Cisco's Unified Communications System Under Attack: A Critical Flaw Exposed!
Cisco has stepped up to address a critical security issue within its Unified Communications platform, a vulnerability that has been actively exploited in recent attacks. This zero-day exploit, tracked as CVE-2026-20045, affects several key Cisco products, including Unified Communications Manager, Session Management Edition, IM & Presence, Cisco Unity Connection, and Webex Calling Dedicated Instance.
The vulnerability, as described by Cisco's advisory, stems from improper validation of user input in HTTP requests. An attacker can exploit this by sending a series of carefully crafted HTTP requests to the web-based management interface of an affected device. The potential impact is significant: successful exploitation could grant the attacker user-level access to the underlying operating system, and from there, they could elevate their privileges to root access.
With a CVSS score of 8.2, Cisco has assigned this vulnerability a Critical severity rating due to the potential for root access on servers. To address this issue, Cisco has released specific software updates and patch files for the affected products.
Cisco Unified CM, Unified CM IM&P, Unified CM SME, and Webex Calling Dedicated Instance:
- Version 12.5: Migrate to a fixed release.
- Version 14: Update to 14SU5 or apply the patch file ciscocm.V14SU4aCSCwr21851remotecodev1.cop.sha512.
- Version 15: Update to 15SU4 (Mar 2026) or apply the patch file ciscocm.V15SU2CSCwr21851remotecodev1.cop.sha512 or ciscocm.V15SU3CSCwr21851remotecodev1.cop.sha512.
Cisco Unity Connection:
- Version 12.5: Migrate to a fixed release.
- Version 14: Update to 14SU5 or apply the patch file ciscocm.cuc.CSCwr29208C0266-1.cop.sha512.
- Version 15: Update to 15SU4 (Mar 2026) or apply the patch file ciscocm.cuc.CSCwr29208C0266-1.cop.sha512.
Cisco emphasizes that these patches are version-specific, so users should carefully review the README before applying them.
Cisco's Product Security Incident Response Team (PSIRT) has confirmed that attempts to exploit this vulnerability have been observed in the wild, highlighting the urgency for customers to upgrade to the latest software. Additionally, Cisco states that there are no workarounds to mitigate this flaw without installing the necessary updates.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) Catalog, giving federal agencies until February 11, 2026, to deploy the necessary updates.
This incident follows Cisco's recent patching of an Identity Services Engine (ISE) vulnerability and an AsyncOS zero-day exploit, both of which have been in the spotlight.
As we navigate the complex world of cybersecurity, it's crucial to stay informed and proactive. How do you ensure your organization's security measures are up-to-date and effective? Share your thoughts and experiences in the comments below!