What Happened
Cisco released security advisories on April 15, 2026, addressing four critical vulnerabilities — two in Webex Services and two in Identity Services Engine (ISE). The most severe is CVE-2026-20184 (CVSS 9.8), a flaw in how Webex handles Single Sign-On integration with Control Hub. An unauthenticated, remote attacker can supply a crafted token to the SSO endpoint and impersonate any user within the Webex service without providing valid credentials.
Cisco confirmed the vulnerability requires no authentication and no user interaction. The attack vector is the network. An attacker exploiting CVE-2026-20184 gains unauthorized access to the Webex sessions and data of the impersonated account. Cisco states there is no evidence of malicious exploitation at the time of disclosure, and the fix is cloud-delivered — but customers using SSO must upload a new identity provider SAML certificate to Control Hub to complete remediation.
The three ISE vulnerabilities disclosed alongside CVE-2026-20184 include critical flaws enabling authenticated remote code execution. CVE-2026-20180 allows an authenticated attacker with admin-level access to execute arbitrary commands with root privileges on affected ISE nodes. Cisco rates exploitation likelihood as high for these ISE flaws once proof-of-concept code becomes publicly available.
Why This Matters for Canadian Organizations
Cisco Webex is a standard collaboration platform across the Canadian public sector, financial services, healthcare, and enterprise environments. Organizations that have integrated Webex with SSO through Control Hub — a common enterprise configuration — are directly affected by CVE-2026-20184. The ability to impersonate any Webex user without credentials creates serious risks: an attacker gaining access to a senior executive’s Webex session or a privileged administrator’s account sees meeting recordings, shared files, contact directories, and live conference content.
Cisco ISE is deployed widely in Canadian enterprise and government networks as a network access control and policy enforcement platform. ISE sits at the edge of network admission — it controls which devices, users, and services gain access to internal networks. A compromise of ISE in a Canadian government or regulated financial environment creates a path to lateral movement across the internal network, bypassing segmentation controls.
Canadian organizations under PIPEDA face breach notification obligations if unauthorized access to personally identifiable information occurs through a compromised Webex or ISE environment. Under Bill C-26 (once in force), critical infrastructure operators face additional obligations for significant cyber incidents affecting their systems. Security teams in the Canadian public sector should treat Webex SSO misconfigurations as a high-priority remediation item given the scale of government Webex deployment.
What to Do
For Webex: log in to Control Hub immediately and upload a new IdP SAML certificate for your SSO integration — this is the required remediation action for CVE-2026-20184. Organizations not using SSO are not affected. Review your Webex audit logs for any anomalous access patterns, particularly impersonation attempts or sessions originating from unexpected IP addresses.
For ISE: apply the patches Cisco has released for the ISE critical vulnerabilities without delay. Restrict ISE administrative access to known management hosts using firewall rules and Cisco’s built-in admin access controls. Audit ISE admin account credentials and disable any accounts no longer required. If ISE is internet-facing in any configuration, treat patching as urgent.
Source: The Hacker News | BleepingComputer

