Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-20354 PoC — Cisco Unified Contact Center Express 代码问题漏洞

Source
Associated Vulnerability
Title:Cisco Unified Contact Center Express 代码问题漏洞 (CVE-2025-20354)
Description:Cisco Unified Contact Center Express(Unified CCX)是美国思科(Cisco)公司的一款统一通信解决方案中的客户关系管理组件。该组件支持自助语音服务、呼叫分配和客户访问控制等功能。 Cisco Unified Contact Center Express(Unified CCX)存在代码问题漏洞,该漏洞源于Java RMI进程的认证机制不当,可能导致未经验证的远程攻击者上传任意文件并以root权限执行任意命令。
Description
CVE-2025-20354
Readme
# ⚔️ CVE-2025-20354 — Cisco Unified Contact Center Express (CCX) RCE Vulnerability

![Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code (1)](https://github.com/user-attachments/assets/40a8ed88-7f6d-4ae3-936e-4a5ceb61b511)

---

## 🔍 Overview

**CVE-2025-20354** is a **critical Remote Code Execution (RCE)** flaw in **Cisco Unified Contact Center Express (CCX)**.
It stems from **improper authentication** in the **Java Remote Method Invocation (RMI)** process, which allows **unauthenticated attackers** to upload and execute arbitrary files **with root privileges**.

> **Severity:** 9.8 / 10 (Critical)
> **Vector:** `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
> **CWE:** 434 — *Unrestricted Upload of File with Dangerous Type*
> **Disclosure Date:** November 2025

---

## 🧩 Affected Products

| Product                                    | Affected Versions         | Fixed In      |
| ------------------------------------------ | ------------------------- | ------------- |
| Cisco Unified Contact Center Express (CCX) | 12.5 SU3 ES07 and earlier | 12.5 SU3 ES08 |
| Cisco Unified Contact Center Express (CCX) | 15.0 before ES01          | 15.0 ES01     |

📦 **Impact:** Full system compromise — attacker gains root access remotely without credentials.

---

## ⚙️ Technical Summary

* Vulnerability lies in the **RMI service** used for remote method calls.
* **No authentication or insufficient validation** on incoming requests allows arbitrary file uploads.
* Uploaded payloads can be executed as the **root user**.
* Exploitation requires **only network access** to the vulnerable service.

---

## 🧰 Mitigation & Remediation

### ✅ Recommended Actions

1. **Patch Immediately**

   * Apply Cisco’s official updates for your CCX version.
   * [Cisco Security Advisory — CVE-2025-20354](https://nvd.nist.gov/vuln/detail/CVE-2025-20354)

2. **Restrict Access**

   * Block or isolate RMI interfaces from untrusted networks.
   * Use firewalls or ACLs to limit access to administrative IPs only.

3. **Monitor & Detect**

   * Watch for suspicious RMI traffic, file uploads, or new binaries in system directories.
   * Review logs for unexpected Java process executions.

---

## 🚨 Why It Matters

💀 **Unauthenticated attacker** → No login needed
🧨 **Root privileges** → Complete system takeover
🌐 **Network exploitable** → Threats extend beyond internal networks

Because of these factors, this CVE is **one of the most critical in Cisco CCX history** and demands **urgent remediation**.

---

## 🕵️‍♂️ Indicators of Compromise (IoCs)

* Unexpected `.jar` or `.class` files in CCX temp directories
* Outbound connections from CCX host to unknown IPs
* New or modified system binaries with Java metadata

---
File Snapshot

[4.0K] /data/pocs/e58176c2077a2916347fc3cc417db9a743baef9f └── [2.7K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.