top of page

Cisco Unified Communications Zero-Day RCE Actively Exploited in the Wild (CVE-2026-20045)

February 2nd, 2026

Critical

Cisco has released security updates to address a critical remote code execution (RCE) vulnerability, CVE-2026-20045, affecting several Cisco Unified Communications products and Webex Calling Dedicated Instance. Cisco confirmed that attackers actively exploited this zero-day vulnerability before a patch was available. The vulnerability allows unauthenticated remote attackers to execute arbitrary commands, gain user-level access, and escalate privileges to root. Because these platforms are central to enterprise communications, successful exploitation presents significant operational and security risks. 

Technical Details

  • CVE ID: CVE-2026-20045

  • Severity: Critical

    • NIST (NVD) CVSS v3.1 Score: 9.8 (Critical)

    • Cisco (CNA) CVSS v3.1 Score: 8.2 (High)

  • Vulnerability Type: Remote Code Execution (RCE)

  • Attack Vector: Unauthenticated remote

  • Privileges Required: None

  • User Interaction: None

  • Affected Products:

    • Cisco Unified Communications Manager (Unified CM)

    • Unified CM Session Management Edition (SME)

    • Unified CM IM & Presence

    • Cisco Unity Connection

    • Webex Calling Dedicated Instance

  • Vulnerability Details:

    • Cisco identified the vulnerability as stemming from improper validation of user-supplied input in HTTP requests handled by the web-based management interface.

    • An unauthenticated attacker can exploit the vulnerability by sending a sequence of crafted HTTP requests to a vulnerable system.

    • Cisco’s Product Security Incident Response Team (PSIRT) has confirmed active exploitation attempts in the wild, elevating the urgency of remediation.

  • Fixed Versions:

  • For Cisco Unity Connection:

Image by ThisisEngineering

Impact

Successful exploitation of CVE-2026-20045 may allow threat actors to:

  • Execute arbitrary commands without authentication

  • Obtain user-level operating system access

  • Escalate privileges to root, enabling full system control

  • Compromise enterprise voice, messaging, and collaboration services

  • Disrupt business-critical communication infrastructure

  • Establish persistent access and facilitate follow-on attacks

The combination of unauthenticated access, root-level impact, and confirmed in-the-wild exploitation significantly increases the risk to exposed environments.

Detection Method

Organizations should monitor for indicators of attempted or successful exploitation, including:

  • Suspicious or anomalous HTTP request activity targeting Unified Communications management interfaces

  • Logs showing malformed or unexpected HTTP requests

  • Evidence of unauthorized user-level or root-level access

  • Abnormal system behavior consistent with post-exploitation activity

  • Presence of affected products running unpatched software versions

Indicators of Compromise

There are no Indicators of Compromise (IOCs) for this Advisory.

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

Organizations are strongly advised to:

  • Immediately apply Cisco-released patches for all affected products

  • Follow Cisco’s version-specific upgrade guidance, as fixes are dependent on software release trains

  • Review patch README files prior to deployment

  • Prioritize remediation for internet-facing or externally accessible systems

  • Monitor Cisco PSIRT advisories for updates and additional guidance

CISA KEV Requirement: CVE-2026-20045 has been added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog. Federal agencies must apply fixes no later than February 11, 2026.


Note: Cisco has stated that no workarounds exist for this vulnerability. Patching is the only effective mitigation.

Conclusion

CVE-2026-20045 poses a critical risk to organizations due to its unauthenticated exploitation, root-level impact, and confirmed active abuse. With no workarounds, timely patching is essential for all affected organizations. Because Cisco Unified Communications infrastructure is widely deployed in enterprises, failing to remediate promptly may cause significant security compromise, service disruption, and operational impact. We urge organizations to assess exposure immediately and deploy the appropriate fixes without delay.

bottom of page