{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-005.pdf"
    },
    "title": "Critical Vulnerability in Cisco Unity Connection",
    "serial_number": "2024-005",
    "publish_date": "11-01-2024 15:08:30",
    "description": "On January 10, 2024, Cisco disclosed a critical vulnerability in its Unity Connection product. This vulnerability, tracked as \"CVE-2024-20272\" with a CVSS score of 7.3, could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system and execute commands on the underlying operating system. Currently, Cisco has no evidence of public proof of concept exploits for this vulnerability or active exploitation in the wild.<br>\n",
    "url_title": "2024-005",
    "content_markdown": "---\ntitle: 'Critical Vulnerability in\u00a0Cisco\u00a0Unity\u00a0Connection'\nnumber: '2024-005'\nversion: '1.0'\noriginal_date: 'January 10, 2024'\ndate: 'January 11, 2024'\n---\n\n_History:_\n\n* _11/01/2024 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn January 10, 2024, Cisco disclosed a critical vulnerability in its Unity Connection product [1]. This vulnerability, tracked as `CVE-2024-20272` with a CVSS score of 7.3, could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system and execute commands on the underlying operating system. Currently, Cisco has no evidence of public proof of concept exploits for this vulnerability or active exploitation in the wild.\n\n# Technical Details\n\nThis vulnerability is due to a lack of authentication in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by uploading arbitrary files to an affected system. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.\n\n# Affected Products\n\nThe following versions are affected [2]:\n\n- 12.5 and earlier, before the first fixed release (`12.5.1.19017-4`)\n- 14 before the first fixed release (`14.0.1.14006-5`)\n\n# Recommendations\n\nCERT-EU recommends updating to the latest version of Cisco Unity Connection as soon as possible to mitigate this vulnerability.\n\n# References\n\n[1] <https://www.bleepingcomputer.com/news/security/cisco-says-critical-unity-connection-bug-lets-attackers-get-root/>\n\n[2] <https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-unauth-afu-FROYsCsD#fs>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>11/01/2024 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On January 10, 2024, Cisco disclosed a critical vulnerability in its Unity Connection product [1]. This vulnerability, tracked as <code>CVE-2024-20272</code> with a CVSS score of 7.3, could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system and execute commands on the underlying operating system. Currently, Cisco has no evidence of public proof of concept exploits for this vulnerability or active exploitation in the wild.</p><h2 id=\"technical-details\">Technical Details</h2><p>This vulnerability is due to a lack of authentication in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by uploading arbitrary files to an affected system. A successful exploit could allow the attacker to store malicious files on the system, execute arbitrary commands on the operating system, and elevate privileges to root.</p><h2 id=\"affected-products\">Affected Products</h2><p>The following versions are affected [2]:</p><ul><li>12.5 and earlier, before the first fixed release (<code>12.5.1.19017-4</code>)</li><li>14 before the first fixed release (<code>14.0.1.14006-5</code>)</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends updating to the latest version of Cisco Unity Connection as soon as possible to mitigate this vulnerability.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.bleepingcomputer.com/news/security/cisco-says-critical-unity-connection-bug-lets-attackers-get-root/\">https://www.bleepingcomputer.com/news/security/cisco-says-critical-unity-connection-bug-lets-attackers-get-root/</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-unauth-afu-FROYsCsD#fs\">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuc-unauth-afu-FROYsCsD#fs</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}