Description
A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
Reserved 2024-10-10 | Published 2025-04-02 | Updated 2025-04-02 | Assigner
ciscoHIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Problem types
Incorrect Regular Expression
Product status
11.5(1)
affected
11.6(1)
affected
11.6(1)_ES2
affected
11.6(1)_ES3
affected
11.6(1)_ES4
affected
11.6(1)_ES5
affected
11.6(1)_ES6
affected
11.6(1)_ES10
affected
11.6(1)_ES11
affected
11.6(1)_ES7
affected
11.6(1)_ES8
affected
11.6(1)_ES9
affected
11.6(1)_ES9a
affected
11.6(1)_ES12
affected
11.6(1)_ES12_ET1
affected
12.0(1)
affected
12.0(1)_ES1
affected
12.0(1)_ES2
affected
12.0(1)_ES3
affected
12.0(1)_ES4
affected
12.0(1)_ES5
affected
12.0(1)_ES5a
affected
12.0(1)_ES6
affected
12.0(1)_ES6_ET1
affected
12.0(1)_ES6_ET2
affected
12.0(1)_ES6_ET3
affected
12.0(1)_ES7
affected
12.0(1)_ES7_ET1
affected
12.5(1)
affected
12.5(1)_ES1
affected
12.5(1)_ES2
affected
12.5(1)_ES3
affected
12.5(1)_ES3_ET1
affected
12.5(1)_ET1
affected
12.5(1)_ES4
affected
12.5(1)_ES3_ET2
affected
12.5(1)_ES4_ET1
affected
12.5(1)_ES5
affected
12.5(1)_ES5_ET1
affected
12.5(1)_ES6
affected
12.5(1)_ES7
affected
12.5(1)_ES8
affected
12.5(1)_ES8_ET1
affected
12.5(1)_ES3_ET3
affected
12.5(1)_ES5_ET2
affected
12.5(1)_ES6_ET1
affected
12.5(1)_ES4_ET2
affected
12.5(1)_ES7_ET1
affected
12.5(1)_ES9
affected
12.6(1)
affected
12.6(1)_ET1
affected
12.6(1)_ET2
affected
12.6(1)_ES1
affected
12.6(1)_ET3
affected
12.6(1)_ES1_ET1
affected
12.6(1)_ES2
affected
12.6(1)_ES3
affected
12.6(1)_ES4
affected
12.6(1)_ES4_ET1
affected
12.6(1)_ES5
affected
12.6(1)_ES5_ET1
affected
12.6(1)_ES5_ET2
affected
12.6(1)_ES6
affected
12.6(1)_ES6_ET1
affected
12.6(1)_ES6_ET2
affected
12.6(1)_ES7
affected
12.6(1)_ES8
affected
12.6(1)_ES4_ET2
affected
12.6(1)_ES3_ET3
affected
12.6(1)_ES2_ET5
affected
12.6(1)_ES1_ET2
affected
12.6(1)_ES8_ET1
affected
12.6(1)_ES7_ET1
affected
12.6(1)_ES6_ET3
affected
12.6(1)_ES5_ET3
affected
12.6(1)_ES8_ET2
affected
12.6(1)_ES9
affected
12.6(1)_ES9_ET1
affected
12.6(1)_ES9_ET2
affected
12.6(1)_ES9_ET3
affected
12.6_ES2_ET1
affected
12.6_ES2_ET2
affected
12.6_ES2_ET3
affected
12.6_ES2_ET4
affected
12.6_ES3_ET1
affected
12.6_ES3_ET2
affected
References
sec.cloudapps.cisco.com/...dvisory/cisco-sa-ece-dos-tC6m9GZ8 (cisco-sa-ece-dos-tC6m9GZ8)
cve.org (CVE-2025-20139)
nvd.nist.gov (CVE-2025-20139)
Download JSON