CVE-2026-20119

Cisco · TelePresence Collaboration Endpoint (CE) / RoomOS

A vulnerability in the text rendering subsystem of Cisco TelePresence CE and RoomOS allows unauthenticated remote attackers to cause a denial of service (DoS) condition.

Executive summary

Unauthenticated remote attackers can trigger a denial of service on Cisco TelePresence and RoomOS devices by exploiting a vulnerability in the text rendering subsystem.

Vulnerability

The flaw exists within the text rendering subsystem of the device software. An unauthenticated, remote attacker can exploit this by sending malicious input that the system fails to process correctly, resulting in a device crash or reboot.

Business impact

Exploitation of this vulnerability directly impacts the availability of collaboration services, leading to system downtime during critical meetings. While the CVSS score is 7.5, the High severity reflects the potential for repeated disruption of business-critical video conferencing hardware across the enterprise.

Remediation

Immediate Action: Update affected Cisco TelePresence and RoomOS devices to the latest patched versions as specified in the Cisco security advisory.

Proactive Monitoring: Monitor network traffic for unusual packets targeting collaboration endpoints and track device uptime for unexpected reboots.

Compensating Controls: Implement network-level access control lists (ACLs) to ensure only authorized traffic can reach the management and signaling interfaces of the devices.

Exploitation status

Public Exploit Available: false

Analyst recommendation

To maintain the availability of organizational communication channels, it is essential to apply the vendor's updates. Prioritize patching devices that are exposed to broader internal networks or the public internet.