Cisco Unified Communications Manager CVSS 10 Vulnerability: 1K+ Assets Exposed to the Internet

Cisco Unified Communications Manager CVSS 10 Vulnerability: 1K+ Assets Exposed to the Internet

Cisco has issued urgent patches for a critical vulnerability (CVE-2025-20309) in Unified Communications Manager that allows root access via hard-coded credentials. Several advanced threat actors, including APT28 and MuddyWater, are likely to exploit this flaw on over a thousand exposed devices worldwide. #CVE-2025-20309 #UnifiedCommunicationsManager #APT28 #MuddyWater

Keypoints

  • Cisco released critical patches for CVE-2025-20309, a vulnerability with a CVSS score of 10.0 affecting Unified Communications Manager versions 15.0.1.13010-1 through 15.0.1.13017-1.
  • The flaw allows attackers to gain root access via hard-coded credentials regardless of device configuration.
  • Over a thousand devices running affected software are exposed worldwide, with significant presence in the US, Thailand, Korea, Russia, and Europe.
  • Threat actors such as APT28, APT41, MuddyWater, and access brokers are likely to weaponize this flaw for network compromise, VoIP interception, or ransomware deployment.
  • No public exploitation has been reported yet, but the probability remains very high due to exposed assets and credential risks.
  • Mitigation includes immediate patching, restricting management interface access, monitoring logs for root SSH logins, and network segmentation to prevent lateral movement.
  • The vulnerability enables attackers to execute commands as root, intercept VoIP traffic, disrupt call flows, and extract sensitive communication data.

MITRE Techniques

  • [T1078] Valid Accounts – Exploiting hard-coded credentials to gain root access on affected devices (“…allows attackers to gain root access via hard-coded credentials…”).
  • [T1059] Command and Scripting Interpreter – Attackers may execute commands as root leading to full system compromise (“Command execution as root (full system compromise)…”).
  • [T1001] Data Obfuscation – Intercepting and manipulating VoIP traffic to eavesdrop or disrupt communications (“Intercept or manipulate VoIP traffic, such as: Eavesdropping on sensitive conversations…”).
  • [T1046] Network Service Scanning – Access brokers scan for RCE or credential flaws in Cisco Unified CM appliances (“Access brokers often scan for RCE or credential-based flaws…”).
  • [T1083] File and Directory Discovery – Extracting call logs or voicemail data after exploitation (“Extract call logs or voicemail data.”).

Indicators of Compromise

  • [Vulnerability ID] critical flaw in Cisco Unified Communications Manager – CVE-2025-20309 affecting versions 15.0.1.13010-1 through 15.0.1.13017-1
  • [Log Indicators] suspicious root SSH logins – entries in /var/log/active/syslog/secure showing successful root SSH login
  • [Network Assets] exposed devices running vulnerable Unified CM – over 1000 globally, located in US, Thailand, Korea, Russia, and Europe


Read more: https://www.cloudsek.com/blog/cisco-unified-communications-manager-cvss-10-vulnerability-1k-assets-exposed-to-the-internet