{"api_version":"1","generated_at":"2026-04-15T21:28:28+00:00","cve":"CVE-2026-20136","urls":{"html":"https://cve.report/CVE-2026-20136","api":"https://cve.report/api/cve/CVE-2026-20136.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-20136","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-20136"},"summary":{"title":"Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability","description":"A vulnerability in the&nbsp;CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, local attacker with administrative privileges to perform a command injection attack on the underlying operating system and elevate privileges to root.\r\n\r\nThis vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by providing crafted input to a specific CLI command. A successful exploit could allow the attacker to elevate their privileges to root on the underlying operating system.","state":"PUBLISHED","assigner":"cisco","published_at":"2026-04-15 17:17:02","updated_at":"2026-04-15 17:17:02"},"problem_types":["CWE-116","CWE-116 Improper Encoding or Escaping of Output"],"metrics":[{"version":"3.1","source":"psirt@cisco.com","type":"Primary","score":"6","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSSV3_1","score":"6","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-cmd-inj-5WSJcYJB","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-cmd-inj-5WSJcYJB","refsource":"psirt@cisco.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-20136","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-20136","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p6","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p8","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p6","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.4.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2.0 p7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.4 Patch 1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.1.0 p10","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 6","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.4 Patch 2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 7","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.4 Patch 3","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.5.0","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.4 Patch 4","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 8","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2 Patch 8","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.5 Patch 1","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.2 Patch 9","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.4 Patch 5","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.5 Patch 2","platforms":[]},{"source":"CNA","vendor":"Cisco","product":"Cisco Identity Services Engine Software","version":"affected 3.3 Patch 10","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[{"source":"CNA","title":"","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.","time":"","lang":"en"}],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-20136","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-15T16:41:18.256433Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-15T16:56:33.776Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unknown","product":"Cisco Identity Services Engine Software","vendor":"Cisco","versions":[{"status":"affected","version":"3.1.0"},{"status":"affected","version":"3.1.0 p1"},{"status":"affected","version":"3.1.0 p3"},{"status":"affected","version":"3.1.0 p2"},{"status":"affected","version":"3.2.0"},{"status":"affected","version":"3.1.0 p4"},{"status":"affected","version":"3.1.0 p5"},{"status":"affected","version":"3.2.0 p1"},{"status":"affected","version":"3.1.0 p6"},{"status":"affected","version":"3.2.0 p2"},{"status":"affected","version":"3.1.0 p7"},{"status":"affected","version":"3.3.0"},{"status":"affected","version":"3.2.0 p3"},{"status":"affected","version":"3.2.0 p4"},{"status":"affected","version":"3.1.0 p8"},{"status":"affected","version":"3.2.0 p5"},{"status":"affected","version":"3.2.0 p6"},{"status":"affected","version":"3.1.0 p9"},{"status":"affected","version":"3.3 Patch 2"},{"status":"affected","version":"3.3 Patch 1"},{"status":"affected","version":"3.3 Patch 3"},{"status":"affected","version":"3.4.0"},{"status":"affected","version":"3.2.0 p7"},{"status":"affected","version":"3.3 Patch 4"},{"status":"affected","version":"3.4 Patch 1"},{"status":"affected","version":"3.1.0 p10"},{"status":"affected","version":"3.3 Patch 5"},{"status":"affected","version":"3.3 Patch 6"},{"status":"affected","version":"3.4 Patch 2"},{"status":"affected","version":"3.3 Patch 7"},{"status":"affected","version":"3.4 Patch 3"},{"status":"affected","version":"3.5.0"},{"status":"affected","version":"3.4 Patch 4"},{"status":"affected","version":"3.3 Patch 8"},{"status":"affected","version":"3.2 Patch 8"},{"status":"affected","version":"3.5 Patch 1"},{"status":"affected","version":"3.3 Patch 9"},{"status":"affected","version":"3.2 Patch 9"},{"status":"affected","version":"3.4 Patch 5"},{"status":"affected","version":"3.5 Patch 2"},{"status":"affected","version":"3.3 Patch 10"}]}],"descriptions":[{"lang":"en","value":"A vulnerability in the&nbsp;CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, local attacker with administrative privileges to perform a command injection attack on the underlying operating system and elevate privileges to root.\r\n\r\nThis vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by providing crafted input to a specific CLI command. A successful exploit could allow the attacker to elevate their privileges to root on the underlying operating system."}],"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":6,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"cvssV3_1"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-116","description":"Improper Encoding or Escaping of Output","lang":"en","type":"cwe"}]}],"providerMetadata":{"dateUpdated":"2026-04-15T16:11:29.398Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"cisco-sa-ise-cmd-inj-5WSJcYJB","url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-cmd-inj-5WSJcYJB"}],"source":{"advisory":"cisco-sa-ise-cmd-inj-5WSJcYJB","defects":["CSCwp98770"],"discovery":"EXTERNAL"},"title":"Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability"}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2026-20136","datePublished":"2026-04-15T16:11:29.398Z","dateReserved":"2025-10-08T11:59:15.381Z","dateUpdated":"2026-04-15T16:56:33.776Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-15 17:17:02","lastModifiedDate":"2026-04-15 17:17:02","problem_types":["CWE-116","CWE-116 Improper Encoding or Escaping of Output"],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"20136","Ordinal":"1","Title":"Cisco Identity Services Engine Authenticated Privilege Escalatio","CVE":"CVE-2026-20136","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"20136","Ordinal":"1","NoteData":"A vulnerability in the&nbsp;CLI of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, local attacker with administrative privileges to perform a command injection attack on the underlying operating system and elevate privileges to root.\r\n\r\nThis vulnerability is due to insufficient validation of user supplied input. An attacker could exploit this vulnerability by providing crafted input to a specific CLI command. A successful exploit could allow the attacker to elevate their privileges to root on the underlying operating system.","Type":"Description","Title":"Cisco Identity Services Engine Authenticated Privilege Escalatio"}]}}}