Description
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP(S) request to the web-based management interface of an affected device. A successful exploit could allow the attacker to view data on the affected device.
Published: 2026-04-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidential Data Disclosure
Action: Apply Patch
AI Analysis

Impact

A vulnerability in the web‑based management interface of Cisco Unity Connection permits an authenticated remote attacker to inject SQL statements by sending a specially crafted HTTP(S) request. The flaw stems from insufficient validation of user‑supplied input, consistent with CWE‑89. Successful exploitation enables the attacker to read data stored on the affected device, thereby compromising the confidentiality of that information. The impact is limited to disclosure; there is no evidence of privilege escalation or execution of arbitrary code.

Affected Systems

The vendor and product affected is Cisco Unity Connection. Specific version information is not publicly disclosed in the available advisory, so all installations of Cisco Unity Connection that remain unpatched are potentially vulnerable unless a later update contains a fix.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate overall rating. EPSS data is not available, and the vulnerability is not listed in CISA's KEV catalog, suggesting the exploit has not been observed in the wild. Attackers must possess valid credentials and use the web management interface, suggesting the attack vector is remote but authenticated. Inferred from the description, the attacker can send crafted requests over the network to perform the injection. The risk level is moderate, with the primary concern being unauthorized data access rather than system compromise.

Generated by OpenCVE AI on April 15, 2026 at 22:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco Unity Connection patch or firmware revision that addresses the SQL injection flaw.
  • Reduce the attack surface by restricting public or external access to the web‑based management interface and enforce least‑privilege access for user accounts.
  • Continuously monitor authentication logs for unusual activity.

Generated by OpenCVE AI on April 15, 2026 at 22:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco unity Connection
Vendors & Products Cisco
Cisco unity Connection

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to perform an SQL injection attack against an affected device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP(S) request to the web-based management interface of an affected device. A successful exploit could allow the attacker to view data on the affected device.
Title Cisco Unity Connection SQL Injection Vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Cisco Unity Connection
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-15T16:56:34.089Z

Reserved: 2025-10-08T11:59:15.356Z

Link: CVE-2026-20061

cve-icon Vulnrichment

Updated: 2026-04-15T16:56:14.498Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-15T17:17:01.433

Modified: 2026-04-17T15:09:46.880

Link: CVE-2026-20061

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T22:30:16Z

Weaknesses