Description
Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker to download arbitrary files from an affected system. To exploit these vulnerabilities, the attacker must have valid administrative credentials. 

These vulnerabilities are due to improper sanitization of user input to the web-based management interface. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from an affected system.
Published: 2026-04-15
Score: 6.5 Medium
EPSS: n/a
KEV: No
Impact: Arbitrary file download by authenticated attackers
Action: Patch
AI Analysis

Impact

Cisco Unity Connection is vulnerable due to improper sanitization of user input in its web management interface, allowing an authenticated attacker to request and download any file on the affected system. The flaw is classified as CWE‑23, Directory Traversal, and can expose sensitive configuration files, client data, or credentials, thereby compromising confidentiality.

Affected Systems

All Cisco Unity Connection installations that have not been updated to the latest patch are affected; the advisory does not specify individual release numbers, so any running version prior to the vendor’s fix is potentially vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, and the vulnerability is not currently listed in the CISA KEV catalog, suggesting no widespread exploitation has been reported. However, exploitation requires valid administrative credentials and a crafted HTTPS request, so the attack surface is restricted to users with privileged access. Once authenticated, the attacker can download arbitrary files without any additional escalation, making the risk significant for environments that store sensitive data on the Unity Connection server.

Generated by OpenCVE AI on April 15, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Cisco-provided firmware or patch update that resolves the file download issue.
  • Restrict administrative access to the web-based management interface to trusted IP ranges or a VPN and enforce strong authentication such as two‑factor authentication.
  • If the web management interface is not required for daily operations, disable it or change its port to reduce exposure.

Generated by OpenCVE AI on April 15, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker to download arbitrary files from an affected system. To exploit these vulnerabilities, the attacker must have valid administrative credentials.  These vulnerabilities are due to improper sanitization of user input to the web-based management interface. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from an affected system.
Title Cisco Unity Connection Arbitrary File Download Vulnerability
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-15T17:06:38.080Z

Reserved: 2025-10-08T11:59:15.363Z

Link: CVE-2026-20078

cve-icon Vulnrichment

Updated: 2026-04-15T16:56:36.853Z

cve-icon NVD

Status : Received

Published: 2026-04-15T17:17:01.610

Modified: 2026-04-15T17:17:01.610

Link: CVE-2026-20078

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:30:12Z

Weaknesses