By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
Computing

Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

News Room
Last updated: 2026/01/21 at 11:48 PM
News Room Published 21 January 2026
Share
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
SHARE

Ravie LakshmananJan 22, 2026Vulnerability / Zero-Day

Cisco has released fresh patches to address what it described as a “critical” security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild.

The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system of a susceptible device.

“This vulnerability is due to improper validation of user-supplied input in HTTP requests,” Cisco said in an advisory. “An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.”

Cybersecurity

The critical rating for the flaw is due to the fact that its exploitation could allow for privilege escalation to root, it added. The vulnerability impacts the following products –

  • Unified CM
  • Unified CM Session Management Edition (SME)
  • Unified CM IM & Presence Service (IM&P)
  • Unity Connection
  • Webex Calling Dedicated Instance

It has been addressed in the following versions –

Cisco Unified CM, CM SME, CM IM&P, and Webex Calling Dedicated Instance –

  • Release 12.5 – Migrate to a fixed release
  • Release 14 – 14SU5 or apply patch file: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
  • Release 15 – 15SU4 (Mar 2026) or apply patch file: ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512 or ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512

Cisco Unity Connection

  • Release 12.5 – Migrate to a fixed release
  • Release 14 – 14SU5 or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
  • Release 15 – 15SU4 (Mar 2026) or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
Cybersecurity

The networking equipment major also said it’s “aware of attempted exploitation of this vulnerability in the wild,” urging customers to upgrade to a fixed software release to address the issue. There are currently no workarounds. An anonymous external researcher has been credited with discovering and reporting the bug.

The development has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by February 11, 2026.

The discovery of CVE-2026-20045 comes less than a week after Cisco released updates for another actively exploited critical security vulnerability affecting AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager (CVE-2025-20393, CVSS score: 10.0) that could permit an attacker to execute arbitrary commands with root privileges.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article YouTube TV multiview will finally be ‘fully customizable’ this year YouTube TV multiview will finally be ‘fully customizable’ this year
Next Article Don’t Miss One Of Netflix’s Best Movies Of 2025 With 95% On Rotten Tomatoes – BGR Don’t Miss One Of Netflix’s Best Movies Of 2025 With 95% On Rotten Tomatoes – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Best 75-inch and 77-inch TV for 2025
Best 75-inch and 77-inch TV for 2025
News
Professional cleaner shares the one tool you need to remove limescale buildup in your shower, and it’s not a cleaning spray
Professional cleaner shares the one tool you need to remove limescale buildup in your shower, and it’s not a cleaning spray
News
7 Best Tools to Turn Social Followers into SMS Subscribers |
7 Best Tools to Turn Social Followers into SMS Subscribers |
Computing
Volvo EX60 Gets a NACS Port, 400-Mile Range, Google Gemini AI
Volvo EX60 Gets a NACS Port, 400-Mile Range, Google Gemini AI
News

You Might also Like

7 Best Tools to Turn Social Followers into SMS Subscribers |
Computing

7 Best Tools to Turn Social Followers into SMS Subscribers |

15 Min Read
XIN Summit Launching in Shenzhen — Powered by BEYOND Expo and Spotlighting on GBA’s AI Hardware Innovation · TechNode
Computing

XIN Summit Launching in Shenzhen — Powered by BEYOND Expo and Spotlighting on GBA’s AI Hardware Innovation · TechNode

4 Min Read
Standard Chartered Kenya’s Kariuki Ngari to retire after 24-year career
Computing

Standard Chartered Kenya’s Kariuki Ngari to retire after 24-year career

4 Min Read
Tencent’s WorldMirror 1.1 3D generation model enables single-GPU real-time deployment · TechNode
Computing

Tencent’s WorldMirror 1.1 3D generation model enables single-GPU real-time deployment · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?