News: 1769079276

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Another week, another emergency patch as Cisco plugs Unified Comms zero-day

(2026/01/22)


Cisco has finally shipped a fix for a critical-rated zero-day in its Unified Communications gear, a flaw that's already being weaponized in the wild, and which CISA previously flagged as an emergency priority.

The bug, [1]tracked as CVE-2026-20045 , lurks in the web-management interfaces of Cisco Unified Communications Manager (Unified CM), Session Management Edition (SME), IM & Presence Service (IM&P), Cisco Unity Connection, and Webex Calling Dedicated Instance platforms. It allows unauthenticated remote attackers to execute arbitrary code on the underlying operating system and potentially escalate to root.

Cisco's Product Security Incident Response Team gave it a "Critical" severity rating, even though its CVSS base score sits in the "High" range, because successful exploits can lead to full system compromise.

[2]

The networking giant said it is "aware of attempted exploitation of this vulnerability in the wild" and has urged customers to apply fixes immediately.

[3]

[4]

Cisco hasn't said how many customers are affected, whether any data has been exfiltrated from affected environments, or who is behind these exploitation attempts. The firm did not immediately respond to The Register 's questions.

The issue sits in the management interface's HTTP handling and can be triggered without logging in. "This vulnerability is due to improper validation of user-supplied input in HTTP requests," Cisco explains in its advisory. "An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device.

[5]AI networking startup Upscale scores $200M to challenge Nvidia's NVSwitch

[6]Cisco finally fixes max-severity bug under active attack for weeks

[7]Buy servers now or cry later: DRAM price spike threatens infrastructure budgets

[8]Patch Cisco ISE bug now before attackers abuse proof-of-concept exploit

Given how often those interfaces are reachable over internal networks or VPNs, it's not hard to see why attackers have noticed.

This fix comes just days after Cisco was [9]forced to roll out another set of patches for a different critical remote code execution bug in its Secure Email Gateway and Secure Email and Web Manager products, CVE-2025-20393, underscoring a rough start to the year for Switchzilla's own code.

[10]

CISA has added the flaw to its Known Exploited Vulnerabilities list, meaning federal agencies have a deadline to patch, and everyone else has little excuse to wait.

Cisco hasn't offered a workaround, which means if you're running the affected software, you're mostly patching and hoping you get there before someone else does.

For anyone still treating voice infrastructure as boring plumbing, this is another reminder that attackers very much are not. ®

Get our [11]Tech Resources



[1] https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aXIDVP2A38S0UGJNH_n2pQAAA1Y&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXIDVP2A38S0UGJNH_n2pQAAA1Y&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXIDVP2A38S0UGJNH_n2pQAAA1Y&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[5] https://www.theregister.com/2026/01/22/upscale_skyhammer_nvidia/

[6] https://www.theregister.com/2026/01/15/cisco_fixes_cve_2025_20393/

[7] https://www.theregister.com/2026/01/14/dram_infrastructure_costs/

[8] https://www.theregister.com/2026/01/08/rcisco_ise_bug_poc/

[9] https://www.theregister.com/2026/01/15/cisco_fixes_cve_2025_20393/

[10] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_onprem/networks&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXIDVP2A38S0UGJNH_n2pQAAA1Y&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[11] https://whitepapers.theregister.com/



Feeling amorous, she looked under the sheets and cried, "Oh, no,
it's Microsoft!"