Description
A vulnerability in the RADIUS Policy API endpoints of Cisco ISE could allow an authenticated, remote attacker with read-only Administrator privileges to gain unauthorized access to sensitive information on an affected device.

This vulnerability is due to improper role-based access control (RBAC) permissions on the RADIUS Policy API endpoints. An attacker could exploit this vulnerability by bypassing the web-based management interface and directly calling an affected endpoint. A successful exploit could allow the attacker to gain unauthorized read access to sensitive RADIUS Policy details that are restricted for their role.
Published: 2026-05-06
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the RADIUS Policy API endpoints of Cisco Identity Services Engine allows an authenticated, remote attacker with read‑only Administrator privileges to bypass the web‑based management interface and retrieve sensitive RADIUS policy details that should be restricted for that role. The violation of role‑based access control permits disclosure of confidential configuration information, potentially enabling further subversive actions.

Affected Systems

The vulnerability affects Cisco Identity Services Engine Software. Specific release versions are not enumerated in the advisory, so all current installations should be reviewed for the presence of the exposed API endpoints.

Risk and Exploitability

With a CVSS score of 4.3 the risk is considered moderate. No EPSS score is available and the vulnerability is not listed in CISA KEV, indicating limited known exploitation. The vulnerability requires the attacker to possess an authenticated account with a read‑only Administrator role, implying that internal or compromised credentials facilitate exploitation. Attackers can trigger the exploit by directly invoking the targeted API endpoint, thereby gaining unauthorized read access.

Generated by OpenCVE AI on May 6, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco ISE patch or update that corrects RBAC permissions on the RADIUS Policy API endpoints.
  • Audit and restrict read‑only Administrator account privileges, ensuring no roles can access beyond their intended scope.
  • Disable or tightly restrict the exposed RADIUS Policy API endpoints, limiting external access to only necessary services and monitoring for abnormal usage.

Generated by OpenCVE AI on May 6, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco identity Services Engine Software
Vendors & Products Cisco
Cisco identity Services Engine Software

Wed, 06 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the RADIUS Policy API endpoints of Cisco ISE could allow an&nbsp;authenticated, remote attacker with read-only Administrator privileges to gain unauthorized access to sensitive information on an affected device. This vulnerability is due to improper role-based access control (RBAC) permissions on the RADIUS Policy API endpoints. An attacker could exploit this vulnerability by bypassing the web-based management interface and directly calling an affected endpoint. A successful exploit could allow the attacker to gain unauthorized&nbsp;read access to sensitive RADIUS Policy details that are restricted for their role.
Title Cisco Identity Services Engine Authentication Bypass Vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Cisco Identity Services Engine Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-05-06T17:48:32.189Z

Reserved: 2025-10-08T11:59:15.395Z

Link: CVE-2026-20193

cve-icon Vulnrichment

Updated: 2026-05-06T17:35:21.614Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T17:16:21.500

Modified: 2026-05-06T18:59:53.230

Link: CVE-2026-20193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T20:15:15Z

Weaknesses