Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cisco Patches Critical Vulnerabilities in Contact Center Appliance

Cisco Patches Critical Vulnerabilities in Contact Center Appliance

Posted on November 6, 2025November 6, 2025 By CWS

Cisco on Wednesday introduced patches for practically a dozen vulnerabilities, together with two crucial flaws resulting in distant code execution.

The crucial bugs, tracked as CVE-2025-20354 (CVSS rating of 9.8) and CVE-2025-20358 (CVSS rating of 9.4), affect the Cisco Unified Contact Heart Specific (Unified CCX) equipment.

The primary problem was found within the Java Distant Methodology Invocation (RMI) course of and might be exploited remotely, with out authentication, to add arbitrary information and execute arbitrary instructions with root privileges.

Improper authentication mechanisms related to particular Unified CCX capabilities allow attackers to abuse the Java RMI course of to add a crafted file, permitting them to execute instructions on the underlying working system.

The second defect was found in Unified CCX’s Editor software and might be exploited remotely to bypass authentication and elevate privileges to these of an administrator.

As a result of the communication between the CCX Editor and the Unified CCX server makes use of improper authentication mechanisms, an attacker might redirect the circulation to a malicious server and impersonate Unified CCX, tricking the CCX Editor that the authentication was profitable.

“A profitable exploit might permit the attacker to create and execute arbitrary scripts on the underlying working system of an affected Unified CCX server, as an inside non-root consumer account,” Cisco explains in its advisory.

The issues have been resolved with the discharge of Unified CCX variations 12.5 SU3 ES07 and 15.0 ES01.Commercial. Scroll to proceed studying.

On Wednesday, Cisco additionally launched patches for CVE-2025-20343, a high-severity denial-of-service (DoS) vulnerability in Identification Providers Engine (ISE) that may be exploited remotely, with out authentication.

A logic error within the processing of a RADIUS entry request for a MAC handle that had been beforehand rejected will be exploited by sending a number of crafted requests that may trigger ISE to restart unexpectedly.

Cisco additionally patched eight medium-severity flaws this week. 4 in ISE and ISE Passive Identification Connector (ISE-PIC) that might result in info disclosure or XSS assaults, and 4 in Unified CCX, Unified CCE, Packaged CCE, and CUIC that might result in info disclosure, file exfiltration, command execution, and elevation of privilege to root.

The corporate says it’s not conscious of any of those vulnerabilities being exploited within the wild. Extra info will be discovered on Cisco’s safety advisories web page.

On Wednesday, Cisco additionally up to date the advisories for 2 exploited vulnerabilities in Safe ASA and FTD software program, CVE-2025-20333 and CVE-2025-20362, to warn of a brand new assault variant concentrating on them.

Associated: Apple Patches 19 WebKit Vulnerabilities

Associated: Android Replace Patches Vital Distant Code Execution Flaw

Associated: Cisco Routers Hacked for Rootkit Deployment

Associated: Cisco, Fortinet, Palo Alto Networks Gadgets Focused in Coordinated Marketing campaign

Security Week News Tags:Appliance, Center, Cisco, Contact, Critical, Patches, Vulnerabilities

Post navigation

Previous Post: Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders
Next Post: Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

Related Posts

Google Disrupts IPIDEA Proxy Network  Google Disrupts IPIDEA Proxy Network  Security Week News
GoBruteforcer Botnet Targeting Crypto, Blockchain Projects GoBruteforcer Botnet Targeting Crypto, Blockchain Projects Security Week News
After Goldman, JPMorgan Discloses Law Firm Data Breach After Goldman, JPMorgan Discloses Law Firm Data Breach Security Week News
Broadcom Wi-Fi Chipset Flaw Allows Hackers to Disrupt Networks Broadcom Wi-Fi Chipset Flaw Allows Hackers to Disrupt Networks Security Week News
CISA Warns of SysAid Vulnerability Exploitation CISA Warns of SysAid Vulnerability Exploitation Security Week News
Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities Microsoft Patches Exploited Windows Zero-Day, 111 Other Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News