CVE-2026-20035
Received Received - Intake
Cisco Unity Connection Web Inbox SSRF Vulnerability

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: Cisco Systems, Inc.

Description
A vulnerability in the web UI of Cisco Unity Connection Web Inbox could allow an unauthenticated, remote attacker to conduct SSRF attacks through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cisco unity_connection_web_inbox *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the web UI of Cisco Unity Connection Web Inbox and allows an unauthenticated, remote attacker to perform Server-Side Request Forgery (SSRF) attacks.

It is caused by improper input validation of specific HTTP requests, which means the system does not correctly check or restrict the input it receives.

An attacker can exploit this by sending a specially crafted HTTP request to the affected device, enabling them to make arbitrary network requests that appear to originate from the vulnerable device itself.


How can this vulnerability impact me? :

Exploitation of this vulnerability could allow an attacker to send arbitrary network requests from the affected device, potentially accessing internal systems or services that are otherwise protected.

This could lead to unauthorized access to sensitive information or systems, information disclosure, and could be used as a stepping stone for further attacks within a network.

The CVSS score of 7.2 indicates a high severity, meaning the impact on confidentiality and integrity is significant, although availability is not affected.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an unauthenticated, remote attacker to conduct SSRF attacks, potentially enabling unauthorized access to internal systems or external resources through the affected device.

Such unauthorized access and potential data exposure could impact compliance with standards and regulations like GDPR and HIPAA, which require protection of sensitive data and secure system access.

However, the provided information does not explicitly detail the direct effects on compliance with these regulations.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade to the fixed software releases provided by Cisco, such as versions 14SU5, 15SU4, or apply the specific patch file for version 15.0.

There are no available workarounds, so applying the official updates is the only effective mitigation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart