Governance & Risk Management
,
Network Firewalls, Network Access Control
,
Patch Management
Vendor Ships Emergency Fixes, Warning Flaw Facilitates Full System Compromise

Hackers discovered a zero-day vulnerability in Cisco networking gear, a flaw the networking giant warns affects all its Unified Communications products and that facilitates remote code execution, risking full system compromise.
See Also: On Demand | From Patch to Prevention: Modernizing Remediation Across Hybrid Environments
Cisco on Thursday warned that short of updating software with an emergency patch, no other mitigations or workarounds exist to address the flaw, tracked as CVE-2026-20045.
“This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device,” the alert says.
Cisco said hackers have attempted to exploit the vulnerability.
The U.S. Cybersecurity and Infrastructure Security Agency on Wednesday added CVE-2026-20045 to its Known Exploited Vulnerabilities catalog, setting a Feb. 11 deadline for federal civilian agencies to patch the flaw, mitigate it or temporarily discontinue using affected Cisco Unified Communications gear.
Cisco gear has been at the center of a number of high profile hacks, whether because of zero-day flaws, its devices going years without patches or slipping into a misconfigured state. Chinese nation-state threat group widely tracked as Salt Typhoon exploited Cisco routers to penetrate U.S. telecoms, although the manufacturer’s cybersecurity arm has stressed that Chinese hackers didn’t appear to have used zero-days in the campaign, relying instead on stolen login credentials, living-off-the-land techniques and a custom utility that facilitated lateral movement inside penetrated networks.
The manufacturer pledged late last year to do better on cybersecurity by proactively warning customers who insecurely configure their equipment and making secure configurations the default (see: Cisco Pledges More Security in Network Equipment).
Who is exploiting the latest flaw isn’t clear. “Observed exploitation behavior points to attackers scanning for exposed or poorly secured Unified Communications management interfaces and abusing unauthenticated HTTP access to gain a foothold,” said cybersecurity firm SOCRadar.
While Cisco assigned a high CVSS score of 8.2 to CVE-2026-20045, the vendor said it’s classifying the vulnerability as having a critical impact rating because by exploiting the flaw, an attacker could first obtain user-level access to the underlying operating system and then elevate their privileges to root, facilitating a complete system compromise and takeover.
The vulnerability exists in these five products: Unified CM, Unified CM Manager Session Management Edition, Unified CM Manager IM & Presence Service, Unity Connection and WebEx Calling Dedicated Instance.
Cisco has released separate patches for versions 14 and 15 of each affected product. No fixes are being released for 12.5 versions of the products, with Cisco telling customers they must “migrate to a fixed release.”
A range of other communications products have been tested and do not have the vulnerability, Cisco said. These include Contact Center SIP Proxy, Customer Collaboration Platform, Emergency Responder, Finesse, Packaged Contact Center Enterprise, Prime Collaboration Deployment Unified Contact Center – both Enterprise and Express versions – as well as Unified Intelligence Center, among others.
One risk posed by any compromise of unified communications systems is that attackers could spy on employees and their customer interactions across multiple channels, including voice, video and text. “A successful compromise can lead to service disruption, unauthorized access to internal systems, data exposure or the deployment of persistent backdoors,” SOCRadar said.
Cisco’s unified communications and collaboration offerings compete with market heavyweight Microsoft, which controls nearly half of the market, followed distantly by Zoom and Cisco. Market researcher IDC forecasts the unified communications market will be worth $85 billion by 2028, bolstered in part by the rise of artificial intelligence capabilities.
The fresh Cisco zero-day flaw is only the latest critical vulnerability in widely used tools to have been discovered and patched, and which is already under fire by attackers.
Cisco only weeks ago published fixes for a newly found vulnerability in its Identity Services Engine and ISE Passive Identity Connector access control platform tools. The flaw, tracked as CVE-2026-20029, “could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information,” Cisco warned in a Jan. 7 security alert.
Proof-of-concept exploit code for the flaw has been published (see: No Rest in 2026 as Patch Alerts Amass for Cisco, HPE and n8n).
