A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8 | Vendor Advisory |
Configurations
History
06 Aug 2025, 20:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8 - Vendor Advisory | |
CPE | cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:* | |
First Time |
Cisco
Cisco enterprise Chat And Email |
07 Apr 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Apr 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-02 17:15
Updated : 2025-08-06 20:03
NVD link : CVE-2025-20139
Mitre link : CVE-2025-20139
CVE.ORG link : CVE-2025-20139
JSON object : View
Products Affected
cisco
- enterprise_chat_and_email
CWE
CWE-185
Incorrect Regular Expression