FKIE_CVE-2025-20309
Vulnerability from fkie_nvd - Published: 2025-07-02 17:15 - Updated: 2025-07-03 15:23
Severity ?
Summary
A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted.
This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7 | Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | unified_communications_manager | 15.0.1.13010-1 | |
| cisco | unified_communications_manager | 15.0.1.13010-1 | |
| cisco | unified_communications_manager | 15.0.1.13011-1 | |
| cisco | unified_communications_manager | 15.0.1.13011-1 | |
| cisco | unified_communications_manager | 15.0.1.13012-1 | |
| cisco | unified_communications_manager | 15.0.1.13012-1 | |
| cisco | unified_communications_manager | 15.0.1.13013-1 | |
| cisco | unified_communications_manager | 15.0.1.13013-1 | |
| cisco | unified_communications_manager | 15.0.1.13014-1 | |
| cisco | unified_communications_manager | 15.0.1.13014-1 | |
| cisco | unified_communications_manager | 15.0.1.13015-1 | |
| cisco | unified_communications_manager | 15.0.1.13015-1 | |
| cisco | unified_communications_manager | 15.0.1.13016-1 | |
| cisco | unified_communications_manager | 15.0.1.13016-1 | |
| cisco | unified_communications_manager | 15.0.1.13017-1 | |
| cisco | unified_communications_manager | 15.0.1.13017-1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13010-1:*:*:*:-:*:*:*",
"matchCriteriaId": "8985BC01-2355-447B-9454-EDCF26817605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13010-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "2704C9FA-BF67-4776-A1C5-C2FE2D6B79E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13011-1:*:*:*:-:*:*:*",
"matchCriteriaId": "71821C29-B31C-4B7B-8C69-2CE1F9C9EE3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13011-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "E0C338F5-3710-42B0-8959-73A916638EC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13012-1:*:*:*:-:*:*:*",
"matchCriteriaId": "3E128057-726A-4715-B9EF-2C2AC30EDD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13012-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "8A05CB62-B48C-4205-8349-8C4F3AFCB9D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13013-1:*:*:*:-:*:*:*",
"matchCriteriaId": "6012779F-6406-4882-B520-3CB71734AAC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13013-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "3ED47A6A-D9E9-4FC1-846D-E8481194B003",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13014-1:*:*:*:-:*:*:*",
"matchCriteriaId": "B2BD7E64-746B-46F8-A676-A26B773159CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13014-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "7EA03C5C-40DF-4AE6-B6B9-7A6D38918B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13015-1:*:*:*:-:*:*:*",
"matchCriteriaId": "B2A4642A-D12B-40A9-B835-3F7303020209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13015-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "429174E3-5F75-43E7-95FF-C2FDE91E7BB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13016-1:*:*:*:-:*:*:*",
"matchCriteriaId": "17D01F03-DA41-4F79-BC20-3F8D2B1BA7F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13016-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "F645ECD4-D63F-4405-80CD-DF9F0C14DEDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13017-1:*:*:*:-:*:*:*",
"matchCriteriaId": "5ACF28F0-7049-4AB8-8DBF-50FDC65194A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:15.0.1.13017-1:*:*:*:session_management:*:*:*",
"matchCriteriaId": "2C88F71F-229C-40BE-82EC-F76347AC5FDA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted.\r\n\r\nThis vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Cisco Unified Communications Manager (Unified CM) y Cisco Unified Communications Manager Session Management Edition (Unified CM SME) podr\u00eda permitir que un atacante remoto no autenticado inicie sesi\u00f3n en un dispositivo afectado utilizando la cuenta ra\u00edz, que tiene credenciales est\u00e1ticas predeterminadas que no se pueden modificar ni eliminar. Esta vulnerabilidad se debe a la presencia de credenciales de usuario est\u00e1ticas para la cuenta ra\u00edz, reservadas para su uso durante el desarrollo. Un atacante podr\u00eda explotar esta vulnerabilidad utilizando la cuenta para iniciar sesi\u00f3n en un sistema afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante iniciar sesi\u00f3n en el sistema afectado y ejecutar comandos arbitrarios como usuario ra\u00edz."
}
],
"id": "CVE-2025-20309",
"lastModified": "2025-07-03T15:23:28.870",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
},
"published": "2025-07-02T17:15:52.927",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…