VYPR
Medium severity4.3NVD Advisory· Published May 6, 2026· Updated May 6, 2026

CVE-2026-20193

CVE-2026-20193

Description

A vulnerability in the RADIUS Policy API endpoints of Cisco ISE could allow an authenticated, remote attacker with read-only Administrator privileges to gain unauthorized access to sensitive information on an affected device.

This vulnerability is due to improper role-based access control (RBAC) permissions on the RADIUS Policy API endpoints. An attacker could exploit this vulnerability by bypassing the web-based management interface and directly calling an affected endpoint. A successful exploit could allow the attacker to gain unauthorized read access to sensitive RADIUS Policy details that are restricted for their role.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2026-20193 is a medium-severity vulnerability in Cisco ISE that allows an authenticated, read-only admin to access sensitive RADIUS Policy details via improper RBAC on API endpoints.

Vulnerability

Overview

CVE-2026-20193 is a vulnerability in the RADIUS Policy API endpoints of Cisco Identity Services Engine (ISE). The root cause is improper role-based access control (RBAC) permissions on these endpoints, which allows an authenticated, remote attacker with read-only Administrator privileges to bypass the intended access restrictions. By directly calling an affected API endpoint instead of using the web-based management interface, the attacker can gain unauthorized read access to sensitive RADIUS Policy details that are normally restricted for their role [1].

Exploitation

To exploit this vulnerability, an attacker must already have authenticated access to the Cisco ISE device with read-only Administrator privileges. The attack is performed remotely by bypassing the web-based management interface and directly invoking the vulnerable RADIUS Policy API endpoint. No additional authentication or privileges are required beyond the initial read-only admin role. The attack is remote and does not require any user interaction [1].

Impact

A successful exploit allows the attacker to gain unauthorized read access to sensitive RADIUS Policy details. This could include configuration information that the attacker's role should not have access to, potentially leading to further information gathering or aiding in subsequent attacks. The CVSS v3 base score is 4.3 (Medium), reflecting the limited impact due to the requirement for authenticated access and the read-only nature of the information disclosure [1].

Mitigation

Cisco has released software updates that address this vulnerability. There are no workarounds available. Users are advised to upgrade to a fixed software release as indicated in the Cisco Security Advisory. The vulnerability affects Cisco ISE regardless of device configuration, but does not affect Cisco ISE Passive Identity Connector (ISE-PIC) [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.