Cisco Scores a Perfect 10 for a Critical Comms Flaw
- Last Wednesday, Cisco issued an advisory revealing CVE-2025-20309 affects certain versions of Unified CM and Unified CM SME with hardcoded root SSH credentials.
- Cisco's advisory reveals static root credentials embedded during development in certain Unified CM releases, intentionally for testing and never removed, creating a permanent backdoor.
- Evidence shows IoCs include log entries in /var/log/active/syslog/secure, with no proof of active exploits so far, but successful attacks could grant root command execution.
- Beyond this incident, previous hardcoded credentials appeared in Cisco IOS XE, WAAS, DNA Center, and Emergency Responder, with a second CVSS 10 flaw in a week, followed by recent ISE fixes.
14 Articles
14 Articles
A vulnerability has been discovered in Cisco products. It allows an attacker to cause a circumvention of security policy. See online: https://www.cert.ssi.gouv.fr/avis/C...
Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309) - Help Net Security
Cisco has found a backdoor account in yet another of its software solutions: CVE-2025-20309, stemming from default credentials for the root account, could allow unauthenticated remote attackers to log into a vulnerable Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) platforms and use the acquired access to execute arbitrary commands with the highest privileges…
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium