PT-2025-27659 · Cisco · Cisco Unified Communications Manager +1
Published
2025-07-02
·
Updated
2025-08-02
·
CVE-2025-20309
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cisco Unified Communications Manager (Unified CM) versions 15.0.1.13010-1 through 15.0.1.13017-1
Cisco Unified Communications Manager Session Management Edition (Unified CM SME) versions 15.0.1.13010-1 through 15.0.1.13017-1
**Description:**
A vulnerability exists in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) that could allow an unauthenticated, remote attacker to log in to an affected device using the root account. This is due to the presence of static, hardcoded credentials for the root account, which were reserved for development purposes and cannot be modified or deleted. Successful exploitation could grant the attacker root access and the ability to execute arbitrary commands on the system. This vulnerability is actively exploited.
**Recommendations:**
Update Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) to version 15SU3 or apply the CSCwp27755 patch immediately.
Fix
RCE
Using Hardcoded Credentials
Weakness Enumeration
Related Identifiers
Affected Products
References · 84
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-20309 · Security Note
- https://bdu.fstec.ru/vul/2025-07942 · Security Note
- https://twitter.com/sekurlsa_pw/status/1941272649516413104 · Twitter Post
- https://twitter.com/shah_sheikh/status/1940728889795309735 · Twitter Post
- https://twitter.com/modat_magnify/status/1940740400206979583 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1940744503951847788 · Twitter Post
- https://twitter.com/TechNadu/status/1941142811140624672 · Twitter Post
- https://twitter.com/sekurlsa_pw/status/1940747944124395670 · Twitter Post
- https://twitter.com/rapidriskradar/status/1943318891163275469 · Twitter Post
- https://twitter.com/helpnetsecurity/status/1940730934783025183 · Twitter Post
- https://twitter.com/Strivehawk/status/1940676446097494371 · Twitter Post
- https://t.me/proxy_bar/2664 · Telegram Post
- https://twitter.com/INTERCERTUSA/status/1944727893210443979 · Twitter Post
- https://twitter.com/ScyScan/status/1940734171401670799 · Twitter Post