8.2 CVE-2026-20045
CISA Kev Catalog
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.
This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.
Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.
https://nvd.nist.gov/vuln/detail/CVE-2026-20045
Categories
CWE-94
References
134c704f-9b21-4f2e-91b3-4a467353bcc0
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-20... US Government Resource |
psirt@cisco.com
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:* | >= 12.5 | < 14su5 |
| cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:* | >= 12.5 | < 14su5 |
| cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:* | >= 15.0 | <= 15su3a |
| cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:* | >= 15.0 | <= 15su3a |
| cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:* | >= 12.5 | < 14su5 |
| cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:* | >= 15.0 | <= 15su3a |
| cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:* | >= 12.5 | < 14su5 |
| cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:* | >= 15.0 | <= 15su3 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
