Tracked as CVE-2026-20045, the flaw enables code injection attacks that grant attackers user-level access to the underlying OS, followed by full root privilege escalation.
Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on January 21, 2026, federal agencies must apply mitigations by February 11, 2026, or discontinue use of affected products.
This critical issue stems from improper input validation in Cisco’s communication platforms, aligning with CWE-94: Improper Control of Generation of Code. Attackers can inject malicious code via crafted network requests, bypassing authentication in some scenarios.
Attackers exploiting this flaw can execute arbitrary code within the context of the vulnerable service. CISA confirmed active exploitation in the wild, prompting the urgent addition to the KEV catalog on January 21, 2026.
Organizations managing these communications systems face immediate risk of compromise.
Cisco has published an advisory confirming the vulnerability affects on-premises deployments, with no workaround available beyond patching.
The vulnerability impacts:
Enterprise voice and collaboration environments face high risk, as these products often expose management interfaces to the internet.
Attackers exploit the flaw remotely without authentication by sending malformed packets to exposed services like CTI Manager or AXLE services.
Once injected, code executes in the context of the web server process, allowing persistence via cron jobs or backdoors before root escalation through known local priv-esc paths.
Early indicators suggest threat actors are chaining this with phishing or supply-chain compromises to target call centers and UCaaS providers.
Cisco urges immediate upgrades to patched versions:
CISA emphasizes zero-trust principles: assume breach and hunt for IOCs, such as unexpected root processes or injected web shells.
This zero-day underscores persistent risks in legacy UC infrastructure, where delayed patching leaves orgs vulnerable to ransomware or espionage.
No public PoCs exist yet, but underground forums report exploits for sale. Security teams should cross-reference CISA KEV and Cisco PSIRT for updates.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post CISA Warns of Cisco Unified CM 0-Day RCE Vulnerability Exploited in Attacks appeared first on Cyber Security News.
Season 4 of Bridgerton ends with a bang. And that bang was the sound of…
Kali Linux has officially introduced a native AI-assisted penetration testing workflow, enabling security professionals to…
PHILADELPHIA (AP) — Lawyers for student protesters detained in Pennsylvania for four days after a…
For what is believed to be the first time, the state plans to ask the…
Sarah Zuech teaches her four kids that charity begins at home. A person’s first responsibility,…
The Rockford School Board voted unanimously to approve new teacher contracts Wednesday night. This comes…
This website uses cookies.