研究人員發現Cisco Identity Services Engine (ISE)存在3個高風險安全漏洞(CVE-2026-20147、CVE-2026-20180及CVE-2026-20186),類型包含指令注入(Command Injection)與路徑遍歷(Path Traversal),請儘速確認並進行修補。
- CVE-2026-20147:已取得管理者權限之遠端攻擊者可藉由發送特製HTTP請求執行任意作業系統指令。
- CVE-2026-20180與CVE-2026-20186:已取得唯讀管理者權限之遠端攻擊者可藉由發送特製HTTP請求執行任意作業系統指令。
影響平台
【CVE-2026-20147】
Cisco ISE或Cisco ISE Passive Identity Connector (ISE-PIC) 3.1之前所有版本
Cisco ISE或Cisco ISE Passive Identity Connector (ISE-PIC) 3.1 Patch 11(不含)之前版本
Cisco ISE或Cisco ISE Passive Identity Connector (ISE-PIC) 3.2 Patch 10(不含)之前版本
Cisco ISE或Cisco ISE Passive Identity Connector (ISE-PIC) 3.3 Patch 11(不含)之前版本
Cisco ISE或Cisco ISE Passive Identity Connector (ISE-PIC) 3.4 Patch 6(不含)之前版本
Cisco ISE或Cisco ISE Passive Identity Connector (ISE-PIC) 3.5 Patch 3(不含)之前版本
【CVE-2026-20180與CVE-2026-20186】
Cisco ISE 3.2之前所有版本
Cisco ISE 3.2 Patch 8(不含)之前版本
Cisco ISE 3.3 Patch 8(不含)之前版本
Cisco ISE 3.4 Patch 4(不含)之前版本
處置建議
官方已針對漏洞釋出修復更新,請參考官方說明進行更新,網址如下:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
參考資料
1. https://nvd.nist.gov/vuln/detail/CVE-2026-20147
2. https://nvd.nist.gov/vuln/detail/CVE-2026-20180
3. https://nvd.nist.gov/vuln/detail/CVE-2026-20186
4. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
5. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
Facebook
Twitter
LINE