Description
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the LLDP process to restart, which could cause an affected device to reload unexpectedly.

This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).
Published: 2026-02-25
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via device reload
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from the Link Layer Discovery Protocol implementation in Cisco NX‑OS. Improper handling of specific fields in an LLDP frame can cause the LLDP process to crash and restart, which in turn forces the entire device to reload. This results in a denial of service condition that can interrupt network services and affect all devices connected to the affected switch.

Affected Systems

The flaw affects Cisco NX‑OS Software, Cisco NX‑OS System Software in ACI Mode, and Cisco Unified Computing System (Managed) on Cisco Nexus 3000 and 9000 Series Switches. No specific version ranges are provided in the advisory, so all revisions of these product lines are potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.4 places the vulnerability in the high severity range, but the EPSS score of less than 1% suggests low exploitation probability under normal circumstances. The vulnerability is not listed in the CISA KEV catalog. An attacker must be directly connected to an adjacent Layer‑2 interface, either physically or through a Layer‑2 tunnel, to send a crafted LLDP packet that triggers the device reload. Once the attacker has such proximity, the impact is complete denial of service for the affected device and the network segments it serves.

Generated by OpenCVE AI on April 17, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco NX‑OS firmware update that resolves the LLDP memory‑corruption bug.
  • Disable LLDP on interfaces that do not require it or limit LLDP traffic to trusted VLANs and ports.
  • Segregate critical devices into protected VLANs or separate physical segments to prevent unauthorized Layer‑2 connectivity.

Generated by OpenCVE AI on April 17, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco nx-os Software
Cisco nx-os System Software In Aci Mode
Cisco unified Computing System Manager
Vendors & Products Cisco
Cisco nx-os Software
Cisco nx-os System Software In Aci Mode
Cisco unified Computing System Manager

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the LLDP process to restart, which could cause an affected device to reload unexpectedly. This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note:&nbsp;LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be&nbsp;directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).
Title Cisco Nexus 3000 and 9000 Series Switches Link Layer Discovery Protocol Denial of Service Vulnerability
Weaknesses CWE-805
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Nx-os Software Nx-os System Software In Aci Mode Unified Computing System Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-25T19:05:49.108Z

Reserved: 2025-10-08T11:59:15.350Z

Link: CVE-2026-20010

cve-icon Vulnrichment

Updated: 2026-02-25T18:17:50.280Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T17:25:24.110

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses