Cisco Patches Critical RCE Zero-Day in Unified Communications | CVE-2026-20045 (2026)

Critical Alert: Cisco Unveils Fix for Actively Exploited Unified Communications Zero-Day Vulnerability 🚨

Cisco has rolled out urgent updates to tackle a critical remote code execution (RCE) vulnerability affecting its Unified Communications and Webex Calling products, which has been exploited in the wild as a zero-day.

Tracked as CVE-2026-20045, this flaw impacts multiple Cisco products, including Unified Communications Manager (Unified CM), Unified CM Session Management Edition (SME), Unified CM IM & Presence, Cisco Unity Connection, and Webex Calling Dedicated Instance. But here's where it gets scary... an attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface, potentially gaining user-level access and escalating privileges to root.

The Vulnerability Explained
The issue stems from inadequate validation of user-supplied input in HTTP requests. Cisco warns that successful exploitation could allow attackers to execute arbitrary commands on the underlying operating system, posing a significant security risk.

Affected Products and Fixes
Cisco has released software updates and patches to address the vulnerability. Affected products and corresponding fixes include:

  • Cisco Unified CM, Unified CM IM&P, Unified CM SME, and Webex Calling Dedicated Instance:
    • Version 12.5: Migrate to a fixed release
    • Version 14: 14SU5 or apply patch file ciscocm.V14SU4aCSCwr21851remotecodev1.cop.sha512
    • Version 15: 15SU4 (Mar 2026) or apply patches ciscocm.V15SU2CSCwr21851remotecodev1.cop.sha512 and ciscocm.V15SU3CSCwr21851remotecodev1.cop.sha512
  • Cisco Unity Connection:
    • Version 12.5: Migrate to a fixed release
    • Version 14: 14SU5 or apply patch file ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
    • Version 15: 15SU4 (Mar 2026) or apply patch file ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512

Urgent Action Required
Cisco's Product Security Incident Response Team (PSIRT) confirms exploitation attempts in the wild, urging customers to upgrade to the latest software immediately. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has also added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) Catalog, requiring federal agencies to deploy updates by February 11, 2026.

What do you think? 🤔 Should companies prioritize patching or wait for further guidance? Share your thoughts in the comments! 💬

Cisco Patches Critical RCE Zero-Day in Unified Communications | CVE-2026-20045 (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6161

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.