Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Posted on January 22, 2026January 22, 2026 By CWS

Ravie LakshmananJan 22, 2026Vulnerability / Zero-Day
Cisco has launched contemporary patches to deal with what it described as a “crucial” safety vulnerability impacting a number of Unified Communications (CM) merchandise and Webex Calling Devoted Occasion that it has been actively exploited as a zero-day within the wild.
The vulnerability, CVE-2026-20045 (CVSS rating: 8.2), may allow an unauthenticated distant attacker to execute arbitrary instructions on the underlying working system of a inclined system.
“This vulnerability is because of improper validation of user-supplied enter in HTTP requests,” Cisco stated in an advisory. “An attacker may exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based administration interface of an affected system. A profitable exploit may permit the attacker to acquire user-level entry to the underlying working system after which elevate privileges to root.”

The crucial ranking for the flaw is because of the truth that its exploitation may permit for privilege escalation to root, it added. The vulnerability impacts the next merchandise –

Unified CM
Unified CM Session Administration Version (SME)
Unified CM IM & Presence Service (IM&P)
Unity Connection
Webex Calling Devoted Occasion

It has been addressed within the following variations –
Cisco Unified CM, CM SME, CM IM&P, and Webex Calling Devoted Occasion –

Launch 12.5 – Migrate to a set launch
Launch 14 – 14SU5 or apply patch file: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
Launch 15 – 15SU4 (Mar 2026) or apply patch file: ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512 or ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512

Cisco Unity Connection

Launch 12.5 – Migrate to a set launch
Launch 14 – 14SU5 or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
Launch 15 – 15SU4 (Mar 2026) or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512

The networking gear main additionally stated it is “conscious of tried exploitation of this vulnerability within the wild,” urging clients to improve to a set software program launch to deal with the problem. There are at the moment no workarounds. An nameless exterior researcher has been credited with discovering and reporting the bug.
The event has prompted the U.S. Cybersecurity and Infrastructure Safety Company (CISA) so as to add CVE-2026-20045 to its Recognized Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Government Department (FCEB) companies to use the fixes by February 11, 2026.
The invention of CVE-2026-20045 comes lower than per week after Cisco launched updates for an additional actively exploited crucial safety vulnerability affecting AsyncOS Software program for Cisco Safe E mail Gateway and Cisco Safe E mail and Internet Supervisor (CVE-2025-20393, CVSS rating: 10.0) that would allow an attacker to execute arbitrary instructions with root privileges.

The Hacker News Tags:Actively, Cisco, CVE202620045, Exploited, Fixes, Unified, Webex, ZeroDay

Post navigation

Previous Post: Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access
Next Post: Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Related Posts

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker News
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions The Hacker News
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera The Hacker News
TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order The Hacker News
Securing CI/CD workflows with Wazuh Securing CI/CD workflows with Wazuh The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News