Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20354: Unrestricted Upload of File with Dangerous Type in Cisco Cisco Unified Contact Center Express

0
Critical
VulnerabilityCVE-2025-20354cvecve-2025-20354
Published: Wed Nov 05 2025 (11/05/2025, 16:31:14 UTC)
Source: CVE Database V5
Vendor/Project: Cisco
Product: Cisco Unified Contact Center Express

Description

A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX could allow an unauthenticated, remote attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system. This vulnerability is due to improper authentication mechanisms that are associated to specific Cisco Unified CCX features. An attacker could exploit this vulnerability by uploading a crafted file to an affected system through the Java RMI process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 00:25:28 UTC

Technical Analysis

CVE-2025-20354 is a critical security vulnerability identified in Cisco Unified Contact Center Express (UCCX), a widely deployed contact center solution. The vulnerability exists in the Java Remote Method Invocation (RMI) process, which is improperly secured, allowing unauthenticated remote attackers to upload arbitrary files to the system. This unrestricted file upload can be leveraged to execute arbitrary commands on the underlying operating system with root-level privileges, effectively granting full control over the affected system. The root cause is an authentication bypass related to specific UCCX features that rely on Java RMI, which fails to properly validate user credentials or restrict file types during upload. The affected versions span multiple releases from 10.5(1)SU1 through 15.0.1, indicating a long-standing issue across many supported versions. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature with network attack vector, no required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the vulnerability’s characteristics make it highly exploitable. Attackers could use this flaw to compromise contact center environments, steal sensitive customer data, disrupt services, or use the compromised system as a foothold for lateral movement within enterprise networks. The vulnerability underscores the risk of insufficient authentication controls in critical communication infrastructure components.

Potential Impact

The impact of CVE-2025-20354 is severe for organizations worldwide that deploy Cisco Unified Contact Center Express. Successful exploitation results in full system compromise with root privileges, enabling attackers to execute arbitrary commands, install malware, exfiltrate sensitive customer and operational data, disrupt contact center operations, and potentially pivot to other internal systems. Given that contact centers handle sensitive personal and financial information, this vulnerability threatens confidentiality and privacy compliance. The availability of contact center services may also be disrupted, affecting customer support and business continuity. Enterprises relying on Cisco UCCX for critical communication workflows face operational and reputational risks. The broad range of affected versions means many organizations may be vulnerable if patches are not applied promptly. The lack of authentication requirement and remote exploitability increase the likelihood of attacks, especially in environments where the Java RMI interface is exposed or insufficiently segmented from untrusted networks. This vulnerability could be leveraged by cybercriminals, espionage actors, or ransomware groups targeting enterprise communication infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-20354, organizations should immediately apply any available Cisco security patches or updates addressing this vulnerability for their specific UCCX versions. If patches are not yet available, administrators should restrict access to the Java RMI interface by implementing strict network segmentation and firewall rules to limit exposure to trusted management networks only. Disable or restrict unused features related to Java RMI in UCCX configurations. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious file upload attempts or anomalous command execution patterns. Conduct thorough audits of UCCX logs to detect potential exploitation attempts. Implement robust authentication and authorization controls around management interfaces and consider multi-factor authentication where possible. Regularly back up UCCX configurations and data to enable recovery in case of compromise. Additionally, organizations should review and harden their overall contact center security posture, including endpoint protection and network monitoring, to detect and respond to potential intrusions quickly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cisco
Date Reserved
2024-10-10T19:15:13.257Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690b8074ffac907e5bea794b

Added to database: 11/5/2025, 4:51:00 PM

Last enriched: 2/27/2026, 12:25:28 AM

Last updated: 3/24/2026, 4:47:54 PM

Views: 484

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses