A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.
This vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII).
Note: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Cisco Cisco roomos Cisco telepresence Collaboration Endpoint | |
| Vendors & Products | Cisco Cisco roomos Cisco telepresence Collaboration Endpoint | 
Wed, 15 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 15 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A vulnerability in the logging component of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an authenticated, remote attacker to view sensitive information in clear text on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability exists because certain unencrypted credentials are stored when SIP media component logging is enabled. An attacker could exploit this vulnerability by accessing the audit logs on an affected system and obtaining credentials to which they may not normally have access. A successful exploit could allow the attacker to use those credentials to access confidential information, some of which may contain personally identifiable information (PII). Note: To access the logs that are stored in the Webex Cloud or stored on the device itself, an attacker must have valid administrative credentials. | |
| Title | Cisco TelePresence Collaboration Endpoint and RoomOS Software Information Disclosure Vulnerability | |
| Weaknesses | CWE-532 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: cisco
Published: 2025-10-15T16:14:59.904Z
Updated: 2025-10-15T17:42:48.088Z
Reserved: 2024-10-10T19:15:13.254Z
Link: CVE-2025-20329
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-15T17:42:43.172Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-15T17:15:48.697
Modified: 2025-10-16T15:28:59.610
Link: CVE-2025-20329
 Redhat
                        Redhat
                    No data.