Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco Unified Contact Center Express Vulnerabilities Enables Remote Code Execution Attacks

Posted on December 18, 2025December 18, 2025 By CWS

A essential safety advisory addressing a number of extreme vulnerabilities in Cisco Unified Contact Heart Specific (Unified CCX).

That would permit unauthenticated distant attackers to execute arbitrary instructions and compromise affected programs.

The vulnerabilities had been disclosed on November 5, 2025, with the advisory up to date on November 13, 2025. Two distinct vulnerabilities have been recognized within the Java Distant Technique Invocation (RMI) strategy of Unified CCX.

CVE IDAffected ComponentCVSSImpactCVE-2025-20354Cisco Unified CCX (Java RMI)9.8Allows unauthenticated attackers to add recordsdata and run instructions as rootCVE-2025-20358Cisco Unified CCX Editor9.4Let attackers bypass login and acquire admin entry for script execution

The primary vulnerability, tracked as CVE-2025-20354, allows attackers to add malicious recordsdata and execute arbitrary instructions with root privileges on affected programs.

This flaw stems from improper authentication mechanisms related to particular Unified CCX options.

Attackers can exploit the vulnerability by importing crafted recordsdata by way of Java RMI with out authentication, gaining full system management.

The second vulnerability, CVE-2025-20358, exists within the CCX Editor software and permits attackers to bypass authentication to acquire administrative permissions for script creation and execution.

Attackers can redirect the authentication movement to malicious servers, tricking the CCX Editor into believing authentication was profitable.

This allows them to create and execute arbitrary scripts on the underlying working system. Each vulnerabilities carry a Important safety influence ranking. CVE-2025-20354 has a CVSS rating of 9.8.

Whereas CVE-2025-20358 carries a CVSS rating of 9.4, no workarounds can be found for both vulnerability.

Impression and Affected Variations

The vulnerabilities have an effect on Cisco Unified CCX no matter machine configuration.

Cisco Unified Contact Heart Enterprise (Unified CCE) and Packaged Contact Heart Enterprise (Packaged CCE) aren’t affected.

Susceptible variations embrace Cisco Unified CCX 12.5 SU3 and earlier, in addition to model 15.0. Cisco has launched fastened software program addressing these points: model 12.5 SU3 ES07 for the 12.5 department and model 15.0 ES01 for the 15.0 department.

Cisco strongly recommends upgrading to the most recent patched variations of software program. Organizations ought to prioritize updating Unified CCX deployments to mitigate the danger of distant code execution assaults.

The vulnerabilities had been reported by safety researcher Jahmel Harris of NATO Cyber Safety Centre (NCSC). At the moment, Cisco isn’t conscious of any public exploits or lively malicious use of those vulnerabilities within the wild.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:Attacks, Center, Cisco, Code, Contact, Enables, Execution, Express, Remote, Unified, Vulnerabilities

Post navigation

Previous Post: Microsoft Confirms Recent Windows 11 24H2/25H2 and Server 2025 Update Breaks RemoteApp Connections
Next Post: HPE OneView Software Vulnerability Let Attackers Execute Remote Code

Related Posts

22.2 Tbps DDoS Attack Breaks Internet With New World Record Cyber Security News
Developers Beware of npm Phishing Email That Steal Your Login Credentials Cyber Security News
RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools Cyber Security News
Massive Cyber-Attack Attacking macOS Users via GitHub Pages to Deliver Stealer Malware Cyber Security News
Microsoft Exchange Online Service Down Cyber Security News
AI-Powered Cybersecurity Tools Can Be Turned Against Themselves Through Prompt Injection Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark