CVE-2025-20309

July 3, 2025, 3:23 p.m.

10.0
Critical

Description

A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Product(s) Impacted

Vendor Product Versions
Cisco
  • Unified Communications Manager
  • 15.0.1.13010-1, 15.0.1.13011-1, 15.0.1.13012-1, 15.0.1.13013-1, 15.0.1.13014-1, 15.0.1.13015-1, 15.0.1.13016-1, 15.0.1.13017-1

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-798
Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a cisco unified_communications_manager 15.0.1.13010-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13010-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13011-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13011-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13012-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13012-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13013-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13013-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13014-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13014-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13015-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13015-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13016-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13016-1 / / / session_management / / /
a cisco unified_communications_manager 15.0.1.13017-1 / / / - / / /
a cisco unified_communications_manager 15.0.1.13017-1 / / / session_management / / /

CVSS Score

10.0 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

    View Vector String

Timeline

Published: July 2, 2025, 5:15 p.m.
Last Modified: July 3, 2025, 3:23 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

psirt@cisco.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.