Cisco warns of a serious security flaw in comms platform – and that it needs patching immediately


- Login credentials for an account with root access was found in Cisco’s Unified Communications Manager
- There are no workarounds, just a patch, so users should update now
- Different versions of the tool are affected
Another hardcoded credential for admin access has been discovered in a major software application – this time around it’s Cisco, who discovered the slip-up in its Unified Communications Manager (Unified CM) solution.
Cisco Unified CM is an enterprise-grade IP telephony call control platform providing voice, video, messaging, mobility, and presence services. It manages voice-over-IP (VoIP) calls, and allows for the management of tasks such as user/device provisioning, voicemail integration, conferencing, and more.
Recently, Cisco found login credentials coded into the program, allowing for access with root privileges. The bug is now tracked as CVE-2025-20309, and was given a maximum severity score – 10/10 (critical). The credentials were apparently used during development and testing, and should have been removed before the product was shipped to the market.
No evidence of abuse
Cisco Unified CM and Unified CM SME Engineering Special (ES) releases 15.0.1.13010-1 through 15.0.1.13017-1 were said to be affected, regardless of the device configuration. There are no workarounds or mitigations, and the only way to address it is to upgrade the program to version 15SU3 (July 2025).
“A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted,” Cisco said.
At press time, there was no evidence of abuse in the wild.
Hardcoded credentials are one of the more common causes of system infiltrations. Just recently Sitecore Experience Platform, an enterprise-level content management system (CMS), held a hardcoded password for an internal user. It was just one letter – ‘b’ – which was super easy to guess.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Roughly a year ago, security researchers from Horizon3.ai found hardcoded credentials in SolarWinds’ Web Help Desk.
Via BleepingComputer
You might also like
Login credentials for an account with root access was found in Cisco’s Unified Communications Manager There are no workarounds, just a patch, so users should update now Different versions of the tool are affected Another hardcoded credential for admin access has been discovered in a major software application – this…
Recent Posts
- AMD’s impressive free RX 9070 XT speed boosts confirmed in new benchmarks – and they make the GPU a better buy than Nvidia’s RX 5070 Ti
- Adding calendar events with a screenshot is AI at its finest
- Nobody wants 8GB GPUs from Nvidia and AMD – and this retailer just made that clear
- The 7 Best Kitchen Scales Reviewed by a Former Chocolatier (2025)
- What to expect at Samsung Galaxy Unpacked next week
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021