Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-20354 PoC — Cisco Unified Contact Center Express Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Cisco Unified Contact Center Express Remote Code Execution Vulnerability (CVE-2025-20354)
Description:A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX could allow an unauthenticated, remote attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system. This vulnerability is due to improper authentication mechanisms that are associated to specific Cisco Unified CCX features. An attacker could exploit this vulnerability by uploading a crafted file to an affected system through the Java RMI process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
Description
CVE-2025-20354
Readme
# ⚔️ CVE-2025-20354 — Cisco Unified Contact Center Express (CCX) RCE Vulnerability

![Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code (1)](https://github.com/user-attachments/assets/40a8ed88-7f6d-4ae3-936e-4a5ceb61b511)

---

## 🔍 Overview

**CVE-2025-20354** is a **critical Remote Code Execution (RCE)** flaw in **Cisco Unified Contact Center Express (CCX)**.
It stems from **improper authentication** in the **Java Remote Method Invocation (RMI)** process, which allows **unauthenticated attackers** to upload and execute arbitrary files **with root privileges**.

> **Severity:** 9.8 / 10 (Critical)
> **Vector:** `AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H`
> **CWE:** 434 — *Unrestricted Upload of File with Dangerous Type*
> **Disclosure Date:** November 2025

---

## 🧩 Affected Products

| Product                                    | Affected Versions         | Fixed In      |
| ------------------------------------------ | ------------------------- | ------------- |
| Cisco Unified Contact Center Express (CCX) | 12.5 SU3 ES07 and earlier | 12.5 SU3 ES08 |
| Cisco Unified Contact Center Express (CCX) | 15.0 before ES01          | 15.0 ES01     |

📦 **Impact:** Full system compromise — attacker gains root access remotely without credentials.

---

## ⚙️ Technical Summary

* Vulnerability lies in the **RMI service** used for remote method calls.
* **No authentication or insufficient validation** on incoming requests allows arbitrary file uploads.
* Uploaded payloads can be executed as the **root user**.
* Exploitation requires **only network access** to the vulnerable service.

---

## 🧰 Mitigation & Remediation

### ✅ Recommended Actions

1. **Patch Immediately**

   * Apply Cisco’s official updates for your CCX version.
   * [Cisco Security Advisory — CVE-2025-20354](https://nvd.nist.gov/vuln/detail/CVE-2025-20354)

2. **Restrict Access**

   * Block or isolate RMI interfaces from untrusted networks.
   * Use firewalls or ACLs to limit access to administrative IPs only.

3. **Monitor & Detect**

   * Watch for suspicious RMI traffic, file uploads, or new binaries in system directories.
   * Review logs for unexpected Java process executions.

---

## 🚨 Why It Matters

💀 **Unauthenticated attacker** → No login needed
🧨 **Root privileges** → Complete system takeover
🌐 **Network exploitable** → Threats extend beyond internal networks

Because of these factors, this CVE is **one of the most critical in Cisco CCX history** and demands **urgent remediation**.

---

## 🕵️‍♂️ Indicators of Compromise (IoCs)

* Unexpected `.jar` or `.class` files in CCX temp directories
* Outbound connections from CCX host to unknown IPs
* New or modified system binaries with Java metadata

---
File Snapshot

[4.0K] /data/pocs/e58176c2077a2916347fc3cc417db9a743baef9f └── [2.7K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →