Cisco fixes Unified Communications RCE zero day exploited in attacks
嗯,用户让我用中文帮他总结一下这篇文章的内容,控制在一百个字以内。他不需要以“文章内容总结”或者“这篇文章”这样的开头,直接写描述即可。好的,我得先仔细阅读一下文章内容。 文章主要讲的是Cisco修复了一个关键的漏洞,编号是CVE-2026-20045。这个漏洞已经被作为零日漏洞被积极利用了。影响的产品包括Unified Communications Manager、Session Management Edition、IM & Presence、Unity Connection和Webex Calling Dedicated Instance。 漏洞的原因是HTTP请求中用户提供的输入没有被正确验证。攻击者可以发送一系列精心构造的HTTP请求到管理界面,从而获得用户级别的操作系统访问权限,并进一步提升到root权限。CVSS评分为8.2,Cisco将其定为Critical级别。 Cisco已经发布了软件更新和补丁文件来修复这个漏洞,并且确认已经有在野的利用尝试。CISA也将这个漏洞加入到了已知被利用的漏洞目录中,并要求联邦机构在2026年2月11日前完成更新。 用户的需求是总结内容,控制在100字以内。我需要抓住关键点:Cisco修复了CVE-2026-20045漏洞,这是一个远程代码执行漏洞,已被零日攻击利用,影响多个产品,CVSS评分8.2,Critical级别,建议升级软件。 </think> Cisco修复了编号为CVE-2026-20045的关键远程代码执行漏洞,该漏洞已被作为零日漏洞用于攻击。该漏洞影响多个统一通信和Webex Calling产品,CVSS评分为8.2,可导致攻击者获得root权限。 Cisco已发布补丁,并建议用户尽快升级软件以应对已观测到的在野攻击活动。 2026-1-21 22:30:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Cisco

Cisco has fixed a critical Unified Communications and Webex Calling remote code execution vulnerability, tracked as CVE-2026-20045, that has been actively exploited as a zero-day in attacks.

Tracked as CVE-2026-20045, the flaw impacts Cisco Unified Communications Manager (Unified CM), Unified CM Session Management Edition (SME), Unified CM IM & Presence, Cisco Unity Connection, and Webex Calling Dedicated Instance.

"This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device," warns Cisco's advisory.

Wiz

"A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root."

While the vulnerability has a CVSS score of 8.2, Cisco assigned it a Critical severity rating, as exploitation leads to root access on servers.

Cisco has released the following software updates and patch files to address the vulnerability:

Cisco Unified CM, Unified CM IM&P, Unified CM SME, and Webex Calling Dedicated Instance Release:

Version First Fixed Release
12.5 Migrate to a fixed release.
14 14SU5 or apply patch file:
ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
15 15SU4 (Mar 2026) or apply patch file:
ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512
ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512

Cisco Unity Connection Release:

Version First Fixed Release
12.5 Migrate to a fixed release.
14 14SU5 or apply patch file:
ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
15 15SU4 (Mar 2026) or apply patch file:
ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512

The company says the patches are version specific, so the README should be reviewed before applying patches.

Cisco's Product Security Incident Response Team (PSIRT) has confirmed that attempts to exploit the flaw have been observed in the wild, urging customers to upgrade to the latest software as soon as possible.

The company also said there are no workarounds that can mitigate the flaw without installing updates.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) Catalog and given federal agencies until February 11, 2026, to deploy updates.

Earlier this month, Cisco patched a Identity Services Engine (ISE) vulnerability with public proof-of-concept exploit code and a AsyncOS zero-day exploited since November.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/cisco-fixes-unified-communications-rce-zero-day-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh