• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 35,000 monthly views (unique) and 208,000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Cisco Unified CCX Flaws Expose Systems to Remote Code Execution (CVE-2025-20354, CVE-2025-20358)

johny899

New Member
Content Writer
Messages
716
Reaction score
3
Points
23
Balance
$893.1USD
Hello friends! If you are handling a Cisco Unified Contact Center Express (CCX) installation, pour yourself a cup of coffee and read on. Recently, Cisco disclosed two severe remote code execution vulnerabilities — CVE-2025-20354 and CVE-2025-20358 — that are very serious.

Here’s the situation: both of these vulnerabilities allow a remote attacker to take control of your Cisco Unified Contact Center Express server without authentication or a password. Yes, you read that right: no login authentication. This is possible because the vulnerabilities are in two different components of CCX:

CVE-20354 affects the Java RMI service, which listens for requests from the internet and provides no validation of the sender before placing this data into memory, allowing the remote attacker to upload a crafted file and execute commands on the server. Furthermore, since this service runs as root, this equals complete control of the machines.

CVE-2025-20358 affects the CCX Editor, which is used to build workflow scripts. The CCX Editor allows the user to authenticate using the server, where an authenticated attacker can easily substitute or modify workflow scripts.

Both vulnerabilities enable remote and silent exploitation, meaning an attacker need not have a user click anything for the exploit to occur. In the case of call center operations that rely on CCX, this could lead to a very chaotic situation.

Why is this Important​

In a worst-case scenario, attackers may:

• Obtain root access to your CCX server.

• Execute any command they choose.

• Propagate laterally into other systems on your network.

• Possibly take control of your call center operations.

In other words, it is the kind of vulnerability that IT teams dread, as it could result in costly damages.

What To Do About It​

The optimistic part? Cisco has provided updates to resolve both problems. Here are the options:

• Unified CCX 12.5 SU3 and earlier - upgrade to 12.5 SU3 ES07.

• Unified CCX 15.0 - upgrade to 15.0 ES01.

If you are unable to patch right away, there is no ideal workaround. You could diminish exposure via segmentation of the network and strict firewall rules, but patching is the only real way to secure the system.

In Conclusion​

To be frank, these vulnerabilities are concerning and an excellent reminder that enterprise software also has vulnerabilities. If you manage Cisco CCX, take the proper steps and patch it promptly. The worst thing you can do is hesitate. Attackers are laser-focused on getting into servers that haven’t been patched.
 
Top