Cisco Unified Communications Zero-Day RCE Enables Root Access

Home/cisco, cisco, Cybersecurity, Internet Security, Secuirty Update, Security Advisory, vulnerability, Zero Day Attack/Cisco Unified Communications Zero-Day RCE Enables Root Access

Cisco Unified Communications Zero-Day RCE Enables Root Access

Cisco has issued an urgent security alert after identifying a previously unknown remote code execution flaw being exploited against its Unified Communications platforms. The vulnerability, tracked as CVE-2026-20045, enables attackers to compromise systems without authentication and ultimately obtain root-level control.

Ciscoโ€™s security response team has confirmed real-world attacks and advises customers to take immediate action.

How the Attack Works

The issue originates in the web-based management interface, where HTTP request input is not properly validated.

Attackers can exploit this weakness by:

  • Sending crafted HTTP requests to the management endpoint
  • Bypassing authentication controls
  • Executing commands on the operating system
  • Escalating privileges to full root access

Because the flaw allows complete system takeover, Cisco classified it as Critical, prioritizing impact over traditional scoring metrics.

Impacted Cisco Products

Cisco confirmed the following products are affected, independent of configuration:

ProductTracking ID
Unified Communications ManagerCSCwr21851
Unified CM SMECSCwr21851
Unified CM IM & PresenceCSCwr29216
Unity ConnectionCSCwr29208
Webex Calling (Dedicated Instance)CSCwr21851

Other Cisco UC components, including Contact Center-related platforms, are confirmed not vulnerable.

Software Updates and Fix Availability

Cisco has released fixes for supported versions. Only the releases listed below are validated by Cisco PSIRT.

Unified CM, IM&P, SME, Webex Calling

Version StreamFixed Release
12.5Upgrade required
1414SU5 or patched 14SU4
1515SU4 (March 2026) or interim patches

Unity Connection

Version StreamFixed Release
12.5Upgrade required
1414SU5 or patched 14SU4
1515SU4 (March 2026) or 15SU3

Cisco has observed attackers targeting unpatched deployments, likely using automated discovery techniques to locate exposed management interfaces. Environments supporting enterprise voice and collaboration services are particularly attractive targets.

The vulnerability has also been added to CISAโ€™s Known Exploited Vulnerabilities catalog, increasing compliance pressure for affected organizations.

What Cisco Recommends

Organizations should take the following steps immediately:

  • Apply Cisco security updates or upgrade to fixed releases
  • Restrict access to management interfaces using network controls
  • Monitor HTTP activity for abnormal request patterns
  • Investigate systems for indicators of compromise

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!