Security

Patches

Patch now: Cisco fixes critical 9.9-rated, make-me-admin bug in Meeting Management

No in-the-wild exploits … yet


Cisco has pushed a patch for a critical, 9.9-rated vulnerability in its Meeting Management tool that could allow a remote, authenticated attacker with low privileges to escalate to administrator on affected devices.

Cisco Meeting Management is the management software for the tech giant's on-premises video meeting platform.

The flaw, tracked as CVE-2025-20156, exists due to a failure to enforce proper authorization for REST API users, and it's pretty easy to exploit.

"An attacker could exploit this vulnerability by sending API requests to a specific endpoint," and this could allow admin-level access over edge nodes, which are components of Cisco's video conferencing infrastructure managed by this tool, the biz warned in a Wednesday security alert.

The vulnerability affects most Cisco Meeting Management releases, regardless of device configuration, and there is no workaround at the time. There is a fix, however, so we'd suggest installing the software update that patches this hole ASAP.

For anyone using Cisco Meeting Management 3.8 and earlier: the fix involves migrating to a supported version. Release 3.9 should upgrade to version 3.9.1, and 3.10 is not affected by the vulnerability.

While the networking giant isn't aware of any in-the-wild exploits of this flaw, it's probably just a matter of time until that happens, or a Proof-of-Concept (PoC) exploit surfaces. So, get patching.

Cisco credited Modux bug hunter Ben Leonard-Lagarde with initially disclosing this vulnerability. ®

Send us news
Post a comment

Cisco patches two critical Identity Services Engine flaws

One gives root access, the other lets you steal info and reconfig nodes, in the right (or should that be wrong) circumstances

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Oops, some of our customers' Power Pages-hosted sites were exploited, says Microsoft

Don't think this is SaaS and you can relax: Redmond wants a few of you to check your websites

Cisco says it’s already dug in to protect itself – and customers – if trade war breaks out

Also reckons it can dodge DOGE

Yup, AMD's Elba and Giglio definitely sound like they work corporate security

Which is why Cisco is adding these Pensando DPUs to more switches

Google patches odd Android kernel security bug amid signs of targeted exploitation

Also, Netgear fixes critical router, access point vulnerabilities

Microsoft fixes under-attack privilege-escalation holes in Hyper-V

Plus: Excel hell, angst for Adobe fans, and life's too Snort for Cisco

VMware plugs steal-my-credentials holes in Cloud Foundation

Consider patching soon because cybercrooks love to hit vulnerable tools from Broadcom's virtualization giant

Apple plugs security hole in its iThings that's already been exploited in iOS

Cupertino kicks off the year with a zero-day

Asus lets processor security fix slip out early, AMD confirms patch in progress

Answers on a postcard to what 'Microcode Signature Verification Vulnerability' might mean

Don't want your Kubernetes Windows nodes hijacked? Patch this hole now

SYSTEM-level command injection via API parameter *chef's kiss*

Oracle emits 603 patches, names one it wants you to worry about soon

Old flaws that keep causing trouble haunt Big Red