Home

Description

A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of input received by an affected device. An attacker could exploit this vulnerability by getting the affected device to render crafted text, for example, a crafted meeting invitation. As indicated in the CVSS score, no user interaction is required, such as accepting the meeting invitation. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

PUBLISHED Reserved 2025-10-08 | Published 2026-02-04 | Updated 2026-02-12 | Assigner cisco




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Improper Validation of Specified Type of Input

Product status

Default status
unknown

RoomOS 10.11.2.2
affected

RoomOS 10.15.2.2
affected

RoomOS 11.5.4.6
affected

RoomOS 11.5.2.4
affected

RoomOS 10.8.2.5
affected

RoomOS 10.11.5.2
affected

RoomOS 10.11.3.0
affected

RoomOS 10.15.5.3
affected

RoomOS 10.19.2.2
affected

RoomOS 11.1.3.1
affected

RoomOS 10.11.6.0
affected

RoomOS 10.19.3.0
affected

RoomOS 10.19.4.2
affected

RoomOS 10.3.2.4
affected

RoomOS 10.3.4.0
affected

RoomOS 10.15.3.0
affected

RoomOS 11.1.4.1
affected

RoomOS 11.14.2.3
affected

RoomOS 11.1.2.4
affected

RoomOS 10.8.3.1
affected

RoomOS 11.14.2.1
affected

RoomOS 10.3.3.0
affected

RoomOS 10.8.4.0
affected

RoomOS 10.15.4.1
affected

RoomOS 10.19.5.6
affected

RoomOS 10.11.4.1
affected

RoomOS 11.9.3.1
affected

RoomOS 11.5.3.3
affected

RoomOS 10.3.2.0
affected

RoomOS 11.9.2.4
affected

RoomOS 11.14.3.0
affected

RoomOS 11.17.2.2
affected

RoomOS 11.14.4.0
affected

RoomOS 10.19 StepUpg
affected

RoomOS 11.17.3.0
affected

RoomOS 11.20.2.3
affected

RoomOS 11.14.5.0
affected

RoomOS 11.17.4.0
affected

RoomOS 11.20.3.0
affected

RoomOS 11.23.1.6
affected

RoomOS 11.23.1.8
affected

RoomOS 11.24.1.5
affected

RoomOS 11.24.2.4
affected

RoomOS 11.24.3.0
affected

RoomOS 11.24.4.1
affected

RoomOS 11.27.2.0
affected

RoomOS 11.28.1.3
affected

RoomOS 11.27.3.0
affected

RoomOS 11.31.1.5
affected

RoomOS 11.27.4.0
affected

RoomOS 11.32.2.1
affected

Default status
unknown

CE9.3.0
affected

CE9.10.2
affected

CE9.2.6
affected

CE9.5.0
affected

CE9.3.3
affected

CE9.1.4
affected

CE9.3.2
affected

CE9.4.2
affected

CE9.3.1
affected

CE9.2.5
affected

CE9.9.3
affected

CE9.5.3
affected

CE9.10.3
affected

CE9.1.5
affected

CE9.5.2
affected

CE9.4.1
affected

CE9.6.1
affected

CE9.2.4
affected

CE9.5.1
affected

CE9.10.1
affected

CE9.1.2
affected

CE9.1.1
affected

CE9.9.4
affected

CE9.2.1
affected

CE9.1.3
affected

CE9.0.1
affected

CE9.1.6
affected

CE9.2.2
affected

CE9.4.0
affected

CE9.10.0
affected

CE9.2.3
affected

CE9.12.3
affected

CE9.15.18.4
affected

CE9.15.3.14
affected

CE9.15.18.6
affected

References

sec.cloudapps.cisco.com/.../cisco-sa-tce-roomos-dos-9V9jrC2q (cisco-sa-tce-roomos-dos-9V9jrC2q)

cve.org (CVE-2026-20119)

nvd.nist.gov (CVE-2026-20119)

Download JSON