Categories: Cyber Security News

Cisco Unified Communications 0-Day Actively Exploited for Remote Root Access

Cisco has issued a critical security advisory warning of an actively exploited zero-day vulnerability affecting multiple Unified Communications products.

The flaw, tracked as CVE-2026-20045, allows unauthenticated attackers to execute arbitrary commands and gain root-level access to vulnerable systems.

Vulnerability Details

The remote code execution (RCE) vulnerability resides in the HTTP request validation mechanism of Cisco’s web-based management interfaces.

An attacker can exploit this weakness by sending carefully crafted HTTP requests

Sponsored
to trigger arbitrary command execution on the underlying operating system.

Once initial access is obtained, the attacker can escalate privileges to the root level, thereby gaining complete system control.

Cisco assigned a CVSS base score of 8.2 and classified the vulnerability as Critical under its Security Impact Rating system due to root access escalation potential.

The flaw stems from improper input validation and is categorized under CWE-94 (Code Injection).

Affected Products

Five enterprise communication platforms are vulnerable to exploitation:

  • Cisco Unified Communications Manager (Unified CM)
  • Cisco Unified Communications Manager Session Management Edition (Unified CM SME)
  • Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P)
  • Cisco Unity Connection
  • Cisco Webex Calling Dedicated Instance

The vulnerability affects multiple software releases across these products, with version 12.5 showing no available patches.

Organizations running these systems remain at significant risk until remediation measures are implemented.

Cisco PSIRT has confirmed active exploitation attempts in the wild. This disclosure elevates urgency for enterprise security teams, as threat actors are actively leveraging the vulnerability against production systems.

No public exploit code is required; attackers can craft malicious HTTP sequences without authentication.

Cisco offers two mitigation paths for affected organizations. Recommended fixed software releases include Unified CM version 14SU5 and version 15SU4 (scheduled for March 2026).

Sponsored

For systems requiring immediate patching, Cisco provides version-specific patch files:

  • Unified CM 14SU4a patch: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
  • Unified CM 15SU2/15SU3a patches are available for download from Cisco’s software portal

Unity Connection customers can apply CSCwr29208 patches targeting their respective software versions. Organizations running version 12.5 have no patch option and must migrate to supported releases entirely.

Notably, Cisco has stated that no workarounds exist to address this vulnerability, making immediate patching the only viable remediation strategy.

This vulnerability poses a severe risk to the enterprise communications infrastructure. Attackers gaining root access can intercept communications, modify call routing, deploy persistent backdoors, and compromise connected systems.

For organizations relying on Unified Communications for business continuity, this represents a critical threat requiring urgent attention.

Security teams should immediately inventory Unified Communications deployments and prioritize patching affected versions.

Organizations unable to patch immediately should consider network segmentation to restrict access to management interfaces and implement enhanced monitoring for suspicious HTTP requests targeting these systems.

Cisco’s CSAF documentation provides additional technical details and is available for integration with automated vulnerability management systems.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Cisco Unified Communications 0-Day Actively Exploited for Remote Root Access appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Bridgerton Season 4, Part 2 Review

Season 4 of Bridgerton ends with a bang. And that bang was the sound of…

32 minutes ago

Kali Linux Integrates Claude AI for Penetration Testing via Model Context Protocol

Kali Linux has officially introduced a native AI-assisted penetration testing workflow, enabling security professionals to…

2 hours ago

Lawyers Say Pennsylvania Student Protesters Did Not Know a Man Who Joined Scrum was the Police Chief

PHILADELPHIA (AP) — Lawyers for student protesters detained in Pennsylvania for four days after a…

2 hours ago

State says it will ask Supreme Court to reverse Claremont school funding rulings

For what is believed to be the first time, the state plans to ask the…

3 hours ago

Lawmakers weigh ending refugee resettlement program, face questions about who government should serve

Sarah Zuech teaches her four kids that charity begins at home. A person’s first responsibility,…

3 hours ago

Rockford Education Association secures new teacher contracts after lengthy negotiations

The Rockford School Board voted unanimously to approve new teacher contracts Wednesday night. This comes…

5 hours ago

This website uses cookies.