Cisco ISE CLI Command Injection allows privilege escalation
CVE-2026-20136 Published on April 15, 2026
Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability
A vulnerability in the CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, local attacker with administrative privileges to perform a command injection attack on the underlying operating system and elevate privileges to root.
This vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by providing crafted input to a specific CLI command. A successful exploit could allow the attacker to elevate their privileges to root on the underlying operating system.
Vulnerability Analysis
CVE-2026-20136 is exploitable with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is an Output Sanitization Vulnerability?
The software prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
CVE-2026-20136 has been classified to as an Output Sanitization vulnerability or weakness.
Products Associated with CVE-2026-20136
Want to know whenever a new CVE is published for Cisco Identity Services Engine Software? stack.watch will email you.
Affected Versions
Cisco Identity Services Engine Software:- Version 3.1.0 is affected.
- Version 3.1.0 p1 is affected.
- Version 3.1.0 p3 is affected.
- Version 3.1.0 p2 is affected.
- Version 3.2.0 is affected.
- Version 3.1.0 p4 is affected.
- Version 3.1.0 p5 is affected.
- Version 3.2.0 p1 is affected.
- Version 3.1.0 p6 is affected.
- Version 3.2.0 p2 is affected.
- Version 3.1.0 p7 is affected.
- Version 3.3.0 is affected.
- Version 3.2.0 p3 is affected.
- Version 3.2.0 p4 is affected.
- Version 3.1.0 p8 is affected.
- Version 3.2.0 p5 is affected.
- Version 3.2.0 p6 is affected.
- Version 3.1.0 p9 is affected.
- Version 3.3 Patch 2 is affected.
- Version 3.3 Patch 1 is affected.
- Version 3.3 Patch 3 is affected.
- Version 3.4.0 is affected.
- Version 3.2.0 p7 is affected.
- Version 3.3 Patch 4 is affected.
- Version 3.4 Patch 1 is affected.
- Version 3.1.0 p10 is affected.
- Version 3.3 Patch 5 is affected.
- Version 3.3 Patch 6 is affected.
- Version 3.4 Patch 2 is affected.
- Version 3.3 Patch 7 is affected.
- Version 3.4 Patch 3 is affected.
- Version 3.5.0 is affected.
- Version 3.4 Patch 4 is affected.
- Version 3.3 Patch 8 is affected.
- Version 3.2 Patch 8 is affected.
- Version 3.5 Patch 1 is affected.
- Version 3.3 Patch 9 is affected.
- Version 3.2 Patch 9 is affected.
- Version 3.4 Patch 5 is affected.
- Version 3.5 Patch 2 is affected.
- Version 3.3 Patch 10 is affected.