About:
CVE-2026-20184 is a critical vulnerability in Cisco Webex Services related to improper certificate validation in Single Sign-On (SSO) integration with Control Hub. The flaw allows an unauthenticated attacker to supply a crafted authentication token to bypass authentication controls.
Successful exploitation may allow attackers to impersonate legitimate users within the Webex environment and gain unauthorized access to services, communications, and potentially sensitive organizational data.
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Authentication Bypass and User Impersonation Vulnerability in Cisco Webex Services
Identifier: CVE-2026-20184
CVSS Score: 9.8 (Critical, CVSS v3.1)
PoC or Exploitation:
As of current vendor and NVD reporting, there are no confirmed reports of active exploitation in the wild and no publicly available proof-of-concept exploit code.
Update/ Patch:
Cisco has released security updates to address this vulnerability in Cisco Webex Services. Customers using Single Sign-On integration with Control Hub are required to update and reconfigure their SAML certificates as outlined in Cisco guidance.
Cisco advisory and patch guidance:
Description:
CVE-2026-20184 is a vulnerability in the integration of single sign-on with Control Hub in Cisco Webex Services. The issue is caused by improper certificate validation during the authentication process.
An unauthenticated remote attacker can exploit this vulnerability by connecting to a service endpoint and supplying a crafted authentication token. Successful exploitation could allow the attacker to impersonate any user within the Webex environment and gain unauthorized access to legitimate services.
Mitigation Recommendation:
Ensure that all Cisco Webex environments are updated with the latest service-side fixes.
For organizations using SSO with Control Hub, immediately update and re-upload SAML certificates as required by Cisco.
Review authentication configurations and validate certificate trust chains.
Monitor Webex logs and authentication activity for suspicious login patterns, token abuse, or anomalous user behavior.