{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:38:55.990","vulnerabilities":[{"cve":{"id":"CVE-2026-20119","sourceIdentifier":"psirt@cisco.com","published":"2026-02-04T17:16:14.457","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) Software and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of input received by an affected device. An attacker could exploit this vulnerability by getting the affected device to render crafted text, for example, a crafted meeting invitation. As indicated in the CVSS score, no user interaction is required, such as accepting the meeting invitation. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el subsistema de renderizado de texto de Cisco TelePresence Collaboration Endpoint (CE) Software y Cisco RoomOS Software podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado.\n\nEsta vulnerabilidad se debe a una validación insuficiente de la entrada recibida por un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad haciendo que el dispositivo afectado renderice texto manipulado, por ejemplo, una invitación a una reunión manipulada. Como se indica en la puntuación CVSS, no se requiere interacción del usuario, como aceptar la invitación a la reunión. Un exploit exitoso podría permitir al atacante hacer que el dispositivo afectado se recargue, lo que resultaría en una condición de DoS."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Primary","description":[{"lang":"en","value":"CWE-1287"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tce-roomos-dos-9V9jrC2q","source":"psirt@cisco.com"}]}}]}