DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-20119: The Meeting That Killed the Room: Deep Dive into CVE-2026-20119

The Meeting That Killed the Room: Deep Dive into CVE-2026-20119

Vulnerability ID: CVE-2026-20119
CVSS Score: 7.5
Published: 2026-02-04

A critical Denial of Service (DoS) vulnerability in the text rendering subsystem of Cisco TelePresence and RoomOS devices allows unauthenticated attackers to crash systems remotely. By sending a specifically crafted meeting invitation, an attacker can force the endpoint to reload, disrupting operations and potentially causing persistent outages without requiring any user interaction.

TL;DR

Unauthenticated remote DoS in Cisco RoomOS/CE. Sending a malformed meeting invitation triggers a crash in the text rendering engine. CVSS 7.5. No workarounds; patch immediately.


Technical Details

  • CVE ID: CVE-2026-20119
  • CVSS v3.1: 7.5 (High)
  • CWE: CWE-1287 (Improper Validation)
  • Attack Vector: Network (SIP/VoIP)
  • Privileges Required: None
  • User Interaction: None
  • Exploit Status: No Active Exploitation (yet)

Affected Systems

  • Cisco RoomOS 10.x
  • Cisco RoomOS 11.x
  • Cisco TelePresence CE9.x
  • Cisco RoomOS: 11.x < 11.32.2.1 (Fixed in: 11.32.2.1)
  • Cisco RoomOS: 10.x < 10.19.5.6 (Fixed in: 10.19.5.6)
  • Cisco TelePresence CE: 9.x < 9.15.18.6 (Fixed in: 9.15.18.6)

Exploit Details

  • Hypothetical: Exploit involves sending malformed SIP INVITE headers (Subject/From) to the target.

Mitigation Strategies

  • Upgrade Firmware
  • Network Segmentation (restrict SIP traffic)

Remediation Steps:

  1. Identify all Cisco TelePresence and RoomOS endpoints in the inventory.
  2. Verify the current running version against the advisory list (e.g., RoomOS 11.x < 11.32.2.1).
  3. Schedule a maintenance window (reboot required).
  4. Apply the latest stable release provided by Cisco (e.g., RoomOS 11.32.2.1).
  5. Verify device stability post-update.

References


Read the full report for CVE-2026-20119 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)