Attack

Cisco Patches Actively Exploited Flaw in Unified Communications Products

Take action: If you are using Cisco communication platforms, read this advisory in detail. Make sure the web management interface are isolated from the internet and accessible from trusted networks only. Then plan a quick update. Because someone will find a way to reach the vulnerable interface even if it's isolated.


Learn More

Cisco released emergency fixes for a critical vulnerability in its enterprise communication tools.The flaw allows hackers to take over systems that manage corporate phone calls, messaging, and voicemail. Cisco's Product Security Incident Response Team (PSIRT) confirmed they are detecting active attempts to exploit this flaw.

The flaw is tracked as CVE-2026-20045 (CVSS score 8.2, Cisco score Critical) - a code injection vulnerability in the web-based management interface. Attackers send a series of specially made HTTP requests. Because the system does not check this input correctly, the attacker can run their own commands without authentication. 

A successful compromise gets the attacker a user-level access to the operating system. From there, they can raise their permissions to root and get complete control over the server. They can listen to calls, read messages, or use the server to attack other parts of the network. 

Affected systems are: 

  • Cisco Unified Communications Manager (Unified CM) and Session Management Edition (SME).
  • Cisco Unified Communications Manager IM & Presence Service
  • Cisco Unity Connection
  • Webex Calling Dedicated Instance is affected for cloud-hosted users.

There are no workarounds to stop an attack. Cisco advises all users to update their software immediately. If you use version 12.5, you must move to a newer version because it is no longer supported. For versions 14 and 15, Cisco provided specific patch path:

Unified CM, Unified CM IM&P, Unified CM SME, and Webex Calling Dedicated Instance

Cisco Unified CM, Unified CM IM&P, Unified CM SME, and Webex Calling Dedicated Instance ReleaseFirst Fixed Release
12.5Migrate to a fixed release.
1414SU5 or apply patch file:1
ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
1515SU4 (Mar 2026) or apply patch file:1
ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512
ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512

Unity Connection

Cisco Unity Connection ReleaseFirst Fixed Release
12.5Migrate to a fixed release.
1414SU5 or apply patch file:1
ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
1515SU4 (Mar 2026) or apply patch file:1
ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
Cisco Patches Actively Exploited Flaw in Unified Communications Products