Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Warns of Hardcoded Credentials in Enterprise Software

Posted on July 3, 2025July 3, 2025 By CWS

Cisco on Wednesday introduced patches for a crucial vulnerability in its Unified CM and Unified CM SME communication administration software program that might enable attackers to log in as the basis account.

The problem, tracked as CVE-2025-20309 (CVSS rating of 10/10), exists as a result of the enterprise administration instruments include default, static credentials that may not be eliminated or modified.

“This vulnerability is as a result of presence of static person credentials for the basis account which can be reserved to be used throughout improvement,” Cisco explains in its advisory.

An attacker may use the account to log in to a weak system and execute arbitrary instructions with root privileges, the tech large warns.

Unified CM and Unified CM SME Engineering Particular (ES) variations 15.0.1.13010-1 via 15.0.1.13017-1 are affected, whatever the system’s configuration.

Cisco has launched a path file that addresses the problem and can embrace the repair in Unified CM and Unified CM SME launch 15SU3, which is predicted to roll out this month.

In keeping with the corporate, profitable exploitation of the bug ought to present a log entry for the basis person in var/log/lively/syslog/safe. Organizations ought to retrieve the logs to hunt for potential compromise. Nevertheless, Cisco says it isn’t conscious of this vulnerability being exploited within the wild.

On Wednesday, the tech large additionally introduced patches for 3 medium-severity vulnerabilities affecting Areas Connector, Enterprise Chat and Electronic mail (ECE), and BroadWorks Software Supply Platform, which may result in privilege escalation and XSS assaults.Commercial. Scroll to proceed studying.

Cisco says it has not seen these safety defects being exploited in assaults both. Further data could be discovered on Cisco’s safety advisories web page.

Security Week News Tags:Cisco, Credentials, Enterprise, Hardcoded, Software, Warns

Post navigation

Previous Post: Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
Next Post: Undetectable Android Spyware Backfires, Leaks 62,000 User Logins

Related Posts

CrowdStrike Plans Layoffs to Pursue $10B ARR Target Security Week News
Canadian Electric Utility Lists Customer Information Stolen by Hackers Security Week News
High-Severity Vulnerabilities Patched by Cisco, Atlassian Security Week News
Clorox Sues Cognizant for $380 Million Over 2023 Hack Security Week News
Cyberattack Targets International Criminal Court Security Week News
HPE Patches Critical Vulnerability in StoreOnce Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Elastic Refutes Claims of Zero-Day in EDR Product

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News