Brief Summary: Cisco Unified CCX Java RMI Unauthenticated RCE (CVE-2025-20354)

This post provides a brief summary of CVE-2025-20354, a critical unauthenticated remote code execution vulnerability in Cisco Unified Contact Center Express (CCX) via the Java RMI process. The flaw allows remote attackers to upload arbitrary files and execute commands as root due to improper authentication. Details include affected versions, technical mechanism, and vendor history.
CVE Analysis

8 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-11-05

Brief Summary: Cisco Unified CCX Java RMI Unauthenticated RCE (CVE-2025-20354)
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Remote attackers can gain root access to Cisco Unified Contact Center Express (CCX) systems with no credentials or user interaction required. This vulnerability enables arbitrary file upload and command execution through the Java RMI process, directly impacting the security of enterprise contact center infrastructure. Cisco Unified CCX is a widely deployed platform for managing customer interactions in organizations worldwide, making this issue highly relevant for any enterprise using Cisco's contact center solutions.

Technical Information

CVE-2025-20354 is caused by improper authentication in the Java Remote Method Invocation (RMI) process within Cisco Unified CCX. The RMI interface, typically exposed on TCP port 1099, is used for inter-process communication in the CCX architecture. Specific RMI endpoints fail to enforce authentication, allowing unauthenticated remote attackers to send crafted RMI requests that invoke file upload functionality.

The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type). Attackers can upload arbitrary files to the affected system, which are then executed with root privileges. This enables full remote code execution on the underlying operating system. The attack requires only network access to the vulnerable RMI interface; no credentials or user interaction are needed. The flaw affects the core communication mechanism of CCX, making exploitation straightforward for anyone with network visibility to the RMI service.

No public code snippets or proof of concept are available as of the advisory date. The vulnerability does not depend on any specific configuration beyond having an exposed and unpatched RMI interface on a vulnerable CCX version.

Affected Systems and Versions

CVE-2025-20354 affects Cisco Unified Contact Center Express (Unified CCX) across multiple major versions. The official Cisco advisory confirms the following:

  • Cisco Unified CCX versions prior to the fixed releases listed in the advisory are vulnerable.
  • The vulnerability is present in default deployments where the Java RMI process is enabled and accessible.
  • Other Cisco contact center products such as Packaged CCE and Unified CCE are not affected by this specific issue.

Organizations must consult the Cisco advisory (see references) for exact affected and fixed version numbers, as these may vary based on deployment and release track.

Vendor Security History

Cisco has experienced several critical vulnerabilities in its unified communications and infrastructure products in 2025. Notable recent issues include unauthenticated remote code execution in Cisco Identity Services Engine (CVSS 10.0) and static SSH credential flaws in Unified Communications Manager. Cisco's PSIRT typically publishes advisories and patches in response, but the frequency and severity of recent disclosures highlight ongoing architectural and security challenges in their enterprise product lines.

References

Detect & fix
what others miss