Categories: Cyber Security News

CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert after confirming active exploitation of a zero-day remote code execution (RCE) vulnerability in multiple Cisco Unified Communications products.

Tracked as CVE-2026-20045, the flaw enables code injection attacks that grant attackers user-level access to the underlying OS, followed by full root privilege escalation.

Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on January 21, 2026, federal agencies must apply mitigations by February 11, 2026, or discontinue use of affected products.

This critical issue stems from improper input validation in Cisco’s communication platforms, aligning with CWE-94: Improper Control of Generation of Code. Attackers can inject malicious code via crafted network requests, bypassing authentication in some scenarios.

Attackers exploiting this flaw can execute arbitrary code within the context of the vulnerable service. CISA confirmed active exploitation in the wild, prompting the urgent addition to the KEV catalog on January 21, 2026.

Organizations managing these communications systems face immediate risk of compromise.

Cisco has published an advisory confirming the vulnerability affects on-premises deployments, with no workaround available beyond patching.

Affected Products and Attack Vectors

The vulnerability impacts:

  • Cisco Unified Communications Manager (Unified CM)
  • Cisco Unified Communications Manager Session Management Edition (Unified CM SME)
  • Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P)
  • Cisco Unity Connection
  • Cisco Webex Calling Dedicated Instance

Enterprise voice and collaboration environments face high risk, as these products often expose management interfaces to the internet.

Attackers exploit the flaw remotely without authentication by sending malformed packets to exposed services like CTI Manager or AXLE services.

Once injected, code executes in the context of the web server process, allowing persistence via cron jobs or backdoors before root escalation through known local priv-esc paths.

Early indicators suggest threat actors are chaining this with phishing or supply-chain compromises to target call centers and UCaaS providers.

Cisco urges immediate upgrades to patched versions:

  1. Unified CM: Release 14SU2.7 or later
  2. Unity Connection: 14SU2.7 or later
  3. IM&P: 14SU3 or later

CISA emphasizes zero-trust principles: assume breach and hunt for IOCs, such as unexpected root processes or injected web shells.

This zero-day underscores persistent risks in legacy UC infrastructure, where delayed patching leaves orgs vulnerable to ransomware or espionage.

No public PoCs exist yet, but underground forums report exploits for sale. Security teams should cross-reference CISA KEV and Cisco PSIRT for updates.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

IceHogs Military Night March 22: Free tickets for Veterans, proceeds benefit American Legion Post 340

The IceHogs will face the Grand Rapids Griffins at 4 p.m. March 22 at the…

5 minutes ago

Microsoft Unveils New Teams Optimizations for Windows App on iOS & Android

Microsoft has officially announced the general availability of new Microsoft Teams optimizations for the Windows…

15 minutes ago

CISA Warns of Cisco Secure Firewall Management Center 0-Day Exploited in Ransomware Attacks

An urgent warning highlights a critical zero-day in Cisco products, now added to the CISA…

15 minutes ago

Ransomware Actors Expand EDR Killer Tactics Beyond Vulnerable Drivers

Ransomware attackers have widened their approach to defeating endpoint security, moving well past the technique…

16 minutes ago

Critical Jenkins Vulnerabilities Expose CI/CD Servers to RCE Attacks

A critical security advisory addressing multiple high-severity vulnerabilities in Jenkins core and the LoadNinja plugin.…

16 minutes ago

Navia Confirms Data Breach – 2.7 Million Users Sensitive Data Exposed

A prominent U.S. consumer-focused benefits administrator has disclosed a significant data breach exposing the sensitive…

16 minutes ago

This website uses cookies.