[CIVN-2026-0009] Information Disclosure Vulnerability in CISCO

By Published On: January 12, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Information Disclosure Vulnerability in CISCO 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Systems Affected
Cisco ISE and Cisco ISE-PIC
Overview
A vulnerability has been reported in licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.
Target Audience: 
All IT administrators and individuals responsible for maintaining and updating in Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC).
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability uploading a malicious file to the application.
Successful exploitation of this vulnerability could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt
CVE Name
CVE-2026-20029
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=rriA
—–END PGP SIGNATURE—–

Share this article