Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Cisco Unified Communications Zero-Day Exploited for
Cisco Unified Communications Zero-Day Exploited for

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-20045

Cisco Unified Communications Zero-Day Exploited for

An actively exploited zero-day in Cisco Unified Communications allows unauthenticated remote code execution with root privileges via crafted HTTP...

Dylan H.

Security Team

February 17, 2026
3 min read

Affected Products

  • Cisco Unified CM
  • Cisco Unified CM SME
  • Cisco Unified CM IM & Presence
  • Cisco Unity Connection
  • Cisco Webex Calling Dedicated Instance

Executive Summary

An actively exploited zero-day vulnerability in Cisco Unified Communications products allows unauthenticated remote code execution with root privileges via crafted HTTP requests to the web management interface. Cisco rates this Critical due to the root-level access achieved. CISA has added it to the Known Exploited Vulnerabilities (KEV) catalog.

This was a true zero-day — exploited in the wild before patches were available.


Vulnerability Details

FieldDetails
CVECVE-2026-20045
CVSS8.2 (High) / Cisco Critical
TypeUnauthenticated Remote Code Execution
VectorCrafted HTTP requests to web management interface
PrivilegeRoot-level access
CISA KEVYes, remediation deadline February 11, 2026

Affected Products

  • Cisco Unified Communications Manager (CM)
  • Cisco Unified CM Session Management Edition (SME)
  • Cisco Unified CM IM & Presence Service
  • Cisco Unity Connection
  • Cisco Webex Calling Dedicated Instance

These products are deployed in millions of enterprise voice environments worldwide.


Impact

Cisco Unified Communications Manager is the backbone of enterprise voice infrastructure. Root-level compromise could allow an attacker to:

  • Intercept voice calls and voicemail
  • Redirect calls to attacker-controlled numbers
  • Access call records and contact directories
  • Pivot into the enterprise network from the UC infrastructure
  • Disrupt communications during incident response

Exploitation Activity

This vulnerability was exploited before patches were available, making it a true zero-day. The specific threat actors and attack methodology have not been publicly attributed.

CISA added CVE-2026-20045 to the KEV catalog with a remediation deadline of February 11, 2026, indicating urgency.


Remediation

Immediate Actions

  1. Apply Cisco patches immediately for all affected UC products
  2. Restrict management interface access to internal management VLANs only
  3. Monitor HTTP access logs for unusual requests to management endpoints
  4. Audit system accounts for unauthorized changes or new accounts

Network Hardening

  • Never expose UC management interfaces to the internet
  • Implement network segmentation between UC infrastructure and general network
  • Deploy IPS rules to detect exploitation attempts
  • Enable enhanced logging on all UC components

Detection

Monitor for:

  • Unexpected HTTP requests to UC management URLs from non-administrative sources
  • New processes or files created on UC servers (especially running as root)
  • Changes to call routing tables or dial plans
  • Unusual outbound connections from UC infrastructure

Enterprise voice infrastructure is a high-value target. Organizations running Cisco Unified Communications must patch immediately and verify no compromise has occurred.

Related Reading

  • BeyondTrust Remote Support and PRA Critical RCE Under
  • CISA Issues Emergency Directive as Cisco SD-WAN Zero-Day
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Triggers Five Eyes
#Cisco#Zero-Day#CVE-2026-20045#Unified Communications#RCE#Root Access#CISA KEV

Related Articles

BeyondTrust Remote Support and PRA Critical RCE Under

A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access is under active exploitation,...

5 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual servers triggers remote code execution. CISA has added this to the Known Exploited Vulnerabilities catalogue.

4 min read

CVE-2025-54068: Laravel Livewire Code Injection Vulnerability

A critical code injection vulnerability in Laravel Livewire v3 allows unauthenticated remote attackers to execute arbitrary commands. Over 130,000...

7 min read
Back to all Security Alerts