Cisco Unified Contact Center Express Vulnerabilities
TL;DR ๐
- Multiple vulnerabilities in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack or execute arbitrary code on an affected device. To exploit these vulnerabilities, the attacker must have valid administrative credentials. For more information about these vulnerabilities, see the Details ["#details"] section ofโฆ
- No fixed release listed yet; apply mitigations and monitor.
- Workarounds are documented in the advisory.
- CVEs: CVE-2025-20276, CVE-2025-20277, CVE-2025-20279.
What happened ๐ต๏ธโโ๏ธ
The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows:
CVE-2025-20279: Cisco Unified CCX Stored XSS Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to conduct a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwk24130 [“https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk24130”] CVE ID: CVE-2025-20279 Security Impact Rating (SIR): Medium CVSS Base Score: 4.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CVE-2025-20276: Cisco Unified CCX Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, remote attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to insecure deserialization of Java objects by the affected software. An attacker could exploit this vulnerability by sending a crafted Java object to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwk24108 [“https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk24108”] CVE ID: CVE-2025-20276 Security Impact Rating (SIR): Medium CVSS Base Score: 3.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
CVE-2025-20277: Cisco Unified CCX Path Traversal Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability is due to improper limitation of a pathname to a restricted directory (path traversal). An attacker could exploit this vulnerability by sending a crafted web request to an affected device, followed by a specific command through an SSH session. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Bug ID(s): CSCwk24068 [“https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk24068”] CVE ID: CVE-2025-20277 Security Impact Rating (SIR): Medium CVSS Base Score: 3.4 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Affected products ๐ฅ๏ธ
At the time of publication, these vulnerabilities affected Cisco Unified CCX.
For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software ["#fs"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.
Fixed software ๐ง
Upgrade to the first fixed release in your train (or later):
| Release / Product | First Fixed Release | Notes |
|---|---|---|
| 15.0 | 15.0(1) | |
| 1.0 | Initial public release. |
Workarounds ๐งฏ
There are no workarounds that address these vulnerabilities.
Risk in context ๐ฏ
Use vendor CVSS for prioritization. Consider exposure and asset criticality.
Fast facts โก
- Advisory: cisco-sa-uccx-multi-UhOTvPGL
- Initial release: 2025-06-04T16:00:00 UTC
- Last updated: 2025-06-04T16:00:00 UTC
For leadership ๐งญ
Executive summary. Risk is Medium (CVSS 4.8) for Cisco, Cisco Unified Contact Center Express. Vendor fixes are available; prioritize upgrade within 30 days based on environment risk.
Why it matters (exposure drivers):
- Potential service impact and security exposure depend on deployment topology and access paths.
- Treat internet-exposed or multi-tenant management nodes as higher risk.
- Ensure monitoring for abnormal auth/config events until upgrades complete.
Remediation & timing:
- Upgrade to the first fixed release per the table above; schedule an approved change window within 30 days.
- Change risk: low-to-moderate (standard vendor patch). Validate backups and rollback plan.
Now / Next / Later:
- Now: Confirm exposure, identify affected versions, and enable monitoring/alerts.
- Next: Patch according to the fixed software table; verify service health post-change.
- Later: Add control checks to build pipeline/CMDB to block drift to vulnerable trains.