Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是思科发布了新的补丁,修复了一个被描述为“关键”的安全漏洞。这个漏洞影响了多个统一通信产品和Webex Calling Dedicated Instance,并且已经被作为零日漏洞在野外被积极利用。 漏洞的编号是CVE-2026-20045,CVSS评分为8.2。它允许未经身份验证的远程攻击者在易受攻击设备的操作系统上执行任意命令。思科解释说,这是因为HTTP请求中用户提供的输入没有得到适当的验证。攻击者可以通过发送一系列精心制作的HTTP请求来利用这个漏洞,最终获得用户级别的访问权限,并提升到root权限。 由于漏洞可能导致权限提升到root,所以被评为“关键”。受影响的产品包括Unified CM、Session Management Edition、IM & Presence Service、Unity Connection和Webex Calling Dedicated Instance。 思科已经发布了针对不同版本的补丁和更新版本,建议用户升级软件以修复问题。此外,美国网络安全和基础设施安全局(CISA)已将此漏洞加入其已知被利用的漏洞目录,并要求联邦民事行政部门机构在2026年2月11日前应用补丁。 文章还提到,这个漏洞是在思科修复另一个关键漏洞(CVE-2025-20393)之后不久发现的。 现在我需要把这些信息浓缩到100字以内。重点包括:思科修复了关键漏洞CVE-2026-20045,影响多个产品;该漏洞允许远程代码执行和提权;已被零日利用;建议升级软件;CISA已采取行动。 确保语言简洁明了,不使用任何开头词如“这篇文章总结了...”。 </think> 思科修复了关键安全漏洞CVE-2026-20045,影响其统一通信及Webex产品。该漏洞允许远程攻击者执行任意代码并提权至root。思科已发布补丁,并建议用户升级软件以应对零日威胁。美国CISA已将此漏洞列为已知被利用的高风险漏洞。 2026-1-22 04:6:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Cisco has released fresh patches to address what it described as a "critical" security vulnerability impacting multiple Unified Communications (CM) products and Webex Calling Dedicated Instance that it has been actively exploited as a zero-day in the wild.

The vulnerability, CVE-2026-20045 (CVSS score: 8.2), could permit an unauthenticated remote attacker to execute arbitrary commands on the underlying operating system of a susceptible device.

"This vulnerability is due to improper validation of user-supplied input in HTTP requests," Cisco said in an advisory. "An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root."

Cybersecurity

The critical rating for the flaw is due to the fact that its exploitation could allow for privilege escalation to root, it added. The vulnerability impacts the following products -

  • Unified CM
  • Unified CM Session Management Edition (SME)
  • Unified CM IM & Presence Service (IM&P)
  • Unity Connection
  • Webex Calling Dedicated Instance

It has been addressed in the following versions -

Cisco Unified CM, CM SME, CM IM&P, and Webex Calling Dedicated Instance -

  • Release 12.5 - Migrate to a fixed release
  • Release 14 - 14SU5 or apply patch file: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512
  • Release 15 - 15SU4 (Mar 2026) or apply patch file: ciscocm.V15SU2_CSCwr21851_remote_code_v1.cop.sha512 or ciscocm.V15SU3_CSCwr21851_remote_code_v1.cop.sha512

Cisco Unity Connection

  • Release 12.5 - Migrate to a fixed release
  • Release 14 - 14SU5 or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512
  • Release 15 - 15SU4 (Mar 2026) or apply patch file: ciscocm.cuc.CSCwr29208_C0266-1.cop.sha512

Cybersecurity

The networking equipment major also said it's "aware of attempted exploitation of this vulnerability in the wild," urging customers to upgrade to a fixed software release to address the issue. There are currently no workarounds. An anonymous external researcher has been credited with discovering and reporting the bug.

The development has prompted the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by February 11, 2026.

The discovery of CVE-2026-20045 comes less than a week after Cisco released updates for another actively exploited critical security vulnerability affecting AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager (CVE-2025-20393, CVSS score: 10.0) that could permit an attacker to execute arbitrary commands with root privileges.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html
如有侵权请联系:admin#unsafe.sh