Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Cisco, F5 Patch High-Severity Vulnerabilities

The security defects can lead to DoS conditions, arbitrary command execution, and privilege escalation.

Cisco vulnerability exploited

Cisco and F5 this week released patches for multiple vulnerabilities across their products, including high-severity issues leading to denial-of-service (DoS) conditions, command execution, and privilege escalation.

Cisco rolled out fixes for five security defects, including two high-severity bugs in TelePresence Collaboration Endpoint (CE) and RoomOS software, and Meeting Management.

The first, tracked as CVE-2026-20119, can be exploited remotely without authentication or user interaction to cause a DoS condition by sending a crafted meeting invitation to a vulnerable appliance.

Cisco fixed the flaw in TelePresence CE Software and RoomOS software versions 11.27.5.0 and 11.32.3.0.

The second vulnerability, tracked as CVE-2026-20098 and resolved in Meeting Management version 3.12.1 MR, exists because the web management interface fails to properly validate user input, allowing authenticated attackers to send crafted requests.

Successful exploitation of the bug allows attackers with at least the role of video operator to upload arbitrary files, including system files processed by the root account, thus leading to command execution with root privileges.

Advertisement. Scroll to continue reading.

Cisco also resolved three medium-severity security defects in AsyncOS for Secure Web Appliance, Prime Infrastructure, and Evolved Programmable Network Manager (EPNM).

Cisco says it is not aware of any of these flaws being exploited in the wild. Additional information can be found on the company’s security advisories page.

F5 patches

On Wednesday, F5 published its February 2026 quarterly security notification, which describes five medium- and low-severity vulnerabilities patched in BIG-IP and NGINX. Based on the CVSS 4.0 scoring system, two of the bugs have a ‘high’ severity rating.

First in line is CVE-2026-22548, a BIG-IP bug that could be exploited to cause a DoS condition by restarting the bd process and disrupting traffic.

“When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests along with conditions beyond the attacker’s control can cause the bd process to terminate,” F5 explains.

The second issue, CVE-2026-1642, affects NGINX OSS and NGINX Plus instances configured to proxy to upstream TLS servers. It allows a man-in-the-middle (MitM) attacker to inject responses that could be sent to clients.

F5 also announced fixes for a medium-severity flaw in BIG-IP container ingress services for Kubernetes and OpenShift, and for low-severity flaws in BIG-IP Edge Client and browser VPN clients on Windows, and BIG-IP Configuration utility.

The issues may lead to cluster secret and other sensitive information exposure, and error message spoofing (potentially tricking users into clicking on malicious links).

F5 makes no mention of any of these vulnerabilities being exploited in the wild. Additional information is available in the company’s quarterly security notification.

Related: Ivanti Patches Exploited EPMM Zero-Days

Related: Microsoft Moves Closer to Disabling NTLM

Related: Over 1,400 MongoDB Databases Ransacked by Threat Actor

Related: WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.