Cyber Posture

CVE-2026-20045

HighCISA KEVActive ExploitationRCE

Published: 21 January 2026

Published
21 January 2026
Modified
13 February 2026
KEV Added
21 January 2026
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0410 88.7th percentile
Risk Priority 39 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20045 is a high-severity Code Injection (CWE-94) vulnerability in Cisco Unified Communications Manager. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 11.3% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied input in HTTP requests to prevent code injection vulnerabilities like this CWE-94 flaw.

prevent

Ensures timely identification, reporting, and remediation of flaws such as this specific CVE through patching and updates.

prevent

Prevents unauthenticated remote access to the vulnerable web-based management interface by monitoring and controlling communications at system boundaries.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote code execution via crafted HTTP requests to public-facing web management interface (T1190) enables arbitrary OS command execution on Linux-based Cisco products (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could…

more

allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit this vulnerability by sending a sequence of crafted HTTP requests to the web-based management interface of an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root.  Note: Cisco has assigned this security advisory a Security Impact Rating (SIR) of Critical rather than High as the score indicates. The reason is that exploitation of this vulnerability could result in an attacker elevating privileges to root.

Deeper analysisAI

CVE-2026-20045 is a code injection vulnerability (CWE-94) affecting Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance. The flaw arises from improper validation of user-supplied input in HTTP requests processed by the web-based management interface, enabling an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).

An unauthenticated attacker with network access to the management interface can exploit the vulnerability by sending a sequence of crafted HTTP requests. Successful exploitation provides initial user-level access to the operating system, allowing subsequent privilege escalation to root privileges. Cisco assigned it a Critical Security Impact Rating due to this escalation potential, despite the CVSS score aligning with High.

The official Cisco Security Advisory details the issue and mitigation steps at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b. The vulnerability is also listed in the CISA Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20045, confirming active exploitation in the wild.

Details

CWE(s)
KEV Date Added
21 January 2026

Affected Products

cisco
unified communications manager
12.5 — 14su5 · 12.5 — 14su5 · 15.0 — 15su3a
cisco
unified communications manager im and presence service
12.5 — 14su5 · 15.0 — 15su3a
cisco
unity connection
12.5 — 14su5 · 15.0 — 15su3

CVEs Like This One

CVE-2025-20337Same vendor: Ciscoboth on KEV
CVE-2026-20127Same vendor: Ciscoboth on KEV
CVE-2026-20131Same vendor: Ciscoboth on KEV
CVE-2025-20393Same vendor: Ciscoboth on KEV
CVE-2025-20352Same vendor: Ciscoboth on KEV
CVE-2026-20128Same vendor: Ciscoboth on KEV
CVE-2025-20333Same vendor: Ciscoboth on KEV
CVE-2025-20362Same vendor: Ciscoboth on KEV
CVE-2025-20349Same vendor: Cisco
CVE-2026-1281Shared CWE-94both on KEV

References