CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 15, 2026

CVE-2026-20060 | Cisco Unity Connection up to 15SU3 Web-based Management Interface Request redirect (cisco-sa-unity-vulns-n2EJSbbw / EUVD-2026-22953)

VulDB Archived Apr 15, 2026 ✓ Full text saved

A vulnerability was found in Cisco Unity Connection up to 15SU3 and classified as problematic . This issue affects some unknown processing of the component Web-based Management Interface . Such manipulation of the argument Request leads to open redirect. This vulnerability is documented as CVE-2026-20060 . The attack can be executed remotely. There is not any exploit available. It is suggested to upgrade the affected component.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-357747 · CVE-2026-20060 · EUVD-2026-22953 CISCO UNITY CONNECTION UP TO 15SU3 WEB-BASED MANAGEMENT INTERFACE REQUEST REDIRECT HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 4.4 $0-$5k 3.35+ Summaryinfo A vulnerability was found in Cisco Unity Connection up to 15SU3. It has been classified as problematic. Impacted is an unknown function of the component Web-based Management Interface. Performing a manipulation of the argument Request results in redirect. This vulnerability is reported as CVE-2026-20060. The attack is possible to be carried out remotely. No exploit exists. Upgrading the affected component is recommended. Detailsinfo A vulnerability was found in Cisco Unity Connection up to 15SU3. It has been classified as problematic. This affects an unknown code block of the component Web-based Management Interface. The manipulation of the argument request with an unknown input leads to a redirect vulnerability. CWE is classifying the issue as CWE-601. A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. This is going to have an impact on integrity. The summary by CVE is: A vulnerability in the web-based management interface of Cisco Unity Connection could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of HTTP request parameters. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious web page. It is possible to read the advisory at sec.cloudapps.cisco.com. This vulnerability is uniquely identified as CVE-2026-20060 since 10/08/2025. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. It demands that the victim is doing some kind of user interaction. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 04/15/2026). The attack technique deployed by this issue is T1204.001 according to MITRE ATT&CK. Upgrading eliminates this vulnerability. The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2026-22953). Productinfo Type Unified Communication Software Vendor Cisco Name Unity Connection Version 14 14SU1 14SU2 14SU3 14SU3a 14SU4 15 15SU1 15SU2 15SU3 License commercial Website Vendor: https://www.cisco.com/ CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 4.5 VulDB Meta Temp Score: 4.4 VulDB Base Score: 4.3 VulDB Temp Score: 4.1 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 4.7 CNA Vector (cisco): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Redirect CWE: CWE-601 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Timelineinfo 10/08/2025 CVE reserved 04/15/2026 +189 days Advisory disclosed 04/15/2026 +0 days VulDB entry created 04/15/2026 +0 days VulDB entry last update Sourcesinfo Vendor: cisco.com Advisory: cisco-sa-unity-vulns-n2EJSbbw Status: Confirmed CVE: CVE-2026-20060 (🔒) GCVE (CVE): GCVE-0-2026-20060 GCVE (VulDB): GCVE-100-357747 EUVD: 🔒 Entryinfo Created: 04/15/2026 18:28 Updated: 04/15/2026 20:03 Changes: 04/15/2026 18:28 (66), 04/15/2026 20:03 (1) Complete: 🔍 Cache ID: 99:980:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 15, 2026
    Archived
    Apr 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗