Categories: Cyber Security News

Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access

Cisco has disclosed a critical zero-day remote code execution (RCE) vulnerability, CVE-2026-20045, actively exploited in the wild.

Affecting key Unified Communications products, this flaw allows unauthenticated attackers to run arbitrary commands on the underlying OS, potentially gaining root access.

The Cisco Product Security Incident Response Team (PSIRT) confirmed exploitation attempts and urged immediate patching.

The issue stems from improper validation of user-supplied input in HTTP requests to the web-based management interface. An attacker sends crafted HTTP requests that bypass authentication, execute commands at the user level, and then escalate privileges to root. Cisco rated it Critical via Security Impact Rating (SIR), overriding the CVSS score due to root-level risks.

No workarounds exist. Exploitation requires network access to the management interface, common in enterprise VoIP setups exposed via firewalls or VPNs.

Affected Products

This vulnerability impacts these Cisco products regardless of configuration:

Product Bug ID
Unified CM CSCwr21851
Unified CM SME CSCwr21851
Unified CM IM&P CSCwr29216
Unity Connection CSCwr29208
Webex Calling Dedicated Instance CSCwr21851

Products like Contact Center SIP Proxy, Unified CCE, and others are confirmed unaffected. Check the advisory for full details.

Fixed Releases and Patches

Cisco released updates and patches. Migrate or apply version-specific fixes; consult patch READMEs.

Sponsored

Unified CM, IM&P, SME, Webex Calling

Release First Fixed Release
12.5 Migrate to fixed release
14 14SU5 or 14SU4a patch
15 15SU4 (Mar 2026) or 15SU2/3 patches

Unity Connection

Release First Fixed Release
12.5 Migrate to fixed release
14 14SU5 or 14SU4 patch
15 15SU4 (Mar 2026) or 15SU3 patch

PSIRT validates only listed releases.

Exploitation in the Wild

Cisco PSIRT detected real-world exploits targeting unpatched systems. Attackers likely leverage automated scanners for exposed interfaces. Enterprises running vulnerable VoIP/UC deployments face high risk, especially in hybrid work environments.

Apply patches immediately. Restrict management interface to trusted IPs via firewalls. Monitor logs for anomalous HTTP requests. CISA added this to the Known Exploited Vulnerabilities soon.

An external researcher reported the flaw; Cisco credited them in the advisory. Stay vigilant: zero-day vulnerabilities like CVE-2026-20045 underscore UC platform risks amid rising RCE trends.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Lawyers Say Pennsylvania Student Protesters Did Not Know a Man Who Joined Scrum was the Police Chief

PHILADELPHIA (AP) — Lawyers for student protesters detained in Pennsylvania for four days after a…

10 seconds ago

State says it will ask Supreme Court to reverse Claremont school funding rulings

For what is believed to be the first time, the state plans to ask the…

20 minutes ago

Lawmakers weigh ending refugee resettlement program, face questions about who government should serve

Sarah Zuech teaches her four kids that charity begins at home. A person’s first responsibility,…

20 minutes ago

Rockford Education Association secures new teacher contracts after lengthy negotiations

The Rockford School Board voted unanimously to approve new teacher contracts Wednesday night. This comes…

3 hours ago

Critical Cisco SD-WAN 0-Day Vulnerability Exploited Since 2023 to Gain Root Access

Cisco has disclosed a critical zero-day vulnerability in its Catalyst SD-WAN products that threat actors…

3 hours ago

Hacker Jailbreaks Claude AI to Write Exploit Code and Steal Government Data

A hacker exploited Anthropic’s Claude AI chatbot over a month-long campaign starting in December 2025,…

3 hours ago

This website uses cookies.