cve/2025/CVE-2025-20326.md
2025-09-29 21:09:30 +02:00

40 lines
3.1 KiB
Markdown

### [CVE-2025-20326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20326)
![](https://img.shields.io/static/v1?label=Product&message=Cisco%20Unified%20Communications%20Manager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU7a%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU8%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU8a%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=12.5(1)SU9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=14%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=14SU1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=14SU2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=14SU3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=14SU4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=14SU4a%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=15%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=15SU1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=15SU1a%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=15SU2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Request%20Forgery%20(CSRF)&color=brightgreen)
### Description
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) Software and Cisco Unified CM Session Management Edition (SME) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/fkie-cad/nvd-json-data-feeds