PT-2026-3785 · Cisco · Cisco Unified Communications Manager+4

Published

2026-01-21

·

Updated

2026-05-05

·

CVE-2026-20045

CVSS v2.0

10

Critical

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Cisco Unified Communications Manager versions prior to 12.5 (fixed release), 14SU5, and 15SU4 Cisco Unified Communications Manager Session Management Edition versions prior to 12.5 (fixed release), 14SU5, and 15SU4 Cisco Unified Communications Manager IM & Presence Service versions prior to 12.5 (fixed release), 14SU5, and 15SU4 Cisco Unity Connection versions prior to 12.5 (fixed release), 14SU5, and 15SU4 Cisco Webex Calling Dedicated Instance versions prior to 12.5 (fixed release), 14SU5, and 15SU4
Description An improper validation of user-supplied input in HTTP requests allows an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system of an affected device. By sending a sequence of crafted HTTP requests to the web-based management interface, an attacker can obtain user-level access and subsequently elevate privileges to root. This issue has been actively exploited in the wild and is included in CISA's Known Exploited Vulnerabilities catalog. Approximately 1,300 instances of Cisco Unified CM are exposed to the internet.
Recommendations For Cisco Unified Communications Manager, Unified CM SME, Unified CM IM&P, and Webex Calling, update to a fixed release for version 12.5, or apply the 14SU5 or 15SU4 (March 2026) patches. For Cisco Unity Connection, update to a fixed release for version 12.5, or apply the 14SU5 or 15SU4 (March 2026) patches.

Fix

DoS

LPE

RCE

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2026-00706
CVE-2026-20045

Affected Products

Cisco Unified Communications Manager
Cisco Unified Communications Manager Im & Presence Service
Cisco Unified Communications Manager Session Management Edition
Cisco Unity Connection
Cisco Webex Calling Dedicated Instance