6.5

CVE-2026-20081

Medienbericht

Cisco Unity Connection Arbitrary File Download Vulnerability

Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker to download arbitrary files from an affected system. To exploit these vulnerabilities, the attacker must have valid administrative credentials. 

These vulnerabilities are due to improper sanitization of user input to the web-based management interface. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from an affected system.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoUnity Connection Version <= 12.5
CiscoUnity Connection Version14.0
CiscoUnity Connection Version14su1
CiscoUnity Connection Version14su2
CiscoUnity Connection Version14su3
CiscoUnity Connection Version14su3a
CiscoUnity Connection Version14su4
CiscoUnity Connection Version14su5
CiscoUnity Connection Version15.0
CiscoUnity Connection Version15su1
CiscoUnity Connection Version15su2
CiscoUnity Connection Version15su3
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.115
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE-23 Relative Path Traversal

The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.