- Connection identification information for an account with Root Access was found in Unified Communications Manager of Cisco
- There is no bypass solution, just a fix, so users must update now
- Different versions of the tool are affected
Another diploma coded in hard for access to the administrator was discovered in a major software application – this time around Cisco, which discovered the solution in its Unified Communications Manager (Unified CM) solution.
Cisco Unified CM is a quality IP call control control platform in business providing voice, video, messaging, mobility and presence services. It manages voice calls on IP (VOIP) and allows tasks management such as user / peripheral supply, integration of voicemail, conference, etc.
Recently, Cisco has found connection identification information coded in the program, allowing access with root privileges. The bug is now followed as CVE-2025-20309 and has received a maximum gravity score-10/10 (critic). The identification information was apparently used during development and tests, and should have been deleted before shipping the product to the market.
No proof of abuse
Cisco Unified CM and Unified CM PME Engineering Special (ES) The versions 15.0.1.1.13010-1 to 15.0.1.13017-1 would have been affected, regardless of the configuration of the device. There is no bypass or mitigation solution, and the only way to solve it is to upgrade the program to the 15SU3 version (July 2025).
“A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Management Management Edition (Unified CM PME) could allow a non -authenticated distant attacker to connect to an affected device using the root account, which has a static and static implementation which cannot be modified or deleted,” said Cisco.
At the time of the press, there was no evidence of abuse in the wild.
The references coded in hard are one of the most common causes of system infiltration. Most recently, SiteCore Experience Platform, a content management system (CMS) at the level of the company, organized a hard -coded password for an internal user. It was just a letter – ‘B’ – which was super easy to guess.
About a year ago, Horizon3 security researchers. AI found hard coded references in the Solarwinds web assistance service.
Via Bleeping Compompute