Cisco UCCX Vulnerability (CVE-2025-20354)
Cisco UCCX Vulnerability (CVE-2025-20354)
Cisco recently patched a critical vulnerability in its
Unified Contact Center Express (UCCX) software that could allow unauthenticated
remote attackers to execute arbitrary commands with root privileges on affected
systems.
How the Exploit Works
There are two major flaws involved:
1. CVE-2025-20354
– Java RMI Remote Code Execution
• Component
Affected: Java Remote Method Invocation (RMI) process in Cisco UCCX.
• Root
Cause: Improper authentication mechanisms tied to specific UCCX features.
• Exploit
Method: An attacker can upload a crafted file via the Java RMI interface.
• Impact:
The file allows execution of arbitrary commands on the underlying OS with
root-level access.
2. CVE-2025-20358
– CCX Editor Authentication Bypass
• Component
Affected: Cisco CCX Editor application.
• Exploit
Method: Redirects authentication flow to a malicious server, tricking the app
into thinking authentication succeeded.
• Impact:
Allows creation and execution of arbitrary scripts with admin permission.
Affected Versions and Fixes
12.5 SU3 and 15.0
No work around exists currently, only upgrading to the
patched version mitigates the risk.
Real-World Risk
- These
vulnerabilities affect all configurations of Cisco UCCX.
- As of
now, no public exploit code has been found, and there are no
reports of active exploitation in the wild.
- However,
the CVSS score is 9.8, indicating a high likelihood of exploitation
if left unpatched.
- Detection Rule
Additional Indicators of Compromise (IoCs)
- Unexpected
.jaror.classfiles in/tmpor UCCX directories - Outbound connections from UCCX host to unknown IPs
- New or modified binaries with Java metadata
- Java process spawning shell commands (
/bin/sh,bash, etc.)
.png)