CVE-2026-20195 — An Identity Management API Endpoint Of Cisco ISE Vulnerability

CVE-2026-20195 — An Identity Management API Endpoint Of Cisco ISE Vulnerability

CVE-2026-20195 — A vulnerability in an identity management API endpoint of Cisco ISE could allow an unauthenticated, remote attacker to enumerate valid user accounts on an affected device. This vulnerability exists because error messages are observed when the affected API endpoint is called. An a

What This Means For You

  • If your environment is affected by CWE-204, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-20195 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Cisco ISE Identity Management API User Enumeration Attempt — CVE-2026-20195

Sigma YAML — free preview
title: Cisco ISE Identity Management API User Enumeration Attempt — CVE-2026-20195
id: scw-2026-05-06-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-20195 by targeting the identity management API endpoint in Cisco ISE. The vulnerability allows unauthenticated attackers to enumerate valid user accounts by observing differentiated error messages in response to crafted requests to specific API paths, such as '/api/identity/users'. This rule specifically looks for GET requests to this path that result in a '400 Bad Request' status code, which can indicate a malformed request indicative of an enumeration attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-06
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-20195/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/api/identity/users'
      cs-method:
          - 'GET'
      sc-status:
          - '400'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-20195 vulnerability CVE-2026-20195
CWE-204 weakness CWE-204
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 06, 2026 at 20:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

NanoClaw Container Vulnerability Allows Arbitrary File Access, Recursive Deletion

CVE-2026-7875 — NanoClaw contains a host/container filesystem boundary vulnerability in outbound attachment handling and outbox cleanup that allows a compromised or prompt-injected container to read...

vulnerabilityCVEhigh-severityarbitrary-file-accesscwe-22
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 5 IOCs

CVE-2026-42503: gopls Vulnerability Exposes Dev Environments to RCE

CVE-2026-42503 — gopls by default communicates via pipe. However, -port and -listen flags are supported as means of debugging. If -listen is given a value...

vulnerabilityCVEhigh-severitycwe-1327
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs

CVE-2026-23870: High-Severity DoS Flaw in React Server Components

CVE-2026-23870 — A denial of service vulnerability could be triggered by sending specially crafted HTTP requests to server function endpoints, this could lead to server...

vulnerabilityCVEhigh-severitydenial-of-service
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 4 IOCs