Privilege escalation in Cisco Unified Communications Products



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-20112
CWE-ID CWE-268
Exploitation vector Local
Public exploit N/A
Vulnerable software
Customer Collaboration Platform (CCP)
Web applications / E-Commerce systems

Cisco Emergency Responder
Other software / Other software solutions

Cisco Finesse
Client/Desktop applications / Other client software

Cisco Unified Communications Manager IM & Presence Service
Client/Desktop applications / Other client software

Cisco Prime Collaboration Deployment
Server applications / Other server solutions

Cisco Unified Communications Manager
Server applications / Other server solutions

Cisco Unified Contact Center Express
Server applications / Web servers

Cisco Unified Intelligence Center
Server applications / DLP, anti-spam, sniffers

Cisco Unity Connection
Client/Desktop applications / Messaging software

Cisco Virtualized Voice Browser
Client/Desktop applications / Web browsers

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Privilege Chaining

EUVDB-ID: #VU109651

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-20112

CWE-ID: CWE-268 - Privilege Chaining

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to excessive permissions that have been assigned to system commands. A local administrator can gain root privileges on the underlying operating system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Customer Collaboration Platform (CCP): 12.5(1)SU3.02 - 15.0(1)

Cisco Emergency Responder: 14

Cisco Finesse: 14.0(1)

Cisco Prime Collaboration Deployment: 14.0

Cisco Unified Communications Manager: 11.5(1.10000.6) - 15.0(0.10000.15)

Cisco Unified Communications Manager IM & Presence Service: 14

Cisco Unified Contact Center Express: 12.5(1)SU3.05 - 15.0(1)

Cisco Unified Intelligence Center: 14.0(1)

Cisco Unity Connection: 14.0

Cisco Virtualized Voice Browser: 14.0(1)

CPE2.3 External links

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-kkhZbHR5


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###