PT-2026-33087 · Cisco · Cisco Ise-Pic+1
Published
2026-04-15
·
Updated
2026-04-18
·
CVE-2026-20147
CVSS v3.1
9.9
Critical
| AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco ISE (affected versions not specified)
Cisco ISE-PIC (affected versions not specified)
Description
Insufficient validation of user-supplied input allows an authenticated remote attacker with valid administrative credentials to execute arbitrary commands on the underlying operating system of an affected device. This is achieved by sending a crafted HTTP request. A successful exploit can grant user-level access to the operating system and subsequent privilege escalation to root. In single-node deployments, this may lead to a denial of service (DoS) condition, preventing unauthenticated endpoints from accessing the network until the node is restored.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Cisco Ise
Cisco Ise-Pic