A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8 | Vendor Advisory |
Configurations
History
06 Aug 2025, 20:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8 - Vendor Advisory | |
| First Time |
Cisco
Cisco enterprise Chat And Email |
|
| CPE | cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:* |
07 Apr 2025, 14:18
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
02 Apr 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-02 17:15
Updated : 2025-08-06 20:03
NVD link : CVE-2025-20139
Mitre link : CVE-2025-20139
CVE.ORG link : CVE-2025-20139
JSON object : View
Products Affected
cisco
- enterprise_chat_and_email
CWE
CWE-185
Incorrect Regular Expression
