LOWCVE-2025-20277CVSS 3.4

Vulnerabilidade de Traversal de Caminho no Cisco Unified Contact Center Express

Plataforma

cisco

Componente

cisco-unified-contact-center-express

Corrigido em

10.6.1

10.5.1

10.6.1

12.0.1

10.0.1

10.6.1

11.0.1

11.5.1

10.5.1

11.6.1

11.6.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

12.5.1

11.6.1

11.6.1

12.5.1

12.0.1

12.5.1

12.5.1

11.6.1

12.5.1

12.0.1

12.0.1

11.6.1

12.0.1

11.6.1

11.6.1

11.6.1

11.6.1

10.6.1

11.0.1

10.6.1

10.5.1

10.0.1

11.5.1

11.6.1

11.5.1

9.0.1

10.6.1

10.6.1

11.6.1

10.6.1

11.5.1

11.5.1

8.5.1

11.0.1

12.5.1

12.5.1

12.5.1

12.5.1

AI Confidence: highNVDEPSS 0.0%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2025-20277 describes a Path Traversal vulnerability affecting Cisco Unified Contact Center Express. This flaw allows an authenticated, local attacker to potentially execute arbitrary code on the affected device. The vulnerability impacts versions 10.0(1)SU1 through 12.5(1)SU3. Cisco has advised users to upgrade to a patched version to remediate this issue.

Impacto e Cenários de Ataquetraduzindo…

Successful exploitation of CVE-2025-20277 could grant an attacker complete control over the Cisco Unified CCX device. This includes the ability to modify system configurations, steal sensitive data (call recordings, user credentials), and potentially pivot to other systems on the network. The requirement for administrative credentials limits the initial attack vector, but once gained, the impact is significant. The attack requires a crafted web request followed by a specific command via SSH, suggesting a degree of technical sophistication is needed, but the potential for remote code execution makes this a serious concern.

Contexto de Exploraçãotraduzindo…

CVE-2025-20277 was publicly disclosed on June 4, 2025. The CVSS score of 3.4 (LOW) indicates a relatively low probability of exploitation, but the potential impact warrants attention. There are currently no publicly available proof-of-concept exploits, but the path traversal nature of the vulnerability makes it likely that one will emerge. This vulnerability is not currently listed on the CISA KEV catalog.

Quem Está em Riscotraduzindo…

Organizations heavily reliant on Cisco Unified Contact Center Express for their contact center operations are at significant risk. This includes businesses with legacy deployments of older, unpatched versions (10.0(1)SU1–12.5(1)SU3) and those with limited resources for timely patching. Shared hosting environments where multiple tenants share a single CCX instance are also particularly vulnerable.

Passos de Detecçãotraduzindo…

• linux / server:

journalctl -u ccx | grep -i "path traversal"

• cisco / server:

show running-config | grep -i "path traversal"

• generic web:

curl -I <CCX_IP>/<vulnerable_endpoint> | grep -i "path traversal"

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetBaixa

EPSS

0.04% (percentil 12%)

CISA SSVC

Exploraçãonone
Automatizávelno
Impacto Técnicototal

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N3.4LOWAttack VectorLocalComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredHighNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityLowRisco de exposição de dados sensíveisIntegrityLowRisco de modificação não autorizada de dadosAvailabilityNoneRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Local — o atacante precisa de sessão local ou shell no sistema.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Alto — conta de administrador ou privilegiada necessária.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Baixo — acesso parcial ou indireto a alguns dados.
Integrity
Baixo — o atacante pode modificar alguns dados com alcance limitado.
Availability
Nenhum — sem impacto na disponibilidade.

Software Afetado

Componentecisco-unified-contact-center-express
FornecedorCisco
Faixa afetadaCorrigido em
10.6(1) – 10.6(1)10.6.1
10.5(1)SU1 – 10.5(1)SU110.5.1
10.6(1)SU3 – 10.6(1)SU310.6.1
12.0(1) – 12.0(1)12.0.1
10.0(1)SU1 – 10.0(1)SU110.0.1
10.6(1)SU1 – 10.6(1)SU110.6.1
11.0(1)SU1 – 11.0(1)SU111.0.1
11.5(1)SU1 – 11.5(1)SU111.5.1
10.5(1) – 10.5(1)10.5.1
11.6(1) – 11.6(1)11.6.1
11.6(2) – 11.6(2)11.6.1
12.5(1) – 12.5(1)12.5.1
12.5(1)SU1 – 12.5(1)SU112.5.1
12.5(1)SU2 – 12.5(1)SU212.5.1
12.5(1)SU3 – 12.5(1)SU312.5.1
12.5(1)_SU03_ES01 – 12.5(1)_SU03_ES0112.5.1
12.5(1)_SU03_ES02 – 12.5(1)_SU03_ES0212.5.1
12.5(1)_SU02_ES03 – 12.5(1)_SU02_ES0312.5.1
12.5(1)_SU02_ES04 – 12.5(1)_SU02_ES0412.5.1
12.5(1)_SU02_ES02 – 12.5(1)_SU02_ES0212.5.1
12.5(1)_SU01_ES02 – 12.5(1)_SU01_ES0212.5.1
12.5(1)_SU01_ES03 – 12.5(1)_SU01_ES0312.5.1
12.5(1)_SU02_ES01 – 12.5(1)_SU02_ES0112.5.1
11.6(2)ES07 – 11.6(2)ES0711.6.1
11.6(2)ES08 – 11.6(2)ES0811.6.1
12.5(1)_SU01_ES01 – 12.5(1)_SU01_ES0112.5.1
12.0(1)ES04 – 12.0(1)ES0412.0.1
12.5(1)ES02 – 12.5(1)ES0212.5.1
12.5(1)ES03 – 12.5(1)ES0312.5.1
11.6(2)ES06 – 11.6(2)ES0611.6.1
12.5(1)ES01 – 12.5(1)ES0112.5.1
12.0(1)ES03 – 12.0(1)ES0312.0.1
12.0(1)ES01 – 12.0(1)ES0112.0.1
11.6(2)ES05 – 11.6(2)ES0511.6.1
12.0(1)ES02 – 12.0(1)ES0212.0.1
11.6(2)ES04 – 11.6(2)ES0411.6.1
11.6(2)ES03 – 11.6(2)ES0311.6.1
11.6(2)ES02 – 11.6(2)ES0211.6.1
11.6(2)ES01 – 11.6(2)ES0111.6.1
10.6(1)SU3ES03 – 10.6(1)SU3ES0310.6.1
11.0(1)SU1ES03 – 11.0(1)SU1ES0311.0.1
10.6(1)SU3ES01 – 10.6(1)SU3ES0110.6.1
10.5(1)SU1ES10 – 10.5(1)SU1ES1010.5.1
10.0(1)SU1ES04 – 10.0(1)SU1ES0410.0.1
11.5(1)SU1ES03 – 11.5(1)SU1ES0311.5.1
11.6(1)ES02 – 11.6(1)ES0211.6.1
11.5(1)ES01 – 11.5(1)ES0111.5.1
9.0(2)SU3ES04 – 9.0(2)SU3ES049.0.1
10.6(1)SU2 – 10.6(1)SU210.6.1
10.6(1)SU2ES04 – 10.6(1)SU2ES0410.6.1
11.6(1)ES01 – 11.6(1)ES0111.6.1
10.6(1)SU3ES02 – 10.6(1)SU3ES0210.6.1
11.5(1)SU1ES02 – 11.5(1)SU1ES0211.5.1
11.5(1)SU1ES01 – 11.5(1)SU1ES0111.5.1
8.5(1) – 8.5(1)8.5.1
11.0(1)SU1ES02 – 11.0(1)SU1ES0211.0.1
12.5(1)_SU03_ES03 – 12.5(1)_SU03_ES0312.5.1
12.5(1)_SU03_ES04 – 12.5(1)_SU03_ES0412.5.1
12.5(1)_SU03_ES05 – 12.5(1)_SU03_ES0512.5.1
12.5(1)_SU03_ES06 – 12.5(1)_SU03_ES0612.5.1

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado
Sem correção — 354 dias desde a divulgação

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2025-20277 is to upgrade to a patched version of Cisco Unified Contact Center Express as soon as it becomes available. If an immediate upgrade is not possible, restrict access to the web-based management interface to only trusted administrators. Implement strong authentication measures, including multi-factor authentication, to prevent unauthorized access. Consider using a web application firewall (WAF) to filter potentially malicious requests targeting the vulnerable endpoint. Monitor system logs for suspicious activity, particularly SSH login attempts and unusual web requests.

Como corrigir

Atualize o Cisco Unified Contact Center Express para uma versão que não seja afetada por esta vulnerabilidade. Consulte o advisory de segurança da Cisco para obter mais detalhes e as versões corrigidas.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2025-20277 — Path Traversal in Cisco Unified CCX?

CVE-2025-20277 is a vulnerability in Cisco Unified Contact Center Express allowing authenticated local attackers to execute code via a path traversal flaw. It affects versions 10.0(1)SU1–12.5(1)SU3.

Am I affected by CVE-2025-20277 in Cisco Unified CCX?

If you are using Cisco Unified Contact Center Express versions 10.0(1)SU1 through 12.5(1)SU3, you are potentially affected by this vulnerability. Check your current version and upgrade if necessary.

How do I fix CVE-2025-20277 in Cisco Unified CCX?

The recommended fix is to upgrade to a patched version of Cisco Unified Contact Center Express as soon as it becomes available. Until then, restrict access and monitor logs.

Is CVE-2025-20277 being actively exploited?

As of June 4, 2025, there are no confirmed reports of active exploitation, but the vulnerability's nature suggests potential for future exploitation.

Where can I find the official Cisco advisory for CVE-2025-20277?

Please refer to the official Cisco Security Advisory for CVE-2025-20277 on the Cisco website (search for the CVE ID on Cisco.com).

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.