CVE-2026-20034 PUBLISHED

Cisco Unity Connection Remote Code Execution Vulnerability

Assigner: cisco
Reserved: 08.10.2025 Published: 06.05.2026 Updated: 07.05.2026

A vulnerability in the web-based management interface of Cisco Unity Connection could allow an authenticated, remote attacker to execute arbitrary code on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of a targeted device. To exploit this vulnerability, the attacker must have valid user credentials on the affected device.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor Cisco
Product Cisco Unity Connection
Versions Default: unknown
  • Version 12.5(1) is affected
  • Version 12.5(1)SU1 is affected
  • Version 12.5(1)SU2 is affected
  • Version 12.5(1)SU3 is affected
  • Version 12.5(1)SU4 is affected
  • Version 14 is affected
  • Version 12.5(1)SU5 is affected
  • Version 14SU1 is affected
  • Version 12.5(1)SU6 is affected
  • Version 14SU2 is affected
  • Version 12.5(1)SU7 is affected
  • Version 14SU3 is affected
  • Version 12.5(1)SU8 is affected
  • Version 14SU3a is affected
  • Version 12.5(1)SU8a is affected
  • Version 15 is affected
  • Version 15SU1 is affected
  • Version 14SU4 is affected
  • Version 12.5(1)SU9 is affected
  • Version 15SU2 is affected
  • Version 15SU3 is affected

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

References

Problem Types

  • Path Traversal: '.../...//' cwe