Cisco patches critical flaws in Unified Contact Center Express
Take action: If you use Cisco Unified Contact Center Express, plan a very quick update to version 12.5 SU3 ES07 or 15.0 ES01. There are critical flaws that let unauthenticated attackers execute commands with root privileges and bypass authentication. Prioritize systems exposed on the internet.
Learn More
Cisco has patched critical security vulnerabilities in its Unified Contact Center Express (Unified CCX) platform that could allow unauthenticated attackers to completely compromise affected systems.
Vulnerabilities summary:
- CVE-2025-20354 (CVSS score 9.8): vulnerability in the Java RMI process allows an unauthenticated, remote attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system.
- CVE-2025-20358 (CVSS score 9.4): authentication bypass vulnerability in the CCX Editor application allows an unauthenticated, remote attacker to obtain administrative permissions for script creation and execution. An attacker can exploit this by redirecting the authentication flow to a malicious server and tricking the CCX Editor into believing the authentication was successful, enabling them to create and execute arbitrary scripts on the underlying operating system as an internal non-root user account.
All versions of Cisco Unified Contact Center Express (Unified CCX) prior to the fixed releases are vulnerable, regardless of device configuration:
- Cisco Unified CCX Release 12.5 SU3 and earlier versions
- Cisco Unified CCX Release 15.0
Patched versions:
- Cisco Unified CCX Release 12.5 SU3 ES07 and later versions
- Cisco Unified CCX Release 15.0 ES01 and later versions
Cisco has confirmed that these vulnerabilities do not affect Packaged Contact Center Enterprise (Packaged CCE) or Unified Contact Center Enterprise (Unified CCE) products.
Organizations should upgrade to Cisco Unified CCX Release 12.5 SU3 ES07 or Release 15.0 ES01, depending on their deployment version. There are no workarounds available to address these vulnerabilities.