top of page

Cisco Patches Critical Vulnerabilities in Meeting Software

  • Feb 5
  • 1 min read

Key Findings


  • Cisco has released urgent updates to address critical vulnerabilities in Cisco Meeting Management and Cisco TelePresence Collaboration Endpoint (CE) Software

  • The vulnerabilities could allow attackers to seize control of meeting management systems or crash communication endpoints

  • The most severe flaw, CVE-2026-20098, carries a high CVSS score of 8.8 and allows remote attackers to execute arbitrary commands with root privileges


Background


  • Cisco Meeting Management is a tool used to manage Cisco Meeting Server deployments

  • Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software are central to enterprise video conferencing


Cisco Meeting Management Vulnerability (CVE-2026-20098)


  • Vulnerability in the Certificate Management feature allows authenticated, remote attackers to upload arbitrary files and execute commands with root privileges

  • Attackers only need a "video operator" role account to exploit the flaw

  • Once authenticated, they can send a crafted HTTP request to upload malicious files that can overwrite system files processed by the root account


Cisco TelePresence Vulnerability (CVE-2026-20119)


  • Denial of Service (DoS) vulnerability in the text rendering subsystem

  • Allows unauthenticated, remote attackers to cause a DoS condition by getting the affected device to render crafted text, such as in a meeting invitation

  • No user interaction is required - the mere act of processing the malicious text is enough to force a device reload, disrupting communications


Patching and Mitigation


  • Cisco has released fixes for both vulnerabilities

  • For Cisco Meeting Management, users on release 3.12 and earlier must update to 3.12.1 MR or later

  • For TelePresence CE and RoomOS, the fix depends on the deployment (on-premises vs. cloud), with specific firmware versions available

  • Administrators are urged to patch these systems immediately to maintain secure video conferencing


Sources


  • https://securityonline.info/toxic-invites-root-access-cisco-patches-critical-meeting-flaws/

  • https://securityonline.info/cisa-warns-of-unpatched-avation-riss-critical-flaws/

  • https://x.com/the_yellow_fall/status/2019232312249012624

Recent Posts

See All
Claude Opus Generated a Chrome Exploit for $2,283

Key Findings Claude Opus 4.6 successfully generated a functional Chrome exploit chain for $2,283 in API costs across 2.33 billion tokens The exploit targeted Discord's bundled Chrome version 138, whic

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page