Zeroday Vulnerability of Cisco Unified Communications products
After releasing updates against an actively exploited critical security vulnerability (2025-20393 & CVSS Score 10.0) what affected AsyncOS Software for Cisco Secure Email Gateway and Sisco secure Email and Web Manager, Cisco published another disclosure of Zero-day vulnerability in late January, 2026 and released a fresh patch for it within 24 hours of the disclosure. This Zero-day vulnerability, CVE-2026-20045 (CVSS score: 8.2) could permit an unauthenticated remote attack to execute arbitrary commands on the operating system of a susceptible device.
Cisco addressed this with, “This vulnerability is due to improper validation of us input in HTTP request”.
With this vulnerability, hacker could successfully launch an attack by sending sequence of crafted HTTP requests to the web-management interface of an affected device. If the attempt is successful, attacker could gain user level accesses to underlying operating system and elevate privileges to the root level.
The vulnerability impacted the following products:
■ Unified CM
■ Unified CM Session Management Edition
■ Unified CM IM & presence Service (IM&P)
■ Unified Connection
■ Webex Calling Dedicated Instances
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also added this vulnerability to its Known Exploited Vulnerabilities (KVE) catalogue and mandate accelerated remediation timeline for federal agencies.
Link for official advisory and patch files by Cisco:
CVE-2026-20045 | CWE-94
CVE-2025-20393 | CWE-20 : https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4
Comments
Post a Comment