On 21 January 2026, Cisco released fixes for a high-severity vulnerability impacting Cisco Unified Communications products that is under active exploitation, tracked as CVE-2026-20045. The flaw arises from improper input validation of user-supplied data in HTTP requests to the web-based management interface of affected devices.
An unauthenticated remote threat actor can exploit this vulnerability by sending a sequence of crafted HTTP requests, allowing the execution of arbitrary commands on the underlying operating system of unpatched devices. Successful exploitation can result in initial user-level access, which can then be escalated to root privileges, giving the threat actor full control of the affected system. Details regarding real-world exploitation have not been publicly disclosed at this time. The vulnerability was discovered by an external security researcher and responsibly disclosed to Cisco.
While Arctic Wolf has not identified a publicly available proof-of-concept exploit, threat actors are likely to continue targeting this vulnerability due to the high impact of achieving root-level access. Cisco products have historically been popular targets for threat actors, as reflected in multiple prior entries within CISA’s Known Exploited Vulnerabilities catalog.
Recommendation for CVE‑2026‑20045
Upgrade to Latest Fixed Release
Arctic Wolf strongly recommends that customers upgrade to the latest fixed release.
| Affected Product | Affected Release | Fixed Release |
| Cisco Unified CM |
|
|
| Unified CM IM&P | ||
| Unified CM SME | ||
| Webex Calling Dedicated Instance Release | ||
| Unity Connection |
Please follow your organisation’s patching and testing guidelines to minimise potential operational impact.



