CVE-2026-20078
Arbitrary File Download via Input Validation Flaw in Cisco Unity Connection
Publication date: 2026-04-15
Last updated on: 2026-04-28
Assigner: Cisco Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cisco | unity_connection | 14.0 |
| cisco | unity_connection | 14su3 |
| cisco | unity_connection | 14su2 |
| cisco | unity_connection | 14su1 |
| cisco | unity_connection | 14su3a |
| cisco | unity_connection | 14su4 |
| cisco | unity_connection | 14su5 |
| cisco | unity_connection | 15.0 |
| cisco | unity_connection | 15su1 |
| cisco | unity_connection | 15su2 |
| cisco | unity_connection | 15su3 |
| cisco | unity_connection | to 12.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
A successful exploit of this vulnerability could allow an attacker with administrative credentials to download arbitrary files from the affected system.
This could lead to unauthorized disclosure of sensitive information stored on the system.
The CVSS score of 6.5 indicates a medium severity impact, with high confidentiality impact but no impact on integrity or availability.
Can you explain this vulnerability to me?
This vulnerability affects Cisco Unity Connection and involves multiple security issues that allow an authenticated remote attacker to download arbitrary files from the affected system.
The attacker must have valid administrative credentials to exploit these vulnerabilities.
The root cause is improper sanitization of user input in the web-based management interface, which can be exploited by sending a specially crafted HTTPS request.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows an authenticated attacker with administrative credentials to download arbitrary files from the affected system due to improper input sanitization in the web-based management interface.
Such unauthorized access to sensitive files could potentially lead to exposure of personal or protected data, which may impact compliance with data protection regulations such as GDPR or HIPAA.
However, the provided information does not explicitly describe the specific impact on compliance with these standards.