CVE-2026-20078
Received Received - Intake
Arbitrary File Download via Input Validation Flaw in Cisco Unity Connection

Publication date: 2026-04-15

Last updated on: 2026-04-28

Assigner: Cisco Systems, Inc.

Description
Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker to download arbitrary files from an affected system. To exploit these vulnerabilities, the attacker must have valid administrative credentials.  These vulnerabilities are due to improper sanitization of user input to the web-based management interface. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from an affected system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 12 associated CPEs
Vendor Product Version / Range
cisco unity_connection 14.0
cisco unity_connection 14su3
cisco unity_connection 14su2
cisco unity_connection 14su1
cisco unity_connection 14su3a
cisco unity_connection 14su4
cisco unity_connection 14su5
cisco unity_connection 15.0
cisco unity_connection 15su1
cisco unity_connection 15su2
cisco unity_connection 15su3
cisco unity_connection to 12.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

A successful exploit of this vulnerability could allow an attacker with administrative credentials to download arbitrary files from the affected system.

This could lead to unauthorized disclosure of sensitive information stored on the system.

The CVSS score of 6.5 indicates a medium severity impact, with high confidentiality impact but no impact on integrity or availability.


Can you explain this vulnerability to me?

This vulnerability affects Cisco Unity Connection and involves multiple security issues that allow an authenticated remote attacker to download arbitrary files from the affected system.

The attacker must have valid administrative credentials to exploit these vulnerabilities.

The root cause is improper sanitization of user input in the web-based management interface, which can be exploited by sending a specially crafted HTTPS request.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an authenticated attacker with administrative credentials to download arbitrary files from the affected system due to improper input sanitization in the web-based management interface.

Such unauthorized access to sensitive files could potentially lead to exposure of personal or protected data, which may impact compliance with data protection regulations such as GDPR or HIPAA.

However, the provided information does not explicitly describe the specific impact on compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart