Impact
The vulnerability originates from the Link Layer Discovery Protocol implementation in Cisco NX‑OS. Improper handling of specific fields in an LLDP frame can cause the LLDP process to crash and restart, which in turn forces the entire device to reload. This results in a denial of service condition that can interrupt network services and affect all devices connected to the affected switch.
Affected Systems
The flaw affects Cisco NX‑OS Software, Cisco NX‑OS System Software in ACI Mode, and Cisco Unified Computing System (Managed) on Cisco Nexus 3000 and 9000 Series Switches. No specific version ranges are provided in the advisory, so all revisions of these product lines are potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.4 places the vulnerability in the high severity range, but the EPSS score of less than 1% suggests low exploitation probability under normal circumstances. The vulnerability is not listed in the CISA KEV catalog. An attacker must be directly connected to an adjacent Layer‑2 interface, either physically or through a Layer‑2 tunnel, to send a crafted LLDP packet that triggers the device reload. Once the attacker has such proximity, the impact is complete denial of service for the affected device and the network segments it serves.
OpenCVE Enrichment