Particle.news
Download on the App Store

Cisco Patches Critical UCCX Flaws as New Firewall Attack Variant Emerges

The company reports no evidence of UCCX exploitation to date.

Overview

  • Cisco fixed CVE-2025-20354 and CVE-2025-20358 in Unified Contact Center Express, flaws that enable unauthenticated file upload, command execution with root, and authentication bypass via the CCX Editor.
  • Customers must upgrade to UCCX 12.5 SU3 ES07 or 15.0 ES01 to remediate the issues, and Cisco says no workarounds are available.
  • Cisco credited researcher Jahmel Harris for privately disclosing the UCCX bugs, and PSIRT says it has seen no public exploit code or in-the-wild attacks for these specific flaws.
  • Separately, Cisco shipped a fix for Cisco Identity Services Engine CVE-2025-20343, a high‑severity DoS issue that can force appliances to restart after crafted RADIUS requests.
  • Cisco also warned of a new attack variant against unpatched ASA and FTD firewalls vulnerable to CVE-2025-20333 and CVE-2025-20362 that triggers repeated reloads, with Cisco and US/UK agencies linking the activity to the ArcaneDoor/UAT4356 campaign.