Description
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Note: Only the out-of-band (OOB) management interface is affected.
Published: 2026-02-25
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in the Cisco Nexus 9000 Series Fabric Switches operating in Application Centric Infrastructure (ACI) mode where insufficient validation of Ethernet frames processed by the out‑of‑band management interface allows an unauthenticated, adjacent attacker to inject a crafted frame. If the exploit succeeds, the device will unexpectedly reload, resulting in a denial of service of the switch. The impact is the loss of network connectivity but does not directly affect data confidentiality or integrity.

Affected Systems

Cisco NX‑OS System Software in ACI Mode on Nexus 9000 Series Fabric Switches. No specific affected versions are listed in the CNA data; the only affected component is the out‑of‑band management interface.

Risk and Exploitability

The CVSS base score is 7.4, indicating a high severity. The EPSS score is less than 1 %, suggesting a very low probability of observed exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is the out‑of‑band management interface; an attacker must be adjacent to the switch’s management network and does not need credentials. Successful exploitation causes the switch to reboot, disrupting services for potentially all users connected to the affected fabric.

Generated by OpenCVE AI on April 17, 2026 at 15:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco NX‑OS firmware that addresses the Ethernet frame validation issue.
  • Restrict traffic to the out‑of‑band management interface so that only trusted management networks can reach it.
  • Monitor switch logs and network traffic for repeated reloads or abnormal management‑interface frames to detect an attempt or failure of this exploit.

Generated by OpenCVE AI on April 17, 2026 at 15:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco cisco Nx-os System Software In Aci Mode
Vendors & Products Cisco
Cisco cisco Nx-os System Software In Aci Mode

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the&nbsp;management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. Note: Only the out-of-band (OOB) management interface is affected.
Title Cisco NX-OS Software Denial of Service Vulnerability
Weaknesses CWE-805
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Cisco Cisco Nx-os System Software In Aci Mode
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-02-25T19:05:48.146Z

Reserved: 2025-10-08T11:59:15.353Z

Link: CVE-2026-20033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-02-25T17:25:24.560

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-20033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses