Cisco Unity Connection Remote Authenticated File Download via Web Interface
CVE-2026-20078 Published on April 15, 2026
Cisco Unity Connection Arbitrary File Download Vulnerability
Multiple vulnerabilities in Cisco Unity Connection could allow an authenticated, remote attacker to download arbitrary files from an affected system. To exploit these vulnerabilities, the attacker must have valid administrative credentials.
These vulnerabilities are due to improper sanitization of user input to the web-based management interface. An attacker could exploit these vulnerabilities by sending a crafted HTTPS request. A successful exploit could allow the attacker to download arbitrary files from an affected system.
Vulnerability Analysis
CVE-2026-20078 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
Relative Path Traversal
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Products Associated with CVE-2026-20078
Want to know whenever a new CVE is published for Cisco Unity Connection? stack.watch will email you.
Affected Versions
Cisco Unity Connection:- Version 12.5(1) is affected.
- Version 12.5(1)SU1 is affected.
- Version 12.5(1)SU2 is affected.
- Version 12.5(1)SU3 is affected.
- Version 12.5(1)SU4 is affected.
- Version 14 is affected.
- Version 12.5(1)SU5 is affected.
- Version 14SU1 is affected.
- Version 12.5(1)SU6 is affected.
- Version 14SU2 is affected.
- Version 12.5(1)SU7 is affected.
- Version 14SU3 is affected.
- Version 12.5(1)SU8 is affected.
- Version 14SU3a is affected.
- Version 12.5(1)SU8a is affected.
- Version 15 is affected.
- Version 15SU1 is affected.
- Version 14SU4 is affected.
- Version 12.5(1)SU9 is affected.
- Version 15SU2 is affected.
- Version 15SU3 is affected.
- Version 14SU5 is affected.