A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
 This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.
                
            References
                    | Link | Resource | 
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8 | Vendor Advisory | 
Configurations
                    History
                    06 Aug 2025, 20:03
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:* | |
| First Time | Cisco enterprise Chat And Email Cisco | |
| References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8 - Vendor Advisory | 
07 Apr 2025, 14:18
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
02 Apr 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-02 17:15
Updated : 2025-08-06 20:03
NVD link : CVE-2025-20139
Mitre link : CVE-2025-20139
CVE.ORG link : CVE-2025-20139
JSON object : View
Products Affected
                cisco
- enterprise_chat_and_email
CWE
                
                    
                        
                        CWE-185
                        
            Incorrect Regular Expression
