Cisco released emergency patches on January 22, 2026, for CVE-2026-20045, a critical remote code execution vulnerability in Unified Communications Manager and related products. The flaw was already being exploited in the wild before disclosure—a true zero-day.

Vulnerability overview

AttributeValue
CVECVE-2026-20045
CVSS9.8 (Critical)
EPSS1.76%
CWECWE-20 (Improper Input Validation)
Attack vectorNetwork (unauthenticated)
User interactionNone required
Exploit complexityLow
CISA KEV addedJanuary 21, 2026
Federal remediation deadlineFebruary 11, 2026

Technical details

The vulnerability stems from inadequate validation of user-supplied input in HTTP requests to the web-based management interface.

Attack chain

PhaseAction
1Attacker sends crafted HTTP requests to management interface
2Input validation bypass achieved
3Authentication controls circumvented
4Commands executed at user level
5Privilege escalation to root

“This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.” — Cisco Security Advisory

Exploitation requirements

RequirementDetails
AuthenticationNot required
Network accessManagement interface reachable
User interactionNone
ComplexityLow (PoC code circulating)

Full system compromise achievable in a single exploit chain.

Affected products

ProductVulnerableFixed version
Cisco Unified Communications Manager (Unified CM)Yes14SU5, 15SU4
Unified CM Session Management Edition (SME)Yes14SU5, 15SU4
Unified CM IM & Presence ServiceYes14SU5, 15SU4
Cisco Unity ConnectionYes14SU5, 15SU4
Webex Calling Dedicated InstanceYesContact Cisco

Version matrix

VersionStatusRemediation
Release 12.5VulnerableNo patch available—migration required
Release 14 below SU5VulnerableUpgrade to 14SU5
Release 14SU5+Fixed
Release 15 below SU4VulnerableUpgrade to 15SU4
Release 15SU4+Fixed

Patch file for Release 14: ciscocm.V14SU4a_CSCwr21851_remote_code_v1.cop.sha512

Active exploitation

Confirmation

SourceStatus
CiscoConfirmed exploitation prior to disclosure
SOC PrimePoC code circulating on underground forums
CISAAdded to KEV catalog

Exposure assessment

MetricValue
Internet-exposed Unified CM instances~1,300 globally
US-based instances~50%
Highest riskUnpatched 12.5 or 14 releases

The cybersecurity search engine Hunter identified roughly 1,300 internet-exposed Unified CM instances globally, with nearly half located in the United States.

Potential attribution

While Cisco hasn’t publicly attributed the attacks, SOC Prime noted patterns resembling UAT-9686, a China-backed APT:

IndicatorAssessment
Tooling patternsSimilar to prior Cisco AsyncOS campaigns
Infrastructure overlapPossible shared C2 infrastructure
Target profileEnterprise communications systems
Attribution confidenceModerate

Impact of compromise

Cisco Unified Communications products handle sensitive internal voice and data traffic. A compromised UC server enables attackers to:

CapabilityRisk
Call interceptionAccess to voice communications
Voicemail accessHistorical and current messages
Lateral movementServer as network foothold
Data exfiltrationCall logs, presence information
Service disruptionDegraded or disabled communications
Credential theftLDAP/AD credentials on UC servers

Business impact

ScenarioConsequence
Executive call interceptionCorporate espionage
Voicemail accessSensitive information exposure
Communications outageBusiness disruption
Network pivotFurther compromise

Remediation

Critical: No workaround exists

Cisco strongly recommends immediate patching. There is no configuration change or mitigation that addresses this vulnerability.

Immediate actions

PriorityAction
CriticalUpgrade to 14SU5 or 15SU4
CriticalApply patch files if full upgrade delayed
CriticalMigrate from Release 12.5 (no direct patch)
HighRestrict management interface to trusted networks
HighMonitor for anomalous activity

If running Release 12.5

SituationAction required
Release 12.5 deployedMust migrate to newer release branch
No direct patch12.5 is not patchable
TimelineImmediate migration recommended

Network controls

ControlPurpose
Firewall management accessRestrict to admin networks only
VPN requirementNo direct internet exposure
Network segmentationIsolate UC infrastructure
ACLsLimit source IPs for management

Detection

Indicators to monitor

IndicatorDetection method
Unusual HTTP requests to management interfacesWeb logs
Unexpected privilege escalationSystem logs
New administrative accountsConfiguration audit
Configuration changesChange monitoring
Unfamiliar IP connectionsNetwork monitoring

MITRE ATT&CK mapping

TechniqueID
Exploit Public-Facing ApplicationT1190
Valid AccountsT1078
Command and Scripting InterpreterT1059
Privilege EscalationT1068

CISA guidance

CISA added CVE-2026-20045 to the Known Exploited Vulnerabilities catalog on January 21, 2026.

RequirementDetails
Federal agenciesMust remediate by February 11, 2026
Recommended for allTreat as critical priority
ValidationConfirm patch application
MonitoringAssume breach if exposed during vulnerability window

Recommendations

For organizations running Cisco UC

PriorityAction
ImmediateInventory all Cisco UC deployments
ImmediateVerify version and patch status
CriticalApply patches or migrate from 12.5
HighAudit for signs of compromise
HighRestrict management interface access

For security teams

PriorityAction
HighHunt for exploitation indicators
HighReview access logs for management interfaces
HighVerify no unauthorized admin accounts
OngoingMonitor Cisco PSIRT advisories

Compromise assessment

If systems were exposed during the vulnerability window:

ActionPurpose
Review admin accountsIdentify unauthorized additions
Check configuration changesDetect tampering
Analyze network logsIdentify suspicious connections
Consider forensic analysisFull compromise assessment

Context

Organizations should treat any internet-exposed Unified CM instance as potentially compromised until patched and audited. The combination of pre-disclosure exploitation, low attack complexity, and high-value target (enterprise communications) makes this vulnerability particularly dangerous.

The lack of any workaround means patching is the only remediation option. Organizations still running Release 12.5 face forced migration to maintain security—a potentially complex undertaking that should begin immediately.