Close Menu
    Latest Post

    Anker’s X1 Pro shouldn’t exist, but I’m so glad it does

    February 22, 2026

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Anker’s X1 Pro shouldn’t exist, but I’m so glad it does
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    • GHD Speed Hair Dryer Review: Powerful Performance and User-Friendly Design
    • An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Cisco Patches Critical Unified Communications Zero-Day Exploited in Attacks
    Security

    Cisco Patches Critical Unified Communications Zero-Day Exploited in Attacks

    Samuel AlejandroBy Samuel AlejandroJanuary 22, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 19uevcn featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cisco has addressed a severe remote code execution (RCE) vulnerability, identified as CVE-2026-20045, impacting its Unified Communications and Webex Calling platforms. This critical flaw has been actively exploited by attackers as a zero-day.

    The vulnerability affects several Cisco products, including Unified Communications Manager (Unified CM), Unified CM Session Management Edition (SME), Unified CM IM & Presence, Cisco Unity Connection, and Webex Calling Dedicated Instance.

    According to Cisco’s advisory, the flaw stems from improper validation of user-supplied input within HTTP requests. An attacker could exploit this by sending specially crafted HTTP requests to the web-based management interface of a vulnerable device.

    Successful exploitation of this vulnerability could grant an attacker user-level access to the underlying operating system, with the potential to then elevate privileges to root.

    Despite having a CVSS score of 8.2, Cisco has rated this vulnerability as Critical due to the potential for attackers to achieve root access on affected servers.

    Cisco has released software updates and patch files to mitigate this vulnerability:

    Cisco Unified CM, Unified CM IM&P, Unified CM SME, and Webex Calling Dedicated Instance Release:

    • Version 12.5: Migrate to a fixed release.
    • Version 14: Update to 14SU5 or apply patch file: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
    • Version 15: Update to 15SU4 (expected March 2026) or apply patch files: ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512, ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512

    Cisco Unity Connection Release:

    • Version 12.5: Migrate to a fixed release.
    • Version 14: Update to 14SU5 or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
    • Version 15: Update to 15SU4 (expected March 2026) or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512

    It is important to review the README documentation for each patch, as updates are version-specific.

    Cisco’s Product Security Incident Response Team (PSIRT) has confirmed active exploitation attempts of this vulnerability. Customers are strongly advised to upgrade their software to the latest versions without delay.

    There are no known workarounds to mitigate this flaw without installing the provided updates.

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) Catalog. Federal agencies are mandated to deploy the necessary updates by February 11, 2026.

    This month, Cisco also addressed other significant vulnerabilities, including an Identity Services Engine (ISE) flaw with public proof-of-concept exploit code, and an AsyncOS zero-day that had been exploited since November.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleApple MacBook Air with M4 Chip Available at a $200 Discount
    Next Article Workaround for Missing ‘Add to Google Wallet’ Button on Passes
    Samuel Alejandro

    Related Posts

    Security

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026
    Security

    An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

    February 21, 2026
    Security

    Anthropic Introduces Embedded Security Scanning for Claude AI

    February 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202513 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202511 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Anker’s X1 Pro shouldn’t exist, but I’m so glad it does

    February 22, 20260 Views

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 20260 Views

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 20260 Views
    Recent Posts
    • Anker’s X1 Pro shouldn’t exist, but I’m so glad it does
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.