Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Unified Contact Center Express Vulnerabilities Enables Remote Code Execution Attacks

Cisco Unified Contact Center Express Vulnerabilities Enables Remote Code Execution Attacks

Posted on December 18, 2025December 18, 2025 By CWS

A essential safety advisory addressing a number of extreme vulnerabilities in Cisco Unified Contact Heart Specific (Unified CCX).

That would permit unauthenticated distant attackers to execute arbitrary instructions and compromise affected programs.

The vulnerabilities had been disclosed on November 5, 2025, with the advisory up to date on November 13, 2025. Two distinct vulnerabilities have been recognized within the Java Distant Technique Invocation (RMI) strategy of Unified CCX.

CVE IDAffected ComponentCVSSImpactCVE-2025-20354Cisco Unified CCX (Java RMI)9.8Allows unauthenticated attackers to add recordsdata and run instructions as rootCVE-2025-20358Cisco Unified CCX Editor9.4Let attackers bypass login and acquire admin entry for script execution

The primary vulnerability, tracked as CVE-2025-20354, allows attackers to add malicious recordsdata and execute arbitrary instructions with root privileges on affected programs.

This flaw stems from improper authentication mechanisms related to particular Unified CCX options.

Attackers can exploit the vulnerability by importing crafted recordsdata by way of Java RMI with out authentication, gaining full system management.

The second vulnerability, CVE-2025-20358, exists within the CCX Editor software and permits attackers to bypass authentication to acquire administrative permissions for script creation and execution.

Attackers can redirect the authentication movement to malicious servers, tricking the CCX Editor into believing authentication was profitable.

This allows them to create and execute arbitrary scripts on the underlying working system. Each vulnerabilities carry a Important safety influence ranking. CVE-2025-20354 has a CVSS rating of 9.8.

Whereas CVE-2025-20358 carries a CVSS rating of 9.4, no workarounds can be found for both vulnerability.

Impression and Affected Variations

The vulnerabilities have an effect on Cisco Unified CCX no matter machine configuration.

Cisco Unified Contact Heart Enterprise (Unified CCE) and Packaged Contact Heart Enterprise (Packaged CCE) aren’t affected.

Susceptible variations embrace Cisco Unified CCX 12.5 SU3 and earlier, in addition to model 15.0. Cisco has launched fastened software program addressing these points: model 12.5 SU3 ES07 for the 12.5 department and model 15.0 ES01 for the 15.0 department.

Cisco strongly recommends upgrading to the most recent patched variations of software program. Organizations ought to prioritize updating Unified CCX deployments to mitigate the danger of distant code execution assaults.

The vulnerabilities had been reported by safety researcher Jahmel Harris of NATO Cyber Safety Centre (NCSC). At the moment, Cisco isn’t conscious of any public exploits or lively malicious use of those vulnerabilities within the wild.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:Attacks, Center, Cisco, Code, Contact, Enables, Execution, Express, Remote, Unified, Vulnerabilities

Post navigation

Previous Post: Microsoft Confirms Recent Windows 11 24H2/25H2 and Server 2025 Update Breaks RemoteApp Connections
Next Post: HPE OneView Software Vulnerability Let Attackers Execute Remote Code

Related Posts

UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled Cyber Security News
Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Hackers Exploiting GeoServer RCE Vulnerability to Deploy CoinMiner Cyber Security News
CISA Warns of Rails Ruby on Rails Path Traversal Vulnerability Exploited in Attacks CISA Warns of Rails Ruby on Rails Path Traversal Vulnerability Exploited in Attacks Cyber Security News
Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks Cyber Security News
224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads 224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads Cyber Security News
DataCenter Fire Takes 600+ South Korean Government Websites Offline DataCenter Fire Takes 600+ South Korean Government Websites Offline Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News