Cisco Unity Connection Authenticated RCE via API Input Validation
CVE-2026-20034 Published on May 6, 2026
Cisco Unity Connection Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to execute arbitrary code on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of a targeted device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device.
Vulnerability Analysis
CVE-2026-20034 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Path Traversal: '.../...//'
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Products Associated with CVE-2026-20034
Want to know whenever a new CVE is published for Cisco Unity Connection? stack.watch will email you.
Affected Versions
Cisco Unity Connection:- Version 12.5(1) is affected.
- Version 12.5(1)SU1 is affected.
- Version 12.5(1)SU2 is affected.
- Version 12.5(1)SU3 is affected.
- Version 12.5(1)SU4 is affected.
- Version 14 is affected.
- Version 12.5(1)SU5 is affected.
- Version 14SU1 is affected.
- Version 12.5(1)SU6 is affected.
- Version 14SU2 is affected.
- Version 12.5(1)SU7 is affected.
- Version 14SU3 is affected.
- Version 12.5(1)SU8 is affected.
- Version 14SU3a is affected.
- Version 12.5(1)SU8a is affected.
- Version 15 is affected.
- Version 15SU1 is affected.
- Version 14SU4 is affected.
- Version 12.5(1)SU9 is affected.
- Version 15SU2 is affected.
- Version 15SU3 is affected.