RSS Cisco Security Advisory

Cisco Unified Communications Manager Static SSH Credentials Vulnerability

A critical vulnerability has been discovered in Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition. This vulnerability allows an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. The root account is reserved for use during development and has static user credentials that can be exploited by an attacker. An attacker can use the account to log in to an affected system and execute arbitrary commands as the root user. Cisco has released software updates to address this vulnerability, but there are no workarounds available. The vulnerability is due to the presence of static user credentials for the root account. A successful exploit could allow the attacker to gain full control of the affected system. The security impact rating of this vulnerability is critical. The advisory is available at a specified link and has been assigned CVE-2025-20309. Users are advised to apply the software updates as soon as possible to prevent potential attacks.
sec.cloudapps.cisco.com
sec.cloudapps.cisco.com
Create attached notes ...