Impact
A flaw in the web‑based management interface permits an authenticated attacker to send a crafted API request that bypasses input validation, enabling execution of arbitrary code with root privileges. The consequence is a full compromise of the affected device, exposing all data and services it hosts.
Affected Systems
Cisco Unity Connection is affected; no specific version range is disclosed in the advisory, so all installation points requiring the web interface should be considered at risk.
Risk and Exploitability
The CVSS score of 8.8 classifies this as high severity. EPSS information is unavailable, and the vulnerability is not listed in CISA KEV. Attacks require valid user credentials and remote access to the management interface, indicating the likely attack vector is authenticated API requests over the network.
OpenCVE Enrichment