CNVD-2026-17803

Vulnerability from cnvd - Published: 2026-04-17
VLAI Severity ?
Title
Cisco Unity Connection Web管理界面SQL注入漏洞
Description
Cisco Unity Connection是一款统一通信消息平台,主要提供语音邮件和消息传递功能。 Cisco Unity Connection存在SQL注入漏洞。该漏洞源于对用户提供输入的验证不足,攻击者可利用该漏洞通过发送特制的HTTP(S)请求执行SQL注入攻击。
Severity
Patch Name
Cisco Unity Connection Web管理界面SQL注入漏洞的补丁
Patch Description
Cisco Unity Connection是一款统一通信消息平台,主要提供语音邮件和消息传递功能。 Cisco Unity Connection存在SQL注入漏洞。该漏洞源于对用户提供输入的验证不足,攻击者可利用该漏洞通过发送特制的HTTP(S)请求执行SQL注入攻击。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unity-vulns-n2EJSbbw

Reference
https://nvd.nist.gov/vuln/detail/CVE-2026-20061
Impacted products
Name
['Cisco Cisco Unity Connection 14SU2', 'Cisco Cisco Unity Connection 14SU3', 'Cisco Cisco Unity Connection 14', 'Cisco Cisco Unity Connection 15', 'Cisco Cisco Unity Connection 14SU1', 'Cisco Cisco Unity Connection 14SU3a', 'Cisco Cisco Unity Connection 15SU1', 'Cisco Cisco Unity Connection 14SU4', 'Cisco Cisco Unity Connection 15SU2', 'Cisco Cisco Unity Connection 15SU3', 'Cisco Cisco Unity Connection 14SU5']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2026-20061",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-20061"
    }
  },
  "description": "Cisco Unity Connection\u662f\u4e00\u6b3e\u7edf\u4e00\u901a\u4fe1\u6d88\u606f\u5e73\u53f0\uff0c\u4e3b\u8981\u63d0\u4f9b\u8bed\u97f3\u90ae\u4ef6\u548c\u6d88\u606f\u4f20\u9012\u529f\u80fd\u3002\n\nCisco Unity Connection\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u7528\u6237\u63d0\u4f9b\u8f93\u5165\u7684\u9a8c\u8bc1\u4e0d\u8db3\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684HTTP(S)\u8bf7\u6c42\u6267\u884cSQL\u6ce8\u5165\u653b\u51fb\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-unity-vulns-n2EJSbbw",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2026-17803",
  "openTime": "2026-04-17",
  "patchDescription": "Cisco Unity Connection\u662f\u4e00\u6b3e\u7edf\u4e00\u901a\u4fe1\u6d88\u606f\u5e73\u53f0\uff0c\u4e3b\u8981\u63d0\u4f9b\u8bed\u97f3\u90ae\u4ef6\u548c\u6d88\u606f\u4f20\u9012\u529f\u80fd\u3002\r\n\r\nCisco Unity Connection\u5b58\u5728SQL\u6ce8\u5165\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5bf9\u7528\u6237\u63d0\u4f9b\u8f93\u5165\u7684\u9a8c\u8bc1\u4e0d\u8db3\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684HTTP(S)\u8bf7\u6c42\u6267\u884cSQL\u6ce8\u5165\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco Unity Connection Web\u7ba1\u7406\u754c\u9762SQL\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco Cisco Unity Connection 14SU2",
      "Cisco Cisco Unity Connection 14SU3",
      "Cisco Cisco Unity Connection 14",
      "Cisco Cisco Unity Connection 15",
      "Cisco Cisco Unity Connection 14SU1",
      "Cisco Cisco Unity Connection 14SU3a",
      "Cisco Cisco Unity Connection 15SU1",
      "Cisco Cisco Unity Connection 14SU4",
      "Cisco Cisco Unity Connection 15SU2",
      "Cisco Cisco Unity Connection 15SU3",
      "Cisco Cisco Unity Connection 14SU5"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2026-20061",
  "serverity": "\u4e2d",
  "submitTime": "2026-04-16",
  "title": "Cisco Unity Connection Web\u7ba1\u7406\u754c\u9762SQL\u6ce8\u5165\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…