Cisco has issued updates to address a critical security flaw in its Meeting Management software, identified as CVE-2025-20156, with a severity score of 9.9. The vulnerability allows remote, authenticated attackers to gain administrator privileges through the REST API due to insufficient authorization enforcement. Affected versions include release 3.9 (patched in 3.9.1) and all versions earlier than 3.8, with release 3.10 unaffected. Cisco credited Ben Leonard-Lagarde of Modux for reporting the issue and strongly advises users to update to secure versions.
In addition, Cisco addressed a denial-of-service (DoS) flaw in its BroadWorks platform, tracked as CVE-2025-20165, with a CVSS score of 7.5. This issue arises from improper memory handling of certain Session Initiation Protocol (SIP) requests. Exploiting this vulnerability could exhaust server memory, disrupting SIP traffic processing and requiring manual recovery.
Cisco resolved this flaw in BroadWorks version RI.2024.11, urging organizations to update promptly.
A third vulnerability, CVE-2025-20128, affecting ClamAV’s OLE2 decryption routine, was also patched. This integer underflow flaw could lead to a DoS condition, and while proof-of-concept exploit code exists, there is no evidence of its use in active attacks. Cisco acknowledged Google OSS-Fuzz for identifying this issue, reinforcing the need for organizations to maintain up-to-date security defenses.
Meanwhile, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and FBI disclosed details about exploit chains targeting Ivanti cloud applications in 2024. These chains combined vulnerabilities like CVE-2024-8963, CVE-2024-8190, CVE-2024-9380, and CVE-2024-9379, enabling attackers to perform actions such as remote code execution and credential theft. Organizations using affected Ivanti systems are urged to consider credentials and sensitive data potentially compromised and take immediate security measures to mitigate further risks.