CVE-2025-20326
BaseFortify
Publication date: 2025-09-03
Last updated on: 2025-09-10
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | unified_communications_manager | From 15.0 (inc) to 15su3 (exc) |
| cisco | unified_communications_manager | 12.5 |
| cisco | unified_communications_manager | 14.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cross-site request forgery (CSRF) issue in the web-based management interface of Cisco Unified Communications Manager (Unified CM) Software and Cisco Unified CM Session Management Edition (SME) Software. It occurs because the interface lacks sufficient CSRF protections. An unauthenticated, remote attacker can exploit this by tricking a user into clicking a malicious link, which then allows the attacker to perform arbitrary actions with the same privileges as the affected user. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to perform unauthorized actions on the affected device with the privileges of the user who clicks the malicious link. Although the impact on confidentiality and availability is none, there is a low impact on integrity. This means an attacker could potentially alter settings or configurations via the management interface, which could disrupt normal operations or security settings. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or methods provided for this vulnerability. Since it is a CSRF vulnerability in the web-based management interface, detection would typically involve monitoring for suspicious user interactions or unauthorized actions, but no explicit detection commands are available. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading to the fixed software releases starting from Cisco Unified CM release 15SU3 or later. No workarounds are available, so applying the official software updates from Cisco is necessary to address the vulnerability. [1]