[CIVN-2025-0265] Information Disclosure Vulnerability in CISCO

By Published On: October 17, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Information Disclosure Vulnerability in CISCO 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Systems Affected
TelePresence CE
RoomOS in on-premises operation
RoomOS in cloud-aware on-premises operation, which is cloud based
Overview
A vulnerability has been reported in logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system.
Target Audience: 
All IT administrators and individuals responsible for maintaining and updating logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
This vulnerability exists due to certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access.
Successful exploitation of this vulnerability could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII).
Note: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials.
Solution
Apply appropriate updates as mentioned in Cisco Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-inf-disc-qGgsbxAm
Vendor Information
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-inf-disc-qGgsbxAm
References
CISCO
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-inf-disc-qGgsbxAm
CVE Name
CVE-2024-20329
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmjyKZUACgkQ3jCgcSdc
ys8HKA//QpeGuZCdjJDoWUthzaFRq+qiVKykuKs40trgTTtK99L5jYZ1467VIeSM
RsmNYb0L3L9/xB/kT+5K+cqd6aFgXFC76gLJmZHErW2SvV/KdvomjKeXBoQYlOnS
ViM5Q95Q6fdtJAyaZuJ/pcK69Xpwst4hzJR8qoUXWA5k3VEcavTs1Ra0Yxec7sre
o7LY8QWZsDjj7wgNKDaFnlEyO96NwrPAvRjqIc7W5iXOY19fYR5QjfBpBIlmPLve
RcHIY81zGsJNVPfPXYIo7Z882j7vMhzvSY0SVsAohd5vE7jyOg1owDNM1yy9CSSB
zb2zeuICwvWPPnuyZA0mtcRDF2uIHnND5rqg3UXzpCyNKoVGTj9SRr9BVGZn59aQ
3WLczTG6/WTtDOSjq/2s9+SXSFGB+fhgqY3umS51TqvqSQsu2495G7kpLsg2nokh
m1srEMxr38x6jGWS9qhnG5nqWrY/ifknidSR8QeaKSjvCYJnwHPlHEs4HcThVcMq
HbEjs19bo1BKLT4hmssRtKE6BkBk86nyD/Ns6l+kUjQrvw4raaCyfEwDw8Bm1+HM
w0WE0tWSCQZH7bh70b3R0nPNneAC1D7UrpWOnfqX/yTuUPVWGOC3VEq5nCCJTcBM
uazxGXGXiVfw3zV2mKS7D7kiS/vtJA6xlz6k9EkEvfFAxtaLoZk=
=jjPK
—–END PGP SIGNATURE—–

Share this article