identity Services Engine Software

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to perform path traversal attacks on the underlying operating system and read arbitrary files. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.
Title Cisco Identity Services Engine Path Traversal Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Cisco Identity Services Engine Passive Identity Connector Identity Services Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-15T16:56:35.471Z

Reserved: 2025-10-08T11:59:15.385Z

Link: CVE-2026-20148

cve-icon Vulnrichment

Updated: 2026-04-15T16:56:30.594Z

cve-icon NVD

Status : Received

Published: 2026-04-15T17:17:02.637

Modified: 2026-04-15T17:17:02.637

Link: CVE-2026-20148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:02:23Z

Weaknesses