Threat Advisory

Multiple Cisco Unity Connection Vulnerabilities Exploited

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: Medium
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

Multiple security vulnerabilities have been identified in Cisco Unity Connection, including arbitrary file download vulnerabilities and cross-site scripting, open redirect, and SQL injection vulnerabilities. These vulnerabilities affect Cisco Unity Connection, regardless of device configuration, and could allow an authenticated, remote attacker to conduct a variety of malicious activities. The exploitation of these vulnerabilities could lead to unauthorized access to sensitive information, execution of arbitrary code, and other business risks. The successful exploitation of these vulnerabilities could also result in financial losses, reputational damage, and compromised business operations. The vulnerabilities are due to improper sanitization of user input to the web-based management interface and can be exploited by sending a crafted HTTPS request. To fully remediate these vulnerabilities, Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

Multiple security vulnerabilities have been identified in Cisco Unity Connection, including arbitrary file download vulnerabilities and cross-site scripting, open redirect, and SQL injection vulnerabilities. These vulnerabilities affect Cisco Unity Connection, regardless of device configuration, and could allow an authenticated, remote attacker to conduct a variety of malicious activities. The exploitation of these vulnerabilities could lead to unauthorized access to sensitive information, execution of arbitrary code, and other business risks. The successful exploitation of these vulnerabilities could also result in financial losses, reputational damage, and compromised business operations. The vulnerabilities are due to improper sanitization of user input to the web-based management interface and can be exploited by sending a crafted HTTPS request. To fully remediate these vulnerabilities, Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory.[emaillocker id="1283"]

CVE-2026-20059 – A cross-site scripting vulnerability with a CVSS score of 6.1 that allows a remote attacker to execute malicious scripts in a user’s browser due to improper input validation.

CVE-2026-20060 – An open redirect vulnerability with a CVSS score of 6.1 that could allow an attacker to redirect users to malicious websites and facilitate phishing attacks.

CVE-2026-20061 – A SQL injection vulnerability with a CVSS score of 8.8 that could allow unauthorized access to or manipulation of backend database data due to insufficient input sanitization.

CVE-2026-20078 – An arbitrary file download vulnerability with a CVSS score of 7.5 that allows an authenticated attacker to access sensitive system files due to improper access controls.

CVE-2026-20081 – An arbitrary file download vulnerability with a CVSS score of 7.5 that could allow attackers with valid credentials to retrieve sensitive files via crafted requests.

The presence of multiple vulnerabilities increases the risk of unauthorized access and exposure of sensitive information within affected systems. Timely patching is necessary to reduce the likelihood of exploitation and limit potential impact on system integrity.

RECOMMENDATION:

We recommend you to update Cisco Unity Connection to the following fixed versions:

  • 5 and earlier to version Migrate to a fixed release.
  • 14 to version 14SU6
  • 15 to version 15SU4

REFERENCES:

The following reports contain further technical details:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unity-file-download-RmKEVWPx?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Unity%20Connection%20Arbitrary%20File%20Download%20Vulnerabilities%26vs_k=1
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unity-vulns-n2EJSbbw?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20Unity%20Connection%20Cross-Site%20Scripting

[/emaillocker]
crossmenu