Cisco Meeting Management Vulnerability Allows Authenticated Attackers to Gain Root Access

Cisco Meeting Management Vulnerability Allows Authenticated Attackers to Gain Root Access

Cisco has released a security advisory for CVE-2026-20098, a high-severity vulnerability in Cisco Meeting Management that allows authenticated remote attackers to upload arbitrary files, execute commands, and escalate privileges to root.

The flaw carries a CVSS score of 8.8 and affects all versions of Cisco Meeting Management prior to 3.12.1 MR. No workarounds are available — patching is the only remediation.

Vulnerability Details

The vulnerability exists in the Certificate Management feature of the web-based management interface due to improper input validation. An attacker with valid credentials for a user account with at least the "video operator" role can send a crafted HTTP request to upload arbitrary files to the system.

The uploaded files can overwrite system files processed by the root account, enabling arbitrary command execution with root privileges. This effectively grants complete control over the affected server.

Affected Versions

All Cisco Meeting Management releases 3.12 and earlier are vulnerable regardless of device configuration.

Fixed Release: 3.12.1 MR

Exploitation Status

Cisco PSIRT is not aware of any public announcements or malicious exploitation of this vulnerability in the wild.

Discovery

The vulnerability was reported by the NATO Cyber Security Centre Penetration Testing Team.

Recommendation

Organizations running Cisco Meeting Management should upgrade to version 3.12.1 MR immediately. The authentication requirement (video operator role) lowers the attack surface somewhat, but compromised credentials or insider threats could enable exploitation. No workarounds or mitigations are available short of patching.

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire