Impact
Cisco Unity Connection is vulnerable due to improper sanitization of user input in its web management interface, allowing an authenticated attacker to request and download any file on the affected system. The flaw is classified as CWE‑23, Directory Traversal, and can expose sensitive configuration files, client data, or credentials, thereby compromising confidentiality.
Affected Systems
All Cisco Unity Connection installations that have not been updated to the latest patch are affected; the advisory does not specify individual release numbers, so any running version prior to the vendor’s fix is potentially vulnerable.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, and the vulnerability is not currently listed in the CISA KEV catalog, suggesting no widespread exploitation has been reported. However, exploitation requires valid administrative credentials and a crafted HTTPS request, so the attack surface is restricted to users with privileged access. Once authenticated, the attacker can download arbitrary files without any additional escalation, making the risk significant for environments that store sensitive data on the Unity Connection server.
OpenCVE Enrichment