HomeCiscoCVE-2025-20358

CVE-2025-20358

CRITICAL
9.4CVSS
Published: 2025-11-05
Updated: 2025-11-07
AI Analysis

Description

A vulnerability in the Contact Center Express (CCX) Editor application of Cisco Unified CCX could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative permissions pertaining to script creation and execution. This vulnerability is due to improper authentication mechanisms in the communication between the CCX Editor and an affected Unified CCX server. An attacker could exploit this vulnerability by redirecting the authentication flow to a malicious server and tricking the CCX Editor into believing the authentication was successful. A successful exploit could allow the attacker to create and execute arbitrary scripts on the underlying operating system of an affected Unified CCX server, as an internal non-root user account.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
low
Weaknesses
CWE-306

Metadata

Primary Vendor
CISCO
Published
11/5/2025
Last Modified
11/7/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

cisco : unified_contact_center_expresscisco : unified_contact_center_express

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-20358 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com