License to Leak: Cracking Cisco ISE with XXE
Vulnerability ID: CVE-2026-20029
CVSS Score: 4.9
Published: 2026-01-07
A classic XML External Entity (XXE) vulnerability in the licensing component of Cisco Identity Services Engine (ISE) allows authenticated administrators to read arbitrary files from the underlying OS.
TL;DR
Cisco ISE's licensing module blindly trusts XML input. If you have admin access (or can trick someone who does), you can upload a crafted license file that forces the server to read local system files (like /etc/shadow) and report them back to you. It's a high-privilege flaw, but a deadly one for post-exploitation lateral movement.
⚠️ Exploit Status: POC
Technical Details
- CWE: CWE-611 (XXE)
- CVSS v3.1: 4.9 (Medium)
- Attack Vector: Network (Admin Upload)
- Privileges: High (Admin Required)
- Impact: Information Disclosure (Arbitrary File Read)
- EPSS Score: 0.04%
- Exploit Status: PoC Possible (Trivial)
Affected Systems
- Cisco Identity Services Engine (ISE) 3.1
- Cisco Identity Services Engine (ISE) 3.2
- Cisco Identity Services Engine (ISE) 3.3
- Cisco Identity Services Engine (ISE) 3.4
- Cisco ISE Passive Identity Connector (ISE-PIC)
-
Cisco ISE: 3.1.0 (Patches 1-10) (Fixed in:
Patch 11) -
Cisco ISE: 3.2.0 (Patches 1-7) (Fixed in:
Patch 8) -
Cisco ISE: 3.3.0 (Patches 1-7) (Fixed in:
Patch 8) -
Cisco ISE: 3.4.0 (Patches 1-3) (Fixed in:
Patch 4)
Exploit Details
- N/A: No public exploit code available yet, but XXE payloads are standard and trivial to construct.
Mitigation Strategies
- Disable DTD processing in all XML parsers.
- Disable External Entity resolution (creation of a specific secure processing feature).
- Input validation on uploaded file headers.
Remediation Steps:
- Identify the current running version of Cisco ISE.
- Download the appropriate patch from the Cisco Software Center (e.g., ISE 3.1 Patch 10+).
- Backup the current configuration via the ADE-OS command line.
- Install the patch and reboot the appliance.
- Verify the version number in the bottom right corner of the GUI.
References
Read the full report for CVE-2026-20029 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)