CVE-2026-20045

high Cisco ⚠️ CISA KEV — Exploited in the Wild
CVSS v3 Base Score
8.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score
0.9%
Exploitation probability in 30 days
Top 24% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
Low
Availability
None
Published: January 21, 2026 (112 days ago)
Last Modified: February 13, 2026
Vendor: Cisco

⚠️ CISA Known Exploited Vulnerability

Added to KEV: 2026-01-21
Remediation Due: 2026-02-11 (⚠ 92d overdue)

Description

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.  Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.

CWE

CWE-94

Affected Products

cisco unified communications managercisco unified communications manager im and presence servicecisco unity connection

References