Skip to content

CVE-2026-20184: Cisco Webex SSO Impersonation Vulnerability

Analysis shows that a critical vulnerability exists in the integration of SSO with Control Hub in Cisco Webex Services. This flaw allows an unauthenticated, remote attacker to impersonate any user within the service, leading to full account takeover and unauthorized access to protected resources.

The vulnerability is rooted in improper certificate validation, classified under CWE-295. Cisco systems failed to properly verify the authenticity of certificates during the SSO token exchange process within the Control Hub integration.

The attack surface is exposed via the SSO service endpoint. By providing a crafted token to this endpoint, an attacker can bypass authentication mechanisms.

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Organizations should monitor logs for anomalous token requests originating from unauthorized service endpoints.

Artifacts

  • Token requests with invalid or self-signed certificate signatures.
  • Unexpected traffic spikes to Control Hub SSO endpoints.

Detection

  • Review Cisco Webex administrative logs for unauthorized impersonation attempts.
  • Validate SSO configuration settings against Cisco’s security baselines.
  1. Patch affected Cisco Webex infrastructure immediately.
  2. Review identity provider configurations to ensure strict certificate validation is enforced.
  3. Audit SSO logs for any signs of compromise within the identified timeframe.