Home

Description

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.

PUBLISHED Reserved 2025-10-08 | Published 2026-01-21 | Updated 2026-01-21 | Assigner cisco




HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unknown

12.5(1)SU2
affected

12.5(1)SU1
affected

12.5(1)
affected

12.5(1)SU3
affected

12.5(1)SU4
affected

14
affected

12.5(1)SU5
affected

14SU1
affected

12.5(1)SU6
affected

14SU2
affected

12.5(1)SU7
affected

12.5(1)SU7a
affected

14SU3
affected

12.5(1)SU8
affected

12.5(1)SU8a
affected

15
affected

15SU1
affected

14SU4
affected

14SU4a
affected

15SU1a
affected

12.5(1)SU9
affected

15SU2
affected

15.0.1.13010-1
affected

15.0.1.13011-1
affected

15.0.1.13012-1
affected

15.0.1.13013-1
affected

15.0.1.13014-1
affected

15.0.1.13015-1
affected

15.0.1.13016-1
affected

15.0.1.13017-1
affected

15SU3a
affected

Default status
unknown

12.5(1)
affected

12.5(1)SU1
affected

12.5(1)SU2
affected

12.5(1)SU3
affected

12.5(1)SU4
affected

14
affected

12.5(1)SU5
affected

14SU1
affected

12.5(1)SU6
affected

14SU2
affected

14SU2a
affected

12.5(1)SU7
affected

14SU3
affected

12.5(1)SU8
affected

15
affected

15SU1
affected

14SU4
affected

12.5(1)SU9
affected

15SU2
affected

15SU3
affected

Default status
unknown

12.5(1)
affected

12.5(1)SU1
affected

12.5(1)SU2
affected

12.5(1)SU3
affected

12.5(1)SU4
affected

14
affected

12.5(1)SU5
affected

14SU1
affected

12.5(1)SU6
affected

14SU2
affected

12.5(1)SU7
affected

14SU3
affected

12.5(1)SU8
affected

14SU3a
affected

12.5(1)SU8a
affected

15
affected

15SU1
affected

14SU4
affected

12.5(1)SU9
affected

15SU2
affected

15SU3
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2026-20045 government-resource

sec.cloudapps.cisco.com/...isory/cisco-sa-voice-rce-mORhqY4b (cisco-sa-voice-rce-mORhqY4b)

cve.org (CVE-2026-20045)

nvd.nist.gov (CVE-2026-20045)

Download JSON