Introduction

Cisco has identified a critical security vulnerability in its Meeting Management tool, which could allow attackers to gain unauthorized administrative access. This vulnerability, designated CVE-2025-20156 [2], poses a significant risk to systems using affected versions of the software.

Description

Cisco has released security updates to address a critical privilege escalation vulnerability [1] [3], designated CVE-2025-20156 [2], in its Meeting Management tool [2] [4] [8], which is utilized for managing meetings on Cisco Meeting Server. This flaw has been assigned a severity score of 9.9 under CVSS 3.0, indicating its critical nature, and arises from inadequate authorization enforcement within the REST API [4]. The vulnerability allows remote [3] [4] [6] [7], authenticated attackers with low privileges to escalate their access to administrator status by sending specially crafted API requests to specific endpoints [4]. Successful exploitation could grant attackers administrator-level control over edge nodes managed by Cisco Meeting Management [3] [4] [6].

The vulnerability affects Cisco Meeting Management versions 3.8 and 3.9 and necessitates an upgrade to version 3.9.1, which includes the necessary patches. Version 3.10 is not impacted by this vulnerability. Cisco has stated that there are no workarounds available and urges customers to apply the necessary software updates immediately to mitigate this risk. Currently, Cisco PSIRT is not aware of any active exploitation of this vulnerability in the wild [3]. Customers with service contracts can obtain security fixes through their usual update channels [1], while those without can contact the Technical Assistance Center for assistance [1]. Users are also advised to check hardware and software compatibility before upgrading [1]. Further analysis by the US National Vulnerability Database (NVD) is pending [2]. For additional information, a reference link is available: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc [5]. The vulnerability was reported by Ben Leonard-Lagarde from Modux [3] [4], a pentesting firm based in Bristol [4].

Conclusion

The CVE-2025-20156 vulnerability in Cisco’s Meeting Management tool represents a critical security threat, necessitating immediate action from users to upgrade to the patched version 3.9.1. While no active exploitation has been reported, the potential for significant impact underscores the importance of timely updates. Users should remain vigilant and ensure compatibility checks are performed prior to upgrading. Future analyses by security databases will provide further insights into the vulnerability’s implications.

References

[1] https://www.techworm.net/2025/01/cisco-privilege-escalation-vulnerability-software.html
[2] https://www.infosecurity-magazine.com/news/cisco-critical-vulnerability/
[3] https://securityaffairs.com/173361/security/cisco-meeting-management-critical-flaw.html
[4] https://www.helpnetsecurity.com/2025/01/23/cisco-clamav-cve-2025-20128-meeting-management-cve-2025-20156/
[5] https://cvefeed.io/vuln/detail/CVE-2025-20156
[6] https://www.heise.de/en/news/Cisco-Critical-security-vulnerability-in-Meeting-Management-10253851.html
[7] https://www.tenable.com/cve/CVE-2025-20156
[8] https://www.cert.be/en/advisory/warning-critical-privilege-escalation-vulnerability-cisco-meeting-management-patch