Zeroday Vulnerability of Cisco Unified Communications products

After releasing updates against an actively exploited critical security vulnerability (2025-20393 & CVSS Score 10.0) what affected AsyncOS Software for Cisco Secure Email Gateway and Sisco secure Email and Web Manager, Cisco published another disclosure of Zero-day vulnerability in late January, 2026 and released a fresh patch for it within 24 hours of the disclosure. This Zero-day vulnerability, CVE-2026-20045 (CVSS score: 8.2) could permit an unauthenticated remote attack to execute arbitrary commands on the operating system of a susceptible device.


Cisco addressed this with, “This vulnerability is due to improper validation of us input in HTTP request”.


With this vulnerability, hacker could successfully launch an attack by sending sequence of crafted HTTP requests to the web-management interface of an affected device. If the attempt is successful, attacker could gain user level accesses to underlying operating system and elevate privileges to the root level.


The vulnerability impacted the following products:


■ Unified CM

■ Unified CM Session Management Edition

■ Unified CM IM & presence Service (IM&P)

■ Unified Connection

■ Webex Calling Dedicated Instances


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also added this vulnerability to its Known Exploited Vulnerabilities (KVE) catalogue and mandate accelerated remediation timeline for federal agencies.


Link for official advisory and patch files by Cisco:

CVE-2026-20045 | CWE-94

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b

CVE-2025-20393 | CWE-20 : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4

Comments

Popular posts from this blog

Genea Fertility Clinic Ransomware Attack (2025)

How to Develop an Effective RCA Report for Incident Response

POV: “I am secured, I have a Licensed Antivirus!” - Are you protected from cybercriminal minds?