Cisco and F5 this week released patches for multiple vulnerabilities across their products, including high-severity issues leading to denial-of-service (DoS) conditions, command execution, and privilege escalation.
Cisco rolled out fixes for five security defects, including two high-severity bugs in TelePresence Collaboration Endpoint (CE) and RoomOS software, and Meeting Management.
The first, tracked as CVE-2026-20119, can be exploited remotely without authentication or user interaction to cause a DoS condition by sending a crafted meeting invitation to a vulnerable appliance.
Cisco fixed the flaw in TelePresence CE Software and RoomOS software versions 11.27.5.0 and 11.32.3.0.
The second vulnerability, tracked as CVE-2026-20098 and resolved in Meeting Management version 3.12.1 MR, exists because the web management interface fails to properly validate user input, allowing authenticated attackers to send crafted requests.
Successful exploitation of the bug allows attackers with at least the role of video operator to upload arbitrary files, including system files processed by the root account, thus leading to command execution with root privileges.
Cisco also resolved three medium-severity security defects in AsyncOS for Secure Web Appliance, Prime Infrastructure, and Evolved Programmable Network Manager (EPNM).
Cisco says it is not aware of any of these flaws being exploited in the wild. Additional information can be found on the company’s security advisories page.
F5 patches
On Wednesday, F5 published its February 2026 quarterly security notification, which describes five medium- and low-severity vulnerabilities patched in BIG-IP and NGINX. Based on the CVSS 4.0 scoring system, two of the bugs have a ‘high’ severity rating.
First in line is CVE-2026-22548, a BIG-IP bug that could be exploited to cause a DoS condition by restarting the bd process and disrupting traffic.
“When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests along with conditions beyond the attacker’s control can cause the bd process to terminate,” F5 explains.
The second issue, CVE-2026-1642, affects NGINX OSS and NGINX Plus instances configured to proxy to upstream TLS servers. It allows a man-in-the-middle (MitM) attacker to inject responses that could be sent to clients.
F5 also announced fixes for a medium-severity flaw in BIG-IP container ingress services for Kubernetes and OpenShift, and for low-severity flaws in BIG-IP Edge Client and browser VPN clients on Windows, and BIG-IP Configuration utility.
The issues may lead to cluster secret and other sensitive information exposure, and error message spoofing (potentially tricking users into clicking on malicious links).
F5 makes no mention of any of these vulnerabilities being exploited in the wild. Additional information is available in the company’s quarterly security notification.
Related: Ivanti Patches Exploited EPMM Zero-Days
Related: Microsoft Moves Closer to Disabling NTLM
Related: Over 1,400 MongoDB Databases Ransacked by Threat Actor
Related: WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking

