Urgent: Critical Cisco Unified Communications Vulnerability Exploited, CISA Issues Alert for Immediate Action

Critical Cisco Unified Communications Vulnerability Exploited in Active Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical zero-day remote code execution (RCE) vulnerability identified in multiple Cisco Unified Communications products. This flaw, designated as CVE-2026-20045, is currently being actively exploited by malicious actors, posing a significant threat to organizations utilizing these systems.

Vulnerability Overview

CVE-2026-20045 arises from improper input validation within Cisco’s communication platforms, specifically aligning with CWE-94: Improper Control of Generation of Code. This vulnerability allows attackers to inject malicious code through specially crafted network requests, potentially bypassing authentication mechanisms. Once exploited, the flaw enables the execution of arbitrary code within the context of the vulnerable service, leading to full root privilege escalation on the underlying operating system.

CISA confirmed active exploitation of this vulnerability in the wild, prompting its addition to the Known Exploited Vulnerabilities (KEV) catalog on January 21, 2026. Federal agencies are mandated to apply necessary mitigations by February 11, 2026, or discontinue the use of affected products to prevent potential compromises.

Affected Products

The vulnerability impacts several Cisco Unified Communications products, including:

– Cisco Unified Communications Manager (Unified CM)
– Cisco Unified Communications Manager Session Management Edition (Unified CM SME)
– Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P)
– Cisco Unity Connection
– Cisco Webex Calling Dedicated Instance

These products are integral to enterprise voice and collaboration environments and often have management interfaces exposed to the internet, increasing the risk of exploitation.

Attack Vectors and Exploitation Details

Attackers can exploit this vulnerability remotely without authentication by sending malformed packets to exposed services such as CTI Manager or AXLE services. Upon successful injection, the malicious code executes within the web server process’s context, allowing attackers to establish persistence through cron jobs or backdoors. Subsequent privilege escalation to root access is achieved via known local privilege escalation paths.

Early indicators suggest that threat actors are combining this vulnerability with phishing campaigns or supply-chain compromises to target call centers and Unified Communications as a Service (UCaaS) providers.

Mitigation and Remediation

Cisco has released advisories confirming that the vulnerability affects on-premises deployments, with no available workarounds beyond applying patches. Organizations are urged to upgrade to the following patched versions immediately:

1. Unified CM: Release 14SU2.7 or later
2. Unity Connection: 14SU2.7 or later
3. IM&P: 14SU3 or later

CISA emphasizes the adoption of zero-trust principles, advising organizations to assume potential breaches and actively hunt for indicators of compromise, such as unexpected root processes or injected web shells.

Implications and Recommendations

This zero-day vulnerability highlights the persistent risks associated with legacy Unified Communications infrastructure, where delayed patching can leave organizations vulnerable to ransomware attacks or espionage activities. While no public proof-of-concept exploits are currently available, reports indicate that exploits are being sold on underground forums. Security teams should regularly consult CISA’s KEV catalog and Cisco’s Product Security Incident Response Team (PSIRT) for the latest updates and guidance.

Organizations are advised to:

– Apply the recommended patches without delay.
– Restrict access to management interfaces to trusted IP addresses through firewall configurations.
– Monitor system logs for unusual activity, such as anomalous HTTP requests or unexpected processes.
– Implement comprehensive security measures, including network segmentation and regular vulnerability assessments.

By taking these proactive steps, organizations can mitigate the risks associated with CVE-2026-20045 and enhance their overall cybersecurity posture.