{"id":45481,"date":"2026-04-16T20:58:45","date_gmt":"2026-04-16T12:58:45","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/16\/cisco-says-critical-webex-services-flaw-requires-customer-action\/"},"modified":"2026-04-16T20:58:45","modified_gmt":"2026-04-16T12:58:45","slug":"cisco-says-critical-webex-services-flaw-requires-customer-action","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/16\/cisco-says-critical-webex-services-flaw-requires-customer-action\/","title":{"rendered":"Cisco says critical Webex Services flaw requires customer action"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2025\/03\/04\/Cisco-headpic.jpg\" width=\"1600\" alt=\"Cisco says critical Webex Services flaw requires customer action\"><\/p>\n<p>Cisco has released security updates to patch four critical vulnerabilities, including a fixed improper certificate validation flaw in the company&#8217;s cloud-based Webex Services platform that requires further customer action.<\/p>\n<p>Webex Services is a customer experience platform that unifies communication across hybrid work environments, enabling team members to call, meet, and message each other from any location or device.<\/p>\n<p>Tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-20184\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-20184<\/a>, the Webex vulnerability was found in the single sign-on (SSO) integration with Control Hub (a web-based portal that helps IT admins manage Webex settings) and allows remote attackers with no privileges to impersonate any user.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.adaptivesecurity.com\/demo\/security-awareness-training?utm_source=display_network&amp;utm_medium=paid_display&amp;utm_campaign=2026_04_display_bleepingcomputer&amp;utm_id=701Rd00000fE8REIA0&amp;utm_content=970x250\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/a\/as-tour-the-platform-970-x250.jpg\" style=\"margin-top: 0px;\" alt=\"Cisco says critical Webex Services flaw requires customer action\"><\/a> <\/div>\n<p>&#8220;Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by connecting to a service endpoint and supplying a crafted token,&#8221; Cisco <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-webex-cui-cert-8jSZYhWL\" target=\"_blank\" rel=\"nofollow noopener\">explained<\/a> in a Wednesday advisory. &#8220;A successful exploit could have allowed the attacker to gain unauthorized access to legitimate Cisco Webex services.&#8221;<\/p>\n<p>While the company has already addressed this security flaw in the Cisco Webex service, it warned customers who use SSO integration that they must <a href=\"https:\/\/help.webex.com\/en-us\/article\/nstvmyo\/Manage-single-sign-on-integration-in-Control-Hub#task_394598AFBCD3D73A488E6DBB99AD3214\" target=\"_blank\" rel=\"nofollow noopener\">upload a new SAML certificate<\/a> for their identity provider (IdP) to Control Hub to avoid service interruption.<\/p>\n<p>On Wednesday, the company also patched three critical security flaws (<a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-ise-rce-traversal-8bYndVrZ\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-20147<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-20180\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-20180<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-20186\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2026-20186<\/a>) in the Identity Services Engine (ISE) security policy management platform.<\/p>\n<p>Attackers could exploit these vulnerabilities to execute arbitrary commands on the underlying operating system regardless of device configuration; however, successful exploitation requires administrative credentials on the targeted systems.<\/p>\n<p>The complete list of security issues <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"nofollow noopener\">addressed this week<\/a> also includes 10 medium-severity flaws that can be abused to bypass authentication, escalate privileges, and trigger denial-of-service states.<\/p>\n<p>Cisco also added that its Product Security Incident Response Team (PSIRT) had no evidence that any of them had been exploited in attacks.<\/p>\n<p>Last month, the Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday\/\" target=\"_blank\" rel=\"nofollow noopener\">ordered federal agencies<\/a> to patch a maximum-severity vulnerability (CVE-2026-20131) in Cisco&#8217;s Secure Firewall Management Center (FMC) that had been exploited as a zero-day <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/interlock-ransomware-exploited-secure-fmc-flaw-in-zero-day-attacks-since-january\/\" target=\"_blank\" rel=\"nofollow noopener\">in Interlock ransomware attacks<\/a> since late January 2026.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/p\/picus-whitepaper.jpg\" alt=\"Cisco says critical Webex Services flaw requires customer action\">         <\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Automated Pentesting Covers Only 1 of 6 Surfaces.<\/a><\/h2>\n<p>Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.<\/p>\n<p>This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.<\/p>\n<p>           <button><a href=\"https:\/\/hubs.li\/Q048zztN0\" target=\"_blank\" rel=\"noopener sponsored\">Get Your Copy Now<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-react2shell-in-automated-credential-theft-campaign\/\">Hackers exploit React2Shell in automated credential theft campaign<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday\/\">CISA orders feds to patch max-severity Cisco flaw by Sunday<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/interlock-ransomware-exploited-secure-fmc-flaw-in-zero-day-attacks-since-january\/\">Ransomware gang exploits Cisco flaw in zero-day attacks since January<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-fixes-critical-pre-auth-bugs-in-sd-wan-cloud-license-manager\/\">Cisco fixes critical pre-auth bugs in SD-WAN, cloud license manager<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-fixes-bug-allowing-remote-code-execution-with-root-privileges\/\">Cisco fixes bug allowing remote code execution with root privileges<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cisco has released security updates to patch four criti [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-45481","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45481"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45481\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}