8.8

CVE-2026-20034

Medienbericht

Cisco Unity Connection Remote Code Execution Vulnerability

A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to execute arbitrary code on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of a targeted device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Unity Connection
Default Statusunknown
Version 12.5(1)
Status affected
Version 12.5(1)SU1
Status affected
Version 12.5(1)SU2
Status affected
Version 12.5(1)SU3
Status affected
Version 12.5(1)SU4
Status affected
Version 14
Status affected
Version 12.5(1)SU5
Status affected
Version 14SU1
Status affected
Version 12.5(1)SU6
Status affected
Version 14SU2
Status affected
Version 12.5(1)SU7
Status affected
Version 14SU3
Status affected
Version 12.5(1)SU8
Status affected
Version 14SU3a
Status affected
Version 12.5(1)SU8a
Status affected
Version 15
Status affected
Version 15SU1
Status affected
Version 14SU4
Status affected
Version 12.5(1)SU9
Status affected
Version 15SU2
Status affected
Version 15SU3
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.45% 0.635
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-35 Path Traversal: '.../...//'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.