Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild. The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on the
AI Analysis
Technical Summary
CVE-2026-20045 is a critical remote code execution vulnerability affecting multiple Cisco Unified Communications products, including Unified CM, Unified CM Session Management Edition (SME), Unified CM IM & Presence Service (IM&P), Unity Connection, and Webex Calling Dedicated Instance. The root cause is improper validation of user-supplied input in HTTP requests handled by the web-based management interface. An attacker can exploit this flaw by sending a sequence of specially crafted HTTP requests without authentication, gaining user-level access to the underlying operating system. Subsequently, the attacker can escalate privileges to root, allowing full control over the affected device. This vulnerability is particularly severe due to the combination of unauthenticated remote exploitation and privilege escalation. Cisco has addressed the issue in releases 12.5, 14 (14SU5 or patches), and 15 (15SU4 or patches) for Unified CM and Unity Connection. The vendor has confirmed active exploitation attempts in the wild, prompting urgent patching recommendations. The vulnerability affects critical communication infrastructure components that manage voice and collaboration services, making it a high-impact threat. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20045 to its Known Exploited Vulnerabilities catalog, requiring federal agencies to remediate by February 11, 2026. No workarounds are available, emphasizing the need for timely patch deployment. The vulnerability was discovered by an external researcher and publicly disclosed through Cisco advisories and cybersecurity news platforms.
Potential Impact
For European organizations, the impact of CVE-2026-20045 is substantial. Unified Communications platforms like Cisco Unified CM and Webex are widely used across enterprises, government agencies, and critical infrastructure sectors for voice, video, and messaging services. Exploitation could lead to unauthorized access to sensitive communications, interception or manipulation of calls, and disruption of collaboration services, severely affecting business continuity and operational integrity. The ability to execute arbitrary commands as root on these systems could allow attackers to implant persistent malware, exfiltrate confidential data, or launch further attacks within the network. Given the critical role of these communication platforms, exploitation could also impact emergency services, healthcare communications, and financial institutions, increasing the risk of cascading failures. The active exploitation in the wild highlights the immediacy of the threat. Additionally, regulatory requirements under GDPR and NIS2 Directive impose strict obligations on protecting communication infrastructure, making compliance and reputational risks significant. Organizations failing to patch promptly may face operational disruptions, data breaches, and legal consequences.
Mitigation Recommendations
European organizations should prioritize immediate patching of all affected Cisco Unified CM and Webex Calling Dedicated Instance deployments, upgrading to the fixed releases or applying the provided patch files as per Cisco advisories. Since no workarounds exist, patch management must be expedited. Network segmentation should be enforced to restrict access to the web-based management interfaces, limiting exposure to trusted administrative networks only. Implement strict access controls and multi-factor authentication for management interfaces to reduce attack surface. Continuous monitoring and logging of management interface traffic should be enabled to detect anomalous HTTP requests indicative of exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures for this vulnerability. Conduct thorough audits of Unified Communications infrastructure to identify unauthorized changes or indicators of compromise. Establish incident response plans specific to Unified Communications systems to enable rapid containment and remediation. Engage with Cisco support and threat intelligence feeds to stay informed on emerging exploitation techniques and patches. Finally, review and update cybersecurity policies to incorporate lessons learned from this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
Description
Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild. The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on the
AI-Powered Analysis
Technical Analysis
CVE-2026-20045 is a critical remote code execution vulnerability affecting multiple Cisco Unified Communications products, including Unified CM, Unified CM Session Management Edition (SME), Unified CM IM & Presence Service (IM&P), Unity Connection, and Webex Calling Dedicated Instance. The root cause is improper validation of user-supplied input in HTTP requests handled by the web-based management interface. An attacker can exploit this flaw by sending a sequence of specially crafted HTTP requests without authentication, gaining user-level access to the underlying operating system. Subsequently, the attacker can escalate privileges to root, allowing full control over the affected device. This vulnerability is particularly severe due to the combination of unauthenticated remote exploitation and privilege escalation. Cisco has addressed the issue in releases 12.5, 14 (14SU5 or patches), and 15 (15SU4 or patches) for Unified CM and Unity Connection. The vendor has confirmed active exploitation attempts in the wild, prompting urgent patching recommendations. The vulnerability affects critical communication infrastructure components that manage voice and collaboration services, making it a high-impact threat. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20045 to its Known Exploited Vulnerabilities catalog, requiring federal agencies to remediate by February 11, 2026. No workarounds are available, emphasizing the need for timely patch deployment. The vulnerability was discovered by an external researcher and publicly disclosed through Cisco advisories and cybersecurity news platforms.
Potential Impact
For European organizations, the impact of CVE-2026-20045 is substantial. Unified Communications platforms like Cisco Unified CM and Webex are widely used across enterprises, government agencies, and critical infrastructure sectors for voice, video, and messaging services. Exploitation could lead to unauthorized access to sensitive communications, interception or manipulation of calls, and disruption of collaboration services, severely affecting business continuity and operational integrity. The ability to execute arbitrary commands as root on these systems could allow attackers to implant persistent malware, exfiltrate confidential data, or launch further attacks within the network. Given the critical role of these communication platforms, exploitation could also impact emergency services, healthcare communications, and financial institutions, increasing the risk of cascading failures. The active exploitation in the wild highlights the immediacy of the threat. Additionally, regulatory requirements under GDPR and NIS2 Directive impose strict obligations on protecting communication infrastructure, making compliance and reputational risks significant. Organizations failing to patch promptly may face operational disruptions, data breaches, and legal consequences.
Mitigation Recommendations
European organizations should prioritize immediate patching of all affected Cisco Unified CM and Webex Calling Dedicated Instance deployments, upgrading to the fixed releases or applying the provided patch files as per Cisco advisories. Since no workarounds exist, patch management must be expedited. Network segmentation should be enforced to restrict access to the web-based management interfaces, limiting exposure to trusted administrative networks only. Implement strict access controls and multi-factor authentication for management interfaces to reduce attack surface. Continuous monitoring and logging of management interface traffic should be enabled to detect anomalous HTTP requests indicative of exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures for this vulnerability. Conduct thorough audits of Unified Communications infrastructure to identify unauthorized changes or indicators of compromise. Establish incident response plans specific to Unified Communications systems to enable rapid containment and remediation. Engage with Cisco support and threat intelligence feeds to stay informed on emerging exploitation techniques and patches. Finally, review and update cybersecurity policies to incorporate lessons learned from this vulnerability.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html","fetched":true,"fetchedAt":"2026-01-22T21:44:40.949Z","wordCount":978}
Threat ID: 69729a4b4623b1157c9181a7
Added to database: 1/22/2026, 9:44:43 PM
Last enriched: 1/22/2026, 9:47:30 PM
Last updated: 1/24/2026, 5:22:04 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
MediumCISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities
LowCritical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access
CriticalHackers Targeting Cisco Unified CM Zero-Day
CriticalZoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.