Cisco has issued patches for a severe security vulnerability in its Unity Connection software, potentially granting unauthenticated attackers remote root privileges on unpatched devices. Unity Connection functions as a virtualized messaging and voicemail solution across various platforms, including email inboxes, web browsers, Cisco Jabber, Unified IP Phones, smartphones, and tablets. The critical flaw (CVE-2024-20272) resides in the software’s web-based management interface, allowing attackers to execute commands on the underlying operating system by uploading arbitrary files. Although Cisco has no evidence of public proof-of-concept exploits or active exploitation in the wild, users are strongly advised to apply the provided patches to safeguard their systems.
In addition to addressing the Unity Connection vulnerability, Cisco has also patched ten medium-severity security vulnerabilities across multiple products. These flaws could potentially be exploited by attackers to escalate privileges, launch cross-site scripting (XSS) attacks, inject commands, and more. Notably, proof-of-concept exploit code is available online for one of these vulnerabilities (CVE-2024-20287), a command injection flaw in the web-based management interface of Cisco’s WAP371 Wireless Access Point. Cisco advises customers with a WAP371 device on their network to migrate to the Cisco Business 240AC Access Point, as the former reached end-of-life in June 2019.
Cisco’s Product Security Incident Response Team (PSIRT) has emphasized that there is no evidence of public proof-of-concept exploits or active exploitation in the wild for the addressed vulnerabilities. However, it is crucial for users to remain vigilant and promptly apply the provided patches to mitigate potential security risks. The company continues to monitor and respond to security vulnerabilities, underlining the importance of proactive measures to ensure the integrity and security of Cisco products.