- Cisco Fixes Four Critical Vulnerabilities in Webex Services, Including SSO and Identity Services Engine RCE Bugs
- No exploits reported before patches; users must update SAML certificates in Control Hub
- Separate IOS XE bug causes Wi-Fi hotspot logs to overload and updates to fail, affecting more than 230 models
Cisco has released a new patch to address four critical severity vulnerabilities affecting its cloud-based Webex services platform – and also warned Wi-Fi hotspot users of a bug in some versions of IOS XE that could cause a device boot loop.
Webex Services is a communications and collaboration platform that allows users to host video meetings, send messages, make calls, and share files, all from one place.
It was found vulnerable to four vulnerabilities: CVE-2026-20184 (9.8/10 – a vulnerability in the Single Sign-On (SSO) integration), CVE-2026-20147 (9.9/10 – a remote code execution bug in Cisco ISE and Cisco ISE-PIC), CVE-2026-20180 and CVE-2026-20186. (9.9/10 arbitrary code execution vulnerabilities in Cisco Identity Services Engine).
Article continues below
Patch now
Apparently, no malicious actor found these flaws before they were patched: “Before this vulnerability was patched, an attacker could have exploited this vulnerability by connecting to a service endpoint and providing a counterfeit token,” Cisco said in its security advisory.
“A successful exploit could have allowed the attacker to gain unauthorized access to legitimate Cisco Webex services.”
Although Cisco fixed the flaws, it also highlighted that those using SSO integration must upload a new SAML certificate for their identity provider (IdP) to Control Hub.
Bloated Access Points
At the same time, the company warned users of its hotspots about a bug that could render their devices useless. In a separate advisory, Cisco explained that “some Cisco access points (APs) may fail to download new software images or AP service packs” because an updated library in Cisco IOS XE generates a log file that grows by 5 MB each day.
The file, which cannot be deleted from the CLI, will continue to grow until there is no more space on the disk, essentially preventing new updates from being installed on the device.
Versions 17.12.4, 17.12.5, 17.12.6 and 17.12.6a are affected, it was indicated. In total, more than 230 different models are at risk, Cisco said.
“The longer an access point runs the affected software, the greater the likelihood that a software download will fail due to insufficient disk space,” the advisory states.
So users would have to upgrade to a version that doesn’t bloat the device, but it’s not that simple a process. Cisco has published a detailed guide, so if you use the company’s hotspots, be sure to read it here.
Via The register
The best antivirus for every budget
Follow TechRadar on Google News And add us as your favorite source to get our news, reviews and expert opinions in your feeds. Make sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp Also.




