CVE-2026-20119
Cisco · TelePresence Collaboration Endpoint (CE) / RoomOS
A vulnerability in the text rendering subsystem of Cisco TelePresence CE and RoomOS allows unauthenticated remote attackers to cause a denial of service (DoS) condition.
Executive summary
Unauthenticated remote attackers can trigger a denial of service on Cisco TelePresence and RoomOS devices by exploiting a vulnerability in the text rendering subsystem.
Vulnerability
The flaw exists within the text rendering subsystem of the device software. An unauthenticated, remote attacker can exploit this by sending malicious input that the system fails to process correctly, resulting in a device crash or reboot.
Business impact
Exploitation of this vulnerability directly impacts the availability of collaboration services, leading to system downtime during critical meetings. While the CVSS score is 7.5, the High severity reflects the potential for repeated disruption of business-critical video conferencing hardware across the enterprise.
Remediation
Immediate Action: Update affected Cisco TelePresence and RoomOS devices to the latest patched versions as specified in the Cisco security advisory.
Proactive Monitoring: Monitor network traffic for unusual packets targeting collaboration endpoints and track device uptime for unexpected reboots.
Compensating Controls: Implement network-level access control lists (ACLs) to ensure only authorized traffic can reach the management and signaling interfaces of the devices.
Exploitation status
Public Exploit Available: false
Analyst recommendation
To maintain the availability of organizational communication channels, it is essential to apply the vendor's updates. Prioritize patching devices that are exposed to broader internal networks or the public internet.