Description
A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to insufficient validation of input received by an affected device. An attacker could exploit this vulnerability by getting the affected device to render crafted text, for example, a crafted meeting invitation. As indicated in the CVSS score, no user interaction is required, such as accepting the meeting invitation. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Published: 2026-02-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint Software and Cisco RoomOS Software that allows a remote, unauthenticated attacker to engineer a denial of service by causing the device to reload. The flaw stems from insufficient validation of input, such that crafted text—such as a malicious meeting invitation—triggers the vulnerable rendering process. The weakness is a form of improper input validation (CWE‑1287), meaning the attacker does not need any privileges or user interaction to execute the exploit, and the impact is a loss of availability for the affected device.

Affected Systems

The affected products are Cisco RoomOS Software and Cisco TelePresence Endpoint Software (TC/CE). No specific version numbers are listed in the advisory, so all devices running these products are considered vulnerable until a patch is applied.

Risk and Exploitability

With a CVSS score of 7.5 the vulnerability is considered high severity, but the EPSS score of less than 1 % indicates a low current probability of exploitation. The flaw is not listed in CISA’s KEV catalog, suggesting no widespread exploitation has been observed. An attacker can remotely send crafted text to a device—such as a malicious meeting invitation—without any authentication or user action, resulting in a device reload and a denial of service. Based on the description, it is inferred that the attack vector is remote via network access; exposed network connectivity to the devices is the primary risk factor.

Generated by OpenCVE AI on April 18, 2026 at 13:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the Cisco‑provided firmware update for TelePresence Endpoint Software and RoomOS Software from the security advisory linked above.
  • After applying the update, reboot the device to ensure the new code is running.
  • Apply network segmentation or firewall rules to restrict unsolicited meeting invitations from untrusted networks until all devices are patched.

Generated by OpenCVE AI on April 18, 2026 at 13:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco roomos
Cisco telepresence Ce
Cisco telepresence Ce Software
Cisco telepresence Tc
Cisco telepresence Tc Software
Vendors & Products Cisco
Cisco roomos
Cisco telepresence Ce
Cisco telepresence Ce Software
Cisco telepresence Tc
Cisco telepresence Tc Software

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of input received by an affected device. An attacker could exploit this vulnerability by getting the affected device to render crafted text, for example, a crafted meeting invitation. As indicated in the CVSS score, no user interaction is required, such as accepting the meeting invitation. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Title Cisco TelePresence Collaboration Endpoint Software and RoomOS Software Denial of Service Vulnerability
Weaknesses CWE-1287
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Cisco Roomos Telepresence Ce Telepresence Ce Software Telepresence Tc Telepresence Tc Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-12T18:49:48.060Z

Reserved: 2025-10-08T11:59:15.377Z

Link: CVE-2026-20119

cve-icon Vulnrichment

Updated: 2026-02-04T16:42:11.720Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T17:16:14.457

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:00:02Z

Weaknesses