--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in Cisco Unity Connection' number: '2024-005' version: '1.0' original_date: 'January 10, 2024' date: 'January 11, 2024' --- _History:_ * _11/01/2024 --- v1.0 -- Initial publication_ # Summary On January 10, 2024, Cisco disclosed a critical vulnerability in its Unity Connection product [1]. This vulnerability, tracked as `CVE-2024-20272` with a CVSS score of 7.3, could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system and execute commands on the underlying operating system. Currently, Cisco has no evidence of public proof of concept exploits for this vulnerability or active exploitation in the wild. # Technical Details This vulnerability is due to a lack of authentication in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by uploading arbitrary files to an affected system. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root. # Affected Products The following versions are affected [2]: - 12.5 and earlier, before the first fixed release (`12.5.1.19017-4`) - 14 before the first fixed release (`14.0.1.14006-5`) # Recommendations CERT-EU recommends updating to the latest version of Cisco Unity Connection as soon as possible to mitigate this vulnerability. # References [1] [2]