Article Details

Original Article Text

Click to Toggle View

Critical Cisco UCCX flaw lets attackers run commands as root. Cisco has released security updates to patch a critical vulnerability in the Unified Contact Center Express (UCCX) software, which could enable attackers to execute commands with root privileges. The Cisco UCCX platform, described by the company as a "contact center in a box," is a software solution for managing customer interactions in call centers, supporting up to 400 agents. Tracked as CVE-2025-20354, this security flaw was discovered in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX by security researcher Jahmel Harris, allowing unauthenticated attackers to execute arbitrary commands remotely with root permissions. "This vulnerability is due to improper authentication mechanisms that are associated to specific Cisco Unified CCX features," Cisco explained in a Wednesday security advisory. "An attacker could exploit this vulnerability by uploading a crafted file to an affected system through the Java RMI process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root." Yesterday, Cisco also patched a critical security flaw in the Contact Center Express (CCX) Editor application of Cisco UCCX, which allows unauthenticated attackers to remotely bypass authentication and create and execute arbitrary scripts with admin permissions. This can be exploited by tricking the CCX Editor app into believing the authentication process was successful after redirecting the auth flow to a malicious server. IT admins are advised to upgrade their Cisco UCCX software to one of the fixed releases listed in the table below as soon as possible. While the vulnerabilities affect Cisco Unified CCX software regardless of device configuration, the Cisco Product Security Incident Response Team (PSIRT) has yet to find evidence of publicly available exploit code or that the two critical security flaws have been exploited in the wild. On Wednesday, the tech giant also warned of a high-severity vulnerability (CVE-2025-20343) impacting its Cisco Identity Services Engine (ISE) identity-based network access control and policy enforcement software. This vulnerability allows unauthenticated, remote attackers to trigger a denial-of-service (DoS) condition, causing unpatched appliances to restart unexpectedly. Four other security flaws in Cisco Contact Center products (CVE-2025-20374, CVE-2025-20375, CVE-2025-20376, and CVE-2025-20377) can be exploited by attackers with high-level privileges to gain root permissions, execute arbitrary commands, access sensitive information, or download arbitrary files. Earlier this year, Cisco addressed a Cisco ISE vulnerability that also allowed threat actors to run commands as root on vulnerable appliances, months after patching another ISE flaw that enabled root privilege escalation. In September, CISA issued a new emergency directive ordering U.S. federal agencies to secure Cisco firewall devices on their networks against two flaws (CVE-2025-20333 and CVE-2025-20362) that have been exploited in zero-day attacks. Days later, the threat monitoring service Shadowserver found over 50,000 Internet-exposed Cisco ASA and FTD firewall appliances that were left unpatched. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.

Daily Brief Summary

VULNERABILITIES // Cisco Patches Critical Vulnerabilities in Unified Contact Center Express

Cisco has issued security updates for two critical vulnerabilities in its Unified Contact Center Express (UCCX) software, potentially allowing attackers to execute commands with root privileges.

The flaws, identified as CVE-2025-20354 and CVE-2025-20343, affect the Java RMI process and the CCX Editor application, enabling unauthorized remote command execution.

Cisco's advisory explains these vulnerabilities stem from inadequate authentication mechanisms, which attackers could exploit by uploading crafted files or redirecting authentication flows.

Although no public exploit code or active exploitation has been detected, Cisco urges immediate software upgrades to the fixed releases to mitigate risks.

Additional high-severity vulnerabilities in Cisco Contact Center products and the Identity Services Engine (ISE) could lead to denial-of-service conditions or unauthorized access.

The Cisco Product Security Incident Response Team (PSIRT) is actively monitoring the situation, with no indications of these vulnerabilities being exploited in the wild.

This incident follows previous security challenges for Cisco, including a recent emergency directive from CISA to secure firewall devices against zero-day attacks.